Free Essay

Paper

In: Computers and Technology

Submitted By ripai07
Words 2145
Pages 9
1. PENDAHULUAN
Honeypot merupakan sebuah sistem atau komputer yang sengaja dijadikan umpan untuk menjadi target serangan dari penyerang (attacker). Komputer tersebut melayani serangan yang dilakukan oleh attacker dalam melakukan penetrasi terhadap server tersebut. Honeypot akan memberikan data palsu apabila ada hal aneh yang yang akan masuk ke dalam sistem atau server. Secara teori Honeypot tidak akan mencatat trafik yang legal. Sehingga dapat dilihat bahwa yang berinteraksi dengan Honeypot adalah user yang menggunakan sumber daya sistem yang digunakan secara ilegal. Jadi Honeypot seolah-olah menjadi sistem yang berhasil disusupi oleh attacker, padahal penyerang tidak masuk ke sistem sebenarnya, tetapi masuk ke sistem yang palsu.
Salah satu software Honeypot yang terkenal dan banyak dipakai adalah Honeyd. Ia akan menjebak attacker dengan membuat server-server palsu dengan bermacam- macam jenis sistem operasi seperti Windows, Linux, Unix, Mac Os dan bahkan cisco router dengan berbagi layanan seperti FTP, Web, Server dan sebagainya. Salah satu kelebihan Honeyd adalah mengemulasikan banyak server dan layanan servis palsu hanya pada satu unit komputer atau server sehingga akan menghemat resource.
Sistem keamanan firewall tidaklah cukup untuk meminimalkan terjadinya serangan terhadap suatu jaringan komputer. Banyak serangan yang terjadi pada jaringan komputer dapat diketahui setelah adanya kejadian-kejadian yang aneh pada jaringan. Para administrator tidak bisa mengetahui dengan pasti apa yang terjadi, sehingga dibutuhkan waktu yang cukup lama untuk mengaudit sistem guna mencari permasalahan yang telah terjadi. Untuk mengatasi masalah tersebut dibutuhkan suatu tool yang mampu mendeteksi lebih awal terjadinya intruder atau kegiatan yang merugikan suatu jaringan. Intrussion Detection System merupakan suatu solusi yang sangat tepat untuk keperluan tersebut.
Salah satu IDS (Intrusion Detection System) yang sangat populer dalam keamanan IT adalah Snort. Snort dibuat dan dikembangkan pertama kali oleh Martin Roesh pada bulan November 1998, lalu menjadi sebuah Open Source project. Bahkan di situs resminya www.snort.org mereka berani mengklaim sebagai standar "intrussion detection/prevention". Snort merupakan IDS yang sangat populer dan cukup ampuh.

2. PEMBAHASAN
2.1 Honeypot
Honeypot merupakan sebuah sistem atau komputer yang sengaja “dikorbankan” untuk menjadi target serangan dari hacker. Komputer tersebut melayani setiap serangan yang dilakukan oleh hacker dalam melakukan penetrasi terhadap server tersebut. Metode ini ditujukan agar administrator dari server yang akan diserang dapat mengetahui trik penetrasi yang dilakukan hacker serta bisa melakukan antisipasi dalam melindungi server yang sesungguhnya. Setiap tindakan yang dilakukan oleh penyusup yang mencoba melakukan koneksi ke honeypot tersebut, maka honeypot akan mendeteksi dan mencatatnya. akan terjadi. Perangakat tersebut tidak bisa menghilangkan serangan, akan tetapi memperkecil risiko serangan. Begitu pula peran dari honeypot, honeypot sangat berguna dalam hal pendeteksian terhadap serangan bukan menghilangkan serangan itu.

Honeypot bisa mengetahui aktivitas dari script kiddies sampai hacker sekalipun, dari dunia luar maupun yang berasal dari jaringan internal alias orang dalam. Sekaligus mengetahui motivasi hacking yang akan dilakukan, sehingga administrator dapat membuat suatu kebijakan keamanan (firewall) dalam hal mngurangi resiko yang akan terjadi terhadap server yang sesungguhnya.

2.1.1 Definisi
Berikut adalah definisi dari Honeypot [3] dari tiga orang yang memiliki kopetensi pada penelitian tentang Honeypot.
Definisi dari L. Spitzner tentang istilah Honeypot adalaha sebagai berikut:
“A Honeypot is a resource whose value is being in attacked or compromised. This means, that a Honeypot is expected to get probed, attacked and potentially exploited. Honeypots do not fix anything. They provide us with additional, valuable information.”
Definisi lain menurut Retto Baumann dan Cristian Plattner :
“A Honeypot is a resource which pretends to be a real target. A Honeypot is expected to be attacked or compromised. The main goals are the distraction of an attacker and the gain of information about an attack and the attacker.”
Pada dasarnya Honeypot adalah suatu alat untuk mendapatkan informasi tentang penyerang. Selanjutnya administrator jaringan dapat mempelajari aktifitas-aktifitas yang dapat merugikan dan melihat kecenderungan dari aktifitas tersebut. Honeypot adalah sebuah sistem yang dirancang untuk diperiksa dan diserang.
Sistem dengan Honeypot akan menipu dan atau memberikan data palsu apabila ada orang yang memiliki maksud yang tidak baik ketika ia masuk ke suatu sistem. Secara teori Honeypot tidak akan mencatat trafik yang legal. Sehingga bisa dilihat bahwa yang berinteraksi dengan Honeypot rata-rata adalah user yang menggunakan sumber daya sistem secara ilegal. Jadi Honeypot menjadi sistem yang seolah-olah berhasil disusupi oleh penyerang. Padahal penyerang tidak masuk kesistem yang sebenarnya, tetapi malah masuk kedalam sistem yang palsu.

2.1.2 Kategori Honeypot
Menurut kategorinya Honeypot terdiri atas :
1). Production Honeypot
2). Research Honeypot
Production Honeypot digunakan untuk mengurangi resiko serangan pada sistem keamanan jaringan informasi dalam sebuah organisasi. Research Honeypot digunakan untuk mendapatkan infrmasi sebanyak mungkin tentang penyerang sehingga seorang adimnistrator dapat mempelajari sebanyak mungkin informasi tersebut.

2.1.3 Jenis Honeypot
Jenis Honeypot adalah berdasarkan level of involvement (tingkat keterlibatan).
Level of involvement mengukur derajat interaksi seorang penyerang dengan sistem informasi. Terdiri dari dua jenis yakni low involvement Honeypot dan high involvement Honeypot.
1). Low Involvement Honeypot
Low Involvement Honeypot biasanya hanya menyediakan tiruan dari layanan tertentu. Bentuk paling sederhana dari layanan ini dapat diimplementasikan dengan memasang suatu listener pada sebuah port. Sebagai contoh, simple netcat –l –p 80 > /log/Honeypot/port 80.log dapat digunakan untuk mendengarkan port 80 (HTTP) dan mencatat semua traffic yang ada pada log file. Pada Low Involvement Honeypot tidak ada sistem operasi nyata yang dapat dipakai sebagai tempat operasi penyerang. Ini akan dapat mengurangi resiko secara signifikan karena kompleksitas dari suatu sistem operasi telah ditiadakan. Di sisi lain ini adalah juga suatu kelemahan yang berakibat tidak adanya kemungkinan untuk memperhatikan interaksi penyerang dengan sistem operasi yang bisa jadi sangat menarik. Low Involvement Honeypot adalah seperti sebuah koneksi satu arah. Kita hanya akan dapat mendengarkan tanpa bisa menanyakan pertanyaan sendiri. Pendekatan cara ini sangat pasif.

2). High Involvement Honeypot
High involvement Honeypot mempunyai sebuah sistem operasi nyata yang mendasarinya. Hal ini menyebabkan resiko yang sangat tinggi karena kompleksitas menjadi semakin bertambah. Pada saat yang sama, kemampuan untuk mengumpulkan 10 informasi, dan kemungkinan untuk serangan yang lebih atraktif juga semakin bertambah banyak. Satu tujuan dari seorang hacker adalah menambah sumber dan mendapatkan akses pada satu mesin yang terhubung ke internet selama 24 jam sehari.
High involvement Honeypots menawarkan kemungkinan itu. Ketika seorang hacker mendapatkan akses, bagian yang sangat menarik dimulai. Sayangnya seorang penyerang akan berkompromi dengan sistem untuk mendapatkan level kebebasan seperti ini. Dia akan mempunyai sumber yang sebenarnya pada sistem dan dapat melakukan apa saja pada setiap saat dalam sistem yang berkompromi tersebut. Oleh sebab itu sistem tidak lagi aman. Bahkan seluruh mesin tidak lagi dapat dikatakan aman. Hal ini tidak akan menjadi masalah jika penyerang berada pada sebuah jail, sandbox, atau VMWare box karena akan ada jalan untuk keluar dari batas-batas software ini.

2.1.4 Honeyd
Honeyd adalah Honeypot Open Source yang ditulis oleh Niel Provos. Honeyd meupakan daemon sederhana yang membuat virtual host tetap pada jaringan. Host tersebut nantinya bisa dikonfigurasi untuk menjalankan berbagai macam layanan. Kepribadian TCP nya Bisa berjalan sebagai suatu sistem operasi tertentu, umtuk mengelabui scanner fingerprint semacam nmap atau xprobe. Sebenarnya honeyd cukup powerfull dan menyediakan fitur yang lengkap, akan tetapi konfigurasinya tidak mudah karena tidak memiliki GUI.

2.2 IDS (Intrussion Detection System) Salah satu masalah keamanan yang cukup signifikan pada jaringan adalah masuknya user dan program ( misalnya : worm, trojan horse, virus ) yang tidak sah sehingga dapat merusak sistem. Untuk itu diperlukan cara untuk menjaga sekuriti sistem. Salah satunya dengan membangun peringatan dini yang disebut deteksi intruksi penyusupan (intrusion detection).

2.2.1 Definisi IDS (Intrution Detection System) [8] adalah sebuah sistem yang melakukan pengawasan terhadap traffic jaringan dan pengawasan terhadap kegiatan-kegiatan yang mencurigakan didalam sebuah sistem jaringan. Jika ditemukan kegiatan-kegiatan yang mencurigakan berhubungan dengan traffic jaringan maka IDS akan memberikan peringatan kepada sistem atau administrator jaringan. Dalam banyak kasus IDS juga merespon terhadap traffic yang tidak normal/ anomali melalui aksi pemblokiran seorang user atau alamat IP (Internet Protocol) sumber dari usaha pengaksesan jaringan.

2.2.2 Arsitektur dan Struktur IDS Sebuah IDS selalu mempunyai sebuah sensor ( mesin analis) yang bertanggung jawab untuk mendeteksi intrusi. Sensor ini terdiri dari mesin pembuat keputusan yang berhubungan dengan intrusi. Sensor-sensor menerima baris data dari 3 sumber informasi utama. IDS memiliki base, syslog and audit trails. Syslog diincludekan dalam sistem, misal konfigurasi pada sistem file, autorisasi user, dsb. Informasi ini menciptakan dasar bagi proses pembuatan keputusan. Sensor bertugas untuk memfilter informasi dan mendiscard data yang tidak relevan dari sekumpulan kejadian yang terhubung dengan sistem terproteksi, misalnya mendeteksi aktivitas-aktivitas yang mencurigakan. Analis menggunakan database yang berisi kebijakan dalam mendeteksi. Di dalamnya terdapat tandatangan penyerang, deskripsi perilaku normal, dan parameter yang penting (misal, nilai ambang batas). Database ini mengatur konfigurasi parameter IDS, termasuk mode komunikasi dengan modul tanggap. Sensor juga mempunyai database yang terdiri atas sejarah dinamis dari intrusi yang komplek.

3. METODE PENELITIAN
3.1 Subyek Penelitian
Subyek penelitian yang akan dibahas pada paper ini adalah “Penerapan Sistem Keamanan Honeypot dan IDS Pada Jaringan Nirkabel (Hotpsot)”. Diharapkan dengan adanya sistem keaman pada jaringan hotspot yang berupa Honeyd dan Snort ini akan mengurangi resiko penyerangan, baik terhadap server maupun user.

3.2 Metode Pengumpulan Data
Metode yang dilakukan bertujuan agar hasil dari penelitian dan analisa lebih terarah serta data yang diperoleh lebih akurat. Adapun beberapa metode yang dilakukan dalam pengumpulan data terdiri dari:

3.2.1 Studi Pustaka
Metode pengumpulan data dengan cara membaca berdasarkan kepustakaan dari buku, jurnal maupun makalah yang mana dimaksudkan untuk mendapatkan konsep teori yang mengenai masalah yang ingin diteliti serta mencari sumber data di internet dan perpustakaan.

4. HASIL DAN PEMBAHASAN
Hasil yang diperoleh adalah berupa file log dari aktifitas penyerang yang telah disimpan oleh Honeyd pada direktori /var/log/honeyd/. Setiap ada akses menuju virtual mesin (server palsu) pada alamat ip 192.168.1.100 -192.168.1.105 akan langsung tercatat di file log. Setiap aktifitas yang melakukan penyerangan terhadap hotspot terutama pada server palsu akan terekam oleh Honeyd sesuai dengan jenis server palsu tersebut.
Proses Honeyd dan Farpd dalam mengemulsikan server-server palsu dna jenis layanan yang diberikannya serta isi dari file log yang dihasilkan akan diuraikan pada subbab berikut ini. Tidak ketinggalan juga bentuk service yang bekerja mirip dengan service aslinya.

4.1 Akses Hotspot
Akses hotspot yang dikonfigurasi pada hotspot ini bersifat gratis sehingga setiap user atau penyerang dapat terkoneksi langsung dengan hotspot tanpa ada otentikasi seperti username ataupun password. Karena yang menjadi tujuan utama penelitian ini adalah pada honeypot dan ids sehingga sistem otentikasi tidak digunakan ataupun sistem mac filtering tetapi paling baik sistem tersebut dipakai pada hotspot demi keamanan hotspot. Bagi user ataupun penyerang disediakan alamat ip 192.168.1.10 samapai dengan 192.168.1.29. Karena alokasi alamat ip sudah di buat dhcp pada server yang bersifat dinamis.

4.2 Prinsip kerja Honeyd
Honeyd bekerja saat menerima probe atau koneksi untuk sebuah atau beberapa server palsu dimana server tersebut tercover dalam konfigurasi Honeyd. Setelah mengidentifikasikan dirinya sebagai server palsu yang bisa menjadi korban bagi penyerang, Honeyd mulai berinteraksi dengan penyerang. Setelah penyerang puas menyerang server palsu dan koneksi terputus, service dari server palsu tak langsung terhenti. Honeyd akan menunggu koneksi yang lain. Honeyd mampu berinteraksi dengan banyak penyerang sekaligus mengemulasikan service dari server palsu pada saat yang bersamaan.
Honeyd memerlukan bantuan ARP spoofing yang biasanya disediakan oleh service dari arpd atau farpd pada ubuntu 10.04. ARP spoofing(penyamaran) terjadi pada saat alamat ip dari user yang tidak ada (alamat ip yang tidak terpakai) di bound (diklaim) ke mac address dari server honeypot berada. Hasilnya paket data pun terkirim ke honeypot.

5. SIMPULAN
Berdasarkan pengujian dan analisis data yang telah dilakukan terhadap penelitian Honeypot dan Snort sebagai monitor penyerang terhadap jaringan nirkabel hotpsot maka dapat disimpulkan :
1. Honeypot merupakan sebuah sistem atau komputer server yang sengaja dikorbankan untuk menjadi target serangan bagi penyerang, yang melayani setiap penyerangan yang dilakukan oleh penyerang dalam setiap penetrasi terhadap server utama tersebut dengan menipu atau memberikan data palsu apabila ada yang orang dengan maksud tidak baik ketika ia masuk kesuatu sistem atau server utama. Jadi Honeypot seolah-olah menjadi system yang berhasil disusupi oleh penyerang tidak masuk ke sistem sebenarnya, tetapi malah masuk kesistem yang palsu.
2. Implementasi Honeypot Honeyd pada jaringan nirkabel hotspot yang sangat berkembang pesat saat ini akan memberikan tambahan kesulitan kepada penyerang yang mencoba melakukan penyerangan.
3. Honeypot akan merekam aktivitas dari penyerang yang melakukan penyerangan terhadap server-server palsu yang memberikan layanan mirip dengan layanan mirip dengan server utama dalam bentuk file log.
4. Snort memberikan rekaman trafik yang janggal atau mencurigakan ke server dalam bentuk file log atau alert.
5. Kombinasi antara Honeypot dan IDS dengan Honeyd dan Snort ini memberikan sebuah sistem keamanan berlapis dengan menipu dan mendeteksi serangan yang ditujukan ke jaringan hotspot.

6. DAFTAR PUSTAKA
[1] Mulyana, Edi S., SSI. 2005. Pengenalan Protokol Jaringan Wireless Komputer. Yogyakarta: Andi.
[2] Pangera, Ali Abbas. 2008. Menjadi Admin Jaringan Nirkabel. Yogyakarta: Andi.
[3] Provos, Niels. Holz, Thorsten. 2007. Virtual Honeypot:From Botner racking to Intrussion Detection. Boston: Addison Wesley Professional.
[4] Purbo, Onno W. 2006. Buku Pegangan Internet Wireless dan Hotspot. Jakarta: PT. Elex Media Komputindo.

Similar Documents

Free Essay

Paper

...A Guide for Writing a Technical Research Paper Libby Shoop Macalester College, Mathematics and Computer Science Department 1 Introduction This document provides you with some tips and some resources to help you write a technical research paper, such as you might write for your required capstone project paper. First, congratulations are in order– you are embarking on an activity that is going to change the way you think and add to the overall body of human knowledge. The skill of gathering information, deciding what is important, and writing about it for someone else is extremely valuable and will stay with you for the rest of your life. Because we humans have been doing this for quite some time, we have some reasonably standard forms for technical research papers, which you should use for your capstone. You should do this because your paper will better understood by readers who are familiar with this form. Before you can begin writing your paper, you need to have a sense for what research entails, so I’ll start there. Then I will give you some tips about writing, including connecting with your readers, defining your topic, the format of your paper, and how to include references from the literature. I am a computer scientist, so be aware that parts of this paper are biased toward my discipline. 2 What is Research? A short definition of research, as given by Booth, Colomb, and Williams (Booth et al., 1995) is “gathering the information you need to......

Words: 3479 - Pages: 14

Free Essay

Paper

...are often used interchangeably to describe work which previously was done with paper, but which now has been adapted to information & communication technology (ICT) devices and software. The Information Technology Association of America (ITAA) has defined information technology (IT) in the electronic era as "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware." IT entails processes involving the use of computers and software to create, convert, store, process, transmit, and retrieve information securely. The term has recently been broadened to ICT (Information and Communications Technology), so as to include the idea of electronic communication. To be paperless means essentially that the traditional paper-based practices-such as writing, note taking, reading, editing, communicating, and even drawing-are instead performed electronically with ICT devices and software. Much has been said and written about the paperless office in recent years, and the rapid development of ICT is enabling an increasing number of paperless practices. The relationship between paperless work styles and ICT is intimate and interdependent; a paperless work and lifestyle cannot be implemented without ICT, and the use of ICT should naturally lead to becoming paperless. Paradoxically, however, the consumption of paper has increased exponentially since the advent of personal...

Words: 2014 - Pages: 9

Free Essay

Paper

...TRAINING: •To know about the company’s management and functions of various departments. •To know how the company is working and the types of financial transactions it deals with. Tamil Nadu Newsprint and Papers Limited (TNPL) were formed by the Government of Tamil Nadu in April 1979 as a Public Limited Company under the provisions of the Companies Act, 1956. The primary objective of the company is to produce newsprint and printing & writing paper using bagasse, a sugarcane residue, as the primary raw material. The company is in the business of manufacturing and marketing of Newsprint and Printing & Writing Papers. The products are being marketed throughout the country and also being exported to 20 countries around the world. The factory is situated at Kagithapuram in Karur District of Tamil Nadu. The initial capacity of the plant was 90,000 tpa of Newsprint and Printing & Writing paper which commenced production in the year 1984. The Company was incorporated on 16th April, with a capacity of manufacture 50,000 tpa. Of newsprint, and 40,000 tpa of printing and writing paper. It was promoted by the Government of Tamil Nadu for the manufacture of Newsprint and Printing and Writing Papers using bagasse as the primary raw material. It manufactures newsprint, writing and printing paper. TNPL has obtained the ISO 9001-2000 certification from RWTUV of...

Words: 310 - Pages: 2

Premium Essay

Papers

...Learning Letter To be honest I’ve never been an excellent writer. When it comes to writing a paper for high school classes, scholarships, and basically everything else I’ve always had trouble with starting my paper and figuring out what to write about my topic. However, choosing a topic has never been a problem for me because I’m passionate about many different things. Whenever I would write a paper in high school I usually wouldn’t spend much time on it because of a couple different reasons, either the teacher chose a topic for me and I simply wasn’t very interested, and also because of procrastination. I believe this class will help me become interested in writing which will motivate me to do the work. As a person I’ve always been more of a reader than a writer. I started reading fantasies like the Lord of the Rings novels at a young age. During my freshmen year of high school I was introduced to writers and poets like Charles Bukowski, Allen Ginsberg, and Hunter S Thompson, and I’ve been reading similar works ever since. One thing that I’ve always wanted to do with writing is being able to write poetry similar to Bukowski. I’m hoping this class can help with that. Even though this class is obviously required to take I’m excited to be in it so I can improve on the things that I struggle with in writing. By the end of this quarter I want to be able to choose a topic, start the paper with ease, and also be able to generate ideas about the topic easily. I’m excited to see......

Words: 291 - Pages: 2

Free Essay

Paper

...Peer review for Zunwang Liu’s Draft By Guanyi Pan Summary: -the author analyzed the EJBR, and talk about its characteristics such as the length of the article, design of each journal, the audience of the journal, the tones of the articles and so on. Then she perorates that EBR is a example of text that can help us to learn the characteristic of discourse community with readers of JEBR actively share goals and communicate with others to pursue goals. Major point: Observation: the main point of the introduction is unclear. The analyzing parts in the paper is OK. The whole paper is talking about the EJBR. But it is hard to find a conclusion about them. 2. Do not have page number. 3. Observation: lack of the purpose of analyzing Location: page:page 2 Suggestion: After analyzing the length and other formats of EJBR, the author does not give a conclusion of them. So I am confused about why she wrote this, and what is the purpose of it. 4.Observation: unclear object Location: page 3 Suggestion: When the author talks about the audience of the journal, she only wrote “expert members”. I think she should point out what kind of the experts they are. 5. Observation: Need more examples in details. Location: page 5 Suggestion: I think there should be some examples to define about the gatekeeping of this journal. Minor Point: 1.There are some grammar problems and most of them have been corrected by last peer viewer. 2. The in-text citation format is not total correct. 3....

Words: 262 - Pages: 2

Premium Essay

Papers

...match the genre of the writing that the position would involve. For example, if you are applying for journalism positions, submit “clips”—actual articles that have been published in a campus newspaper, blog, or other publication. For a research position, submit an in-depth analysis of an issue or a topic. For a PR position, submit a press release that you have written from a previous internship or as the marketing chair of a campus group. If you don’t have any, you can write a press release for an upcoming event (just make sure you specify that it has not been published). Submit your best writing. If you are deciding between two papers you have written, and one is better written than the other but your weaker paper is topically more relevant, then choose the paper that is better written to submit. The other option is to rewrite the relevant paper to be stronger before you submit it. Remember, it’s your writing skills that the employer is assessing, and being topically relevant is just an added bonus. Provide excerpts if your samples are long. Most employers will specify how many pages...

Words: 475 - Pages: 2

Premium Essay

Paper

...and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop your cheating and write your paper. Stop......

Words: 596 - Pages: 3

Free Essay

Paper

...free account Copy & PaCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste Your PaperCopy & Paste...

Words: 419 - Pages: 2

Free Essay

Paper

...students will reflect on what they are thankful for, and visually present it by creating a placemat to use on their Thanksgiving table. Materials Pencil Paper Construction paper with leaves Construction paper with lines Large construction paper in various colors Glue Scissors Butcher paper Procedure: Beginning Teacher will instruct students to write a list of things they are thankful for. Once the list is written, the students will be handed a sheet of construction paper with the outlines of four different shapes of leaves on it. The students will cut out the leaves, and choose four things they are thankful for to copy down onto the leaves. Middle Once the leaves are finished, the students will be given three more sheets of construction paper; one large sheet, and two with lines on it to cut into strips. Students will be instructed to fold the long sheet in half, and cut from the fold to one inch away from the edge. The teacher will model this so there are few errors. Students will cut the other sheets of paper into strips along the drawn lines. Students will weave the strips of paper into the large sheet of paper, creating a placemat Once all strips are woven in, the students will glue the four leaves with what they are thankful for on them. End The students will place their placemats on a sheet of butcher paper in the back of the room to dry Once all students have finished, teacher will lead a discussion with the students to talk about what they are......

Words: 620 - Pages: 3

Premium Essay

Paper

...‘ My Reflection Letter” I feel like my writing has come along way however this class has given Me the opportunity to see that I need a lot of improvement in my grammar. But it as help me learn to take better notes while reading .I feel that I have learned a lot thus far in English- 090. However in the past, I have always felt afraid to express myself when writing. This I know is a very important aspect of composing and have been very critical of myself. I have always expected to strive to do my best . I put effort and thought into each assignment. However writing the first paper that was given , It really helped me to understand that most people don’t get it right their first try. Initially I would approach it as preparing my writing down note. Next, I proof read my work and correct the grammar and punctuation. Often, I will have someone read it for composition and clarification of my sentences. Finally, I would prepare my final copy. I have felt so much less pressure knowing that my writings don’t have to be perfect the first time. This is why I really like how you give us the opportunity to revise our essays as many times as we need to get them to our satisfaction. I know that I’m never content Often it reaches the point when I get frustrated and think, “Okay, I need to stop stressing over this. My biggest Road blocks does not allow me to think of ideas fast enough. As writing, one thing I really need to work on is organizing my thoughts...

Words: 421 - Pages: 2

Free Essay

The Paper

...This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read This essay is a great essay that we get to read......

Words: 759 - Pages: 4

Premium Essay

Call for Papers

...Technology(IJAET) ISSN 2231-1963 CALL FOR PAPER IJAET is a carefully refereed international publication. Contributions of high technical merit are to span the breadth of Engineering disciplines; covering the main areas of engineering and advances in technology. IJAET publishes contributions under Regular papers, Invited review papers, Short communications, Technical notes, and Letters to the editor. Book reviews, reports of and/or call for papers of conferences, symposia and meetings could also be published in this Journal Author Benefits : • • • • • • Rapid publication Index Factors and Global education Index Ranking Inclusion in all major bibliographic databases Quality and high standards of peer review High visibility and promotion of your articles Access of publications in this journal is free of charge. PUBLICATION CHARGES: A small publication fee of INR3500 upto 10 pages is charged for Indian author and for foreign author is USD 100 upto 10 pages for every accepted manuscript to be published in this journal. All the transaction Charges will be paid by Author (Inter Banking Charges, draft). Submission Guidelines: Guidelines Authors are kindly invited to submit their full text papers including conclusions, results, tables, figures and references. • The text paper must be according to IJAET Paper format and paper format can download from our website (www.ijaet.org).The Full text papers will be accepted in only .doc format. • The papers are sent to......

Words: 367 - Pages: 2

Premium Essay

The Effect of Papers

...This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is a paper. This is......

Words: 441 - Pages: 2

Premium Essay

Paper Brigguetes

...How to Make Charcoal from Paper By Karren Doll Tolliver, eHow Contributor Homemade paper charcoal briquettes can be used in backyard grills.  Commercial charcoal for grilling food is expensive and can be harmful to the environment. However, industrious do-it-yourselves can make their own "charcoal" from newspaper. This reduces the amount of newspaper refuse as well as the amount of commercial charcoal consumed. In addition, no lighter fluid is needed with the homemade charcoal paper. Therefore, petroleum-based products are also conserved. Making your own charcoal takes only water and a washtub. The time spent forming the charcoal paper briquettes is negligible, although they need to dry for a couple of days in the sun. Things You'll Need • Washtub • Water • Old newspaper Instructions 1 Tear the old newspaper into pieces about the size of your hand or smaller. 2 Place all the torn newspaper pieces in the washtub. Cover with water and let sit for at least one hour. The newspaper will be ready when it is thoroughly saturated with water and is mushy to the touch. 3 Grab a large handful of the mushy newspaper. Form it into a ball about the size of a golf ball or ping pong ball, squeezing out as much water as you can. Repeat until all the mushy newspaper is in ball form. Discard the water. 4 Place the wet newspaper balls in the sun for at least two days. Do not let them get rained on. They must be completely dry and brittle. At this point they are ready for use in the......

Words: 1319 - Pages: 6

Free Essay

Analysis Paper

...ANALYSIS PAPERS INSTRUCTIONS You are required to complete 3 separate analysis papers over the selected topics. Each paper must be 3–5 pages in length not including the title page, abstract page, and reference page. Each paper must be supported by at least 3 scholarly sources cited in current APA format. You will use references from both textbooks and outside peer-reviewed sources. The peer-reviewed sources must be chosen from PsycArticles or a similar search format from the Liberty University Online Library. Please consult the Analysis Papers Grading Rubric for this assignment. Analysis Paper 1 Consider yourself within the context of the “ecological model” and discuss how this model has influenced your own development. You will recall from your reading of McWhirter et al. that development is the result of “interconnected and embedded ecological systems”. Refer to Bronfenbrenner’s “ecological model” and the “at-risk tree” to complete your discussion. You will use your textbook and the Clinton et al. text as your references in addition to 2 other scholarly sources. Submit this assignment by 11:59 p.m. (ET) on Sunday of Module/Week 2. Analysis Paper 2 Manuel is a 15-year-old “at-risk” adolescent, with whom you have been working at your practicum site. One day when you are talking with him, he reports that he is extremely depressed and just doesn’t care about living anymore. List 4 of the “Legal Do’s and Don’ts” outlined in the text that you will want to consider when...

Words: 455 - Pages: 2