Monday, December 30, 2019

Human Rights And Public Administration Essay - 939 Words

Abstract This paper will offer insight on human rights and the part it plays in public administration. In addition, this paper will look at the potential ramifications that human rights writing may have for public administrators. Human Rights Reflection Paper Human rights and its role in public administration go hand in hand. I will offer reflection of human rights and its role in public administration. I will also examine the potential implications that human rights literature might have for public administrators. This paper will include the following: A detailed and objective description of the human rights issues presented in this week’s readings; an explanation of the nature of the issue(s) and its significance to me as a public administrator; an explanation of what the readings meant to me in the context of my feelings, values, knowledge, and experience; an explanation of the implications these readings might have for public administrators and a summary of what I learned about myself as a public administrator based on my reaction to the readings. Description of Human Rights Issues Presented in This Week’s Readings The current week s readings offer much understanding on the subject of human rights. In the article composed by Summer B. Twiss, she analyzes the commitments that international human rights groups can make to the framework of a for all intents and purposes powerful worldwide ethic, particularly in light of progressing worries about varying topics withinShow MoreRelatedHuman Rights And Public Administration Essay955 Words   |  4 Pageswill offer insight on human rights and the part it plays in public administration. In addition, this paper will look at the potential ramifications that human rights writing may have for public administrators. Human Rights Reflection Paper Human rights and its role in public administration go hand in hand. I will offer reflection of human rights and its role in public administration. I will also examine the potential implications that human rights literature might have for public administrators. ThisRead MoreThe Environment Where Public Administration Is Being Implemented1490 Words   |  6 PagesThe purpose of this paper is to demonstrate how challenging the environment where public administration is being implemented can be in countries that are just developing. The importance of governments and public administrators in these countries is high. They play a very important role when it comes to sustaining new development and maintain economic growth. The main roles of a government are to protect the environment, reduce socio-economic inequality, combat poverty, and support both social andRead MorePublic Administration and Ethics Essay677 Words   |  3 PagesPublic Administration amp; Ethics In public administration, decisions are a lot of times made based upon ethical principles, which are the perception of what the general public would agree is correct. This helps keep the administrators ethical because they first must ask themselves if they will be under public scrutiny if they don’t make an ethical decision. Ethics has also placed additional burden on public administrators regarding how they handle their personal lives. When a person entersRead MorePublic Policy Vs. Administration863 Words   |  4 PagesPublic Policy and Administration is an interesting and important knowledge for all people. Every one on this earth, regardless of his profession, hobbies, or religious views, faces these concepts. This paper is going to describe the concepts of public policy and administration and an importance of this area for effective and efficient management. A public policy is an activity that has a good combination between politics and administrative activities. The major goal of public administration areRead More How Does the Public Sector Work? Essay1683 Words   |  7 PagesIf you dont understand how the public sector is supposed to work, how can you ensure that it is working? An easy definition of public administration is, â€Å"the implementation of government policies† (Encyclopedia Britannica, 2010), or, â€Å"the implementation of public policy† (Infoplease.com, 1997). While policies and procedures seem to be continuously up for debate, it should be noted that, an informed public are the only sure-fire way to ensure that the public sector stays on track with meeting theRead MorePublic Administration : An Image Problem1432 Words   |  6 PagesPublic administration often suffers from an image problem. Society has constructed a caricature of stuffy bureaucrats who are only concerned with restrictive and complicat ed procedures just waiting to obstruct efficient government, however, this caricature couldn’t be further removed from the reality of the work of public administration and administrators. While public administration has it’s roots in the early twentieth century as a rather droll academic pursuit it has evolved through the decadesRead MoreSpencer Hogue. February 27, 2017. Instructor: Mrs. Nutter.1584 Words   |  7 Pageswaterboarded. What you just experienced was one of many common interrogation techniques used to pry information from suspected terrorists at Guantanamo Bay naval base. These techniques, while a violation of the U.S. Constitution’s unalienable human rights and of international treaties on the treatment of prisoners, were used with justification laid in war time measures. This war that the United States was fighting was known as the War on Terror, defined as, â€Å"The ongoing campaign by the United StatesRead MorePublic Sector Organizational Theory ( Postmodernism )1630 Words   |  7 PagesPublic Sector Organizational Theory Introduction This essay compares and contrasts the â€Å"Classical† and â€Å"Human Relations† approaches to management. It focuses on how these approaches are similar and compatible and looks at their differences and incompatibilities. It then explores how systems theory and contingency theory can reconcile the incompatibilities between the approaches. The question of authority in public administration has historically been a tacit one framed in terms of the public administrationRead MoreThe Normative Foundations Of Public Service Ethics832 Words   |  4 PagesThe Normative Foundations of Public Service Ethics Introduction Those thought to be ethical or moral are described in terms of their values in regards to honesty, integrity and good character. Our ethical conduct originates from our values which are greatly influenced by our morals; they provide guidance and are our standard for the ways in which we carry out and view right and wrong decisions. For these reasons, personal ethics are said to be our foundation and, as such, often influence how we administerRead MoreThe Rights Of The United States1356 Words   |  6 PagesHuman rights are inherent to being human and essentially a right obtained by any being born in the world. These rights do not discriminate whether one was born in the United States or in Mexico. Essentially, they are what it means to be a human being, not if you are a citizen to a specific country. Lawful permanent residents of the United States prior to 1996 were eligible for public benefits programs suck as the Food Stamp Program, Medicaid, Supplemental Security Income (SSI), and Temporary Assistance

Sunday, December 22, 2019

The Psychology Behind the Film Primal Fear by Gary a...

Prepare yourself for a journey. Travel with me, as we explore the mind of a character named Roy played by Edward Norton in the film directed by Gregory Hoblit in 1996 Titled â€Å"Primal Fear†. In this film Roy suffers from a psychological disorder. As we travel on this journey deep into the mind of this character, we will begin to unlock the secrets that lay within. Discovering what psychological disorder Roy suffers from, how he thinks and his thought process from a bio-psychological perspective, and treatments for this disorder using cognitive behavior therapy. â€Å"Primal Fear† is the story of a young man who is accused of the murder of an archbishop. With all the evidence pointing towards him as the target suspect, an ambitious and vagarious†¦show more content†¦That clue lead me to the conclusion that Roy suffered from dissociative identity disorder (DID) formally known as multiple personality disorder (MPD). From a bio-psychological perspective dissociative identity disorder is characterized by the presence of two or more distinct or split identities or personality states that continually have power over the persons behavior. With dissociative identity disorder, theres also an inability to recall key personal information that is too far-reaching to be explained as mere forgetfulness; which we noticed in Aaron right before he transforms into Roy. With dissociative identity disorder, there are also highly distinct memory variations, which fluctuate with the persons split personality. The alters or different identities have their own age, sex, or race. Each has his or her own postures, gestures, and distinct way of talking. Roy and Aaron were completely opposite in almost every way imaginable. Roy spoke with confidence and authority whereas Aaron was unsure of himself and lacked confidence. While Roy took charge and became violent, Aaron on the other hand was passive and submissive and wou ld not hurt a fly. Sometimes the Alters are imaginary people; sometimes they are animals. As each personality reveals itself and controls the individuals behavior and thoughts, its called switching. Switching can take seconds to minutes to days. Along with the dissociation and

Saturday, December 14, 2019

The image of the ideal wife in early modern Venice in art and text Free Essays

1. The image of the ideal wife in early modern Venice in art and text. The Republic of Venice otherwise known as La Serenissima had a reputation for its security and political unity. We will write a custom essay sample on The image of the ideal wife in early modern Venice in art and text or any similar topic only for you Order Now It had a reputation for its ‘unsullied liberty, unwavering religiousity, social harmony and unfailingly peaceful intentions. ‘1 Art was used throughout the city to show and teach social and political virtues and expectations, according to Muir ‘artistic patronage became an arm of government. In consideration of this it was also a way of social propaganda, as high ranking members of the scuolas including the Dukes and Doges could depict them selves performing virtuous acts, thus promoting their reputation in the eyes of the republic. Venetian art depicting women at home gave a portrayal of what was expected from women in a domestic environment, and by their husbands. There was a strong family ethic within Venice promoting civic unity and strength, which was paramount in the running of the state. The images were all made how society expected the wife to be and what stereotypes were imposed upon women. All images of women were depicted through the eyes of men, and how they wished for others to perceive their household. Women were expected to provide their husbands with an heir to the household, their only other material contribution being a dowry which would add to the prestige and worth of the family name. Virtues such as faith, chastity and fecundity were required of a woman to contribute to the success of a household. A good wife would add to the familial reputation and allow for a higher social status for the man. If one originated from a good household he was a more stable member of the Venetian community which prided itself on unity and regulation. As the women were an essential component to the running of the household and domesticity there were often confined to running of a successful household. Wider more worldly concerns of the running of the republic were left to the patriarchal ruling of the state, as the women had absolutely no political power. Within the household women were separated from the men within the living space. Venetian writers advised that the mistress of the household should have their room separate from their husbands, but linked, and placed furthest away from the entrance of the household. 2 The domestic spaces of women and men were extremely separate. ‘The male servants never go into the women’s apartments when they do not know for certain if there are daughters or marriageable damsels in the house, and likewise the young female servants do not appear, or do so rarely, in the apartments of their masters but they serve in the apartments of their mistresses†¦ and they go there through very secret staircases. Two ladies on a Terrace by Vittore Carpaccio (ca. 1500) is a demonstration of the literal differences in the spaces between men and women. The painting is divided into two halves, both gendered by traditional symbology. It is an allegorical representation of women and virtue as they are surrounded by symbols that support that. Two dogs represent fidelity; a peacock wanders through the painting showing the virtues of redemption, vanity and purity. The women represented are of a high social status as they are shown in the fashions of the time of women of a high social ranking. A Venetian bride is identifiable by her pearl necklace, and could possible be seen as the mother of the young boy in the picture. The allegorical symbols that surround her show what would be expected of her in marriage. The metaphorical representation of the separation of the two highly gendered worlds of the men and women lies in the inclusion of the balcony in the scene. Various symbols are placed on this division connecting the two worlds. Two turtle doves perched on the balcony show how the relationships between the men and women are linked by love and a union of two halves. The vases containing lilies and myrtle also act as symbols of purity and marriage. A little boy climbing between the gaps in the balcony shows a transition and connection between the two halves of the painting. Children up to a certain age were placed in the care of their mothers and the female servants, as the woman were expected to fulfil the role of nurturing the child. However, the little boy is growing up and obviously on the path to adulthood as he moves across to the world of men. In contrast to the domestic scene of the two women on the balcony, the men are out doors, in the background hunting a juxtaposition of the two worlds. This supports what Scamozzi was saying about the expectation of the women to stay in doors within the domestic space maintaining the household, and being in charge of the upbringing of the children. Piero della Francesca painted portraits of his patron Federigo da Montefeltro Duke of Urbino and his wife Battista Sforza (c. 1470). The subjects of the paintings are placed in such a way that they are facing each other, showing their faces in profile allowing us to see their costume. The couple are in traditional Venetian dress, showing their prestige and social status. His wife is shown in the fashion with her string of pearls and elaborate headdress, and he in the expensive clothes of a duke. The portrait of Sfora Battista demonstrates how a wife who had fulfilled her duties, with all of the virtues of ‘Two Ladies on a Terrace,’ is honoured. Sfora Battista was married to the Duke of Urbino in 1460 at the young age of thirteen. After bearing him six daughters she died shortly after the birth of their first son and heir in 1472 at the age of 25. The portrait is therefore a posthumous portrait, allegedly based on her death masks or perhaps a previous portrait. 4 She was a good wife and fulfilled all of her duties sometimes acting as regent when the Duke was away. She was a pious woman and the portrait was painted in her honour. There are various aspects of the works that support this. She is placed on the dexter side5, however there is a claim that Federigo de Montefeltro had a facial deformity on the right hand side of his face, and was therefore always painted showing his best side. Apart from this, there are other aspects of the portrait that are Sfora Battista’s favour. According to what was considered fashionable at the time her skin was very pale with hardly any shadowing. The pale sky is tonally very similar and brings out the pale colouring of her skin, emphasising its purity and clarity. In contrast to smooth texture of her skin the folds of the white cloth at the back of her head and the pearls hanging from her neck and the rest of her accessories are very detailed. The fact that our attention is drawn to her jewellery and clothing make us focus on her high ranking and social status. The two paintings come as a pair, however are linked and made whole by the contiguous background, and the matching triumphs painted on the other side. The backgrounds are subtly gendered in their content. Behind the woman there are small images of households. Behind her husband images of boats, similar to the background of Carpaccio’s painting, showing more male activities. The honouring of his wife continues on into the thematic content of the Trionfi, which was painted in order to celebrate the virtues of a couple. Allegorical representations show Sfora Battista as a chaste woman, as her chariot is pulled by unicorns,6 and she is accompanied by the virtuous figures of Charity, Hope and Faith, who sit at the front of the carriage. Chastity and modesty stand behind Sfora at the back. She is surrounded by all of the virtues required in a perfect wife. Federigo is also shown wearing armour, surrounded by virtues that would show his status as a great ruler. However, as much as he is shown as a great ruler it is obviously the importance of his wife that adds to his success, as the two portraits are equal in content and importance of the subjects. Veronese’s depiction of the mistress Guistinia Guistiniani Lady of the Barbaro Villa is a further celebration of a good Venetian wife. With a dowry of ten thousand duckets she brought fortune and a good name, and bore her husband four sons. Marcantonio Barbaro worked in conjunction with the architect Palladio, and the artist Veronese in creating the villa in Maser, with an ‘interdependance of themes that refer metaphorically to family, State and Church. These themes were mainly expressed through the artistry of Veronese’s frescoes that are featured through out the villa. Symbols of eternity and the elements which are featured in other frescoes of the household contribute to an allegory of Love throughout the household. A collegue of Marcantonio Barbaro, Bendetto Varchi, speaks of the importance of love in a household: ‘Love still binds with firm friendships the villas and cities; it governs the marital knot and deticates its laws to faithful friends where all good resides. ‘ The goddess of Love herself surrounded by the other Olympian gods looks down on the mistress of the household Guistiniana and her son, who looks out to greet visitors into the house, reiterating her power in the household. An allegorical symbol of fecundity is above her reminding us of her fulfilled duty as a wife by providing a son and heir to her husband. Her status as a mother as well as mistress of the household is repeated and emphasised by the fact that one of her children is standing on one side of her and one of her servants on the other. An empty space in the group suggests the absence of Marcantonio Barbaro as the master of the household. The boy is separated from the two women in the image indicating a social gender difference, similar to that of Carpaccio’s ‘Two Ladies on a Balcony’. Although he is tied to his mother at the moment in time, due to his young age, in time he will have to separate and become an absent influence, moving from the domestic world of his mother in the villa, to the outside world of men. In the interior world of the Villa Barbaro Guistiniana is clearly in control as she is placed high, like the gods depicted in the fresco, giving her a divine authority over the household, and the realm of her visitors below her. The iconography that surrounds the mistress of the household from her divine positioning ‘alludes†¦ to terrestrial love and concord, expressed in the nuptial rites of men and more particularly in Marcantonio’s marriage to Giustiniana. ‘9 According to Reist a depiction of Juno, Hymenaeus, and Venus could be seen as a representation of a matrimonial scene along with the father of the bride. Other scenes also refer to the success of the household, with allegorical representations referring to the Villas wine production. The symbolism all refers to the gods and cosmos placing their blessings upon the villa Barbaro its wealth, and the fruitful union of Guistiniana and Marcantonio. The Miracle of the Speaking Infant by Titian shows a wife depicted in a negative attitude. The image depicts a Venetian noble woman unfairly accused by her husband of adultery – a unforgivable sin to be committed by a woman, as they were expected to be pious and loyal. During the time women who committed adultery could be deprived of their dowries,10 and the disapproval of her community, thus depriving her of her means to survive socially and financially. According to Venetian law the offence could be punishable by death, the woman’s honour only being salvageable by her family, or kin, as it was their reputation that was effectively being tarnished by their association with the woman. Finally the child born of this situation was considered the lowest of all society, a mere bastard ‘contaminating the lineage. ‘ According to the myth, St Anthony asks the child who his father is. By a miracle the child responds by pointingg out his father in the crowd thus saving his mother from a terrible fate. The scene could be seen as an attempt to put women in a better light, as she has been wrongly accused, supported by no one apart from her child. In reality she is a good and faithful wife, and should be loved and honoured by her husband accordingly. Visually we are made to sympathise with the woman, as her side of the story as a victim is portrayed to us first, as the painting is read from right to left. The woman is depicted with two other women, one holding her own child so that she can directly be compared to the woman who is having her child taken away from her, making us more sympathetic to her case. Titian is effectively campaigning for the necessity of the mother in the family life, as the painting is ultimately in support of the accused wife. Women in Venice were an essential part in the running of the household and family life. Good wives were celebrated for their virtues, which were specifically expressed in portraits and representations of domestic scenes. Veronese shows a wife being honoured for her contribution to the family name, whereas Titian shows a wife disgraced for not performing her familial duties. However in both cases the importance of the women in the nurture and domestic environment is demonstrated in both images. Masters of the household who had wives that would effectively add to the prestige of their family ranking and lineage honoured their wives through their portraiture, thus making eternal the contribution and importance they had to the family. How to cite The image of the ideal wife in early modern Venice in art and text, Papers

Friday, December 6, 2019

Various Server Applications Various Services-Myassignmenthelp.Com

Question: Discuss About The Various Server Applications Various Services? Answer: Introducation Cloud computing refers to the computing of a process or basically a software which helps to gain access over various computer related resources like computer network, storage, various server, applications and various services. It is done with the help of internet. Many companies have tried cloud services for continuing their business. Cloud computing is beneficial many ways [1]. The benefits depend on the size of the business, the sector of the business and the strategic goals of the business. The possible benefits that the company S-mart can get using cloud computing are: Low of cost: The process of service on demand or demand when required has helped business to invest on the model based on operational expenditure. Cloud computing has helped in lowering the investments on servers, licenses and softwares. Cloud computing helps a lot in reducing the cost as there is no longer any need of purchasing an own datacenter or keeping an IT team for the maintenance of the data server [2]. Someone having an MSP no longer needs to pay the bills for traveling from one location to another and saves finance time required to travel. S-mart can have huge profits and the annul expenditure of the company decreases. Easy to upgrade and easy maintenance: Allocation of IT professionals for some other works as the cloud provides the server, softwares and network. Each cloud provider has their own IT experts who are solely responsible for the services they provide. The cloud vendors provide the upgraded forms of service, which saves both Time and money [3]. Every time a cloud service provider invests in a new solution it is made available to the cloud user helping them to use the most advanced tools and applications with no extra cost of buying those tools or applications. As the company has a large amount of data and large customer base so it becomes necessary for the company to upgrade its technology used for storing and compiling of data. Therefore, cloud technology provides the company with many benefits by providing it with upgraded technologies. Accessible from any location and from any device: Services provided by the cloud is accessible almost from any location. Users are able to access the important files, data, documents and IT tools from any device having an access to internet [3]. Moreover, clouds provide the required bandwidth making it possible to work online and replicating the office environment thereby helping the employees work more productively. As S-mart has many product lines, it becomes difficult to access the data of those product lines. Cloud services can help in accessing data of different locations siting at one place. Continuation of business: Cloud helps in remote working. During disaster the working procedure of a business continues. During times of natural calamity (rain, flood, show fall) or in cases of theft and technology people have an option of working from different locations even if they are unable to reach the office [4]. Users can simply login to access their work desktop and continue their work, as they would have done in their normal working days. Users can access the files, documents and data present in the cloud provided the users have necessary access codes. Security: Previously the security issues in cloud computing were weak but as technology has made advancements the security related to cloud computing has also increased. There is a saying that cloud computing improves the companies defense. Cloud service providers invest a lot in improving securing their data infrastructure to protect the customers data [5]. Cloud service providers invest in improving the security more and more if they earn profits from the users. S-mart has many data related to customers and their purchases so it becomes important for them to protect the data of the customers. Cloud services provides lot of security measures so the company can use all the security measures to save the data from any types of threats. Risks regarding cloud computing: Theft or Loss of property: Businesses are relying more in storing of data in the clouds. When there is a breach in the cloud or in case of any cyber-attack, the sensitive data in the cloud are accessed [4]. Breach in the services terms and policy may occur. The data if lost will greatly affect the business of the company S-mart Compliance in regulation: The users know that their data are stored in the services providers cloud but still the user is accountable to its customers for any security and integrity issue that affect the users data [4]. The user must know the standard and procedures that they are provided with to mitigate the risks. Location where the data is stored, who can access the data and protection level of the data: A user must know the location of their stored data and the privacy and security laws, which apply to it. Doing this is necessary, as there is a risk of marginalization of the rights of the user [1]. When a user does not have adequate legal protections then the user is liable for any type of security breach. This means unless and until the provider gives in writing then it is not liable for any type of security breach. Privacy and Security of the data: There is always a risk of breach in privacy of the user. Uploading of data to the cloud means trusting on the providers security system. A user must ask the service provider about who has access to the users sensitive data and the physical and logical security [1], which the provider is using to protect the data. Availability of data and continuity of business: Cloud services depends totally on the internet connection. This leads to a risk of poor service by the provider and problems in accessing of the cloud services by the user [5]. This threatens the continuity of business. Loss of data and recovery: Data loss might occur during a time of disaster or in cases of breach. The recovery process totally depends on the capabilities of the service provider. Therefore, the user must know the capabilities of the provider and if the recovery system of the provider is tested or not. In case of any threat or disaster the company might lose the valuable data of the customers. marketing of data can cause difficulties in contacting the customers as the weekly basis data is used by the company for informing the customers and staffs. Keeping records of old data: Whenever a data is stored into the cloud, new data replaces the old data [5]. When the user wants to access the old data then it might become difficult for the user to get the data back. Before storing, any data in the cloud user must talk with their service provider about the retention of the previous data. As there is regular uploading of new data by the company so there is a risk of losing the old data of the customers and their purchase details. Security regarding the environment: Data centers are cloud computing are highly concentrated with computing powers, data and users making it vulnerable to attacks of bots, malwares viruses and many other things [4]. Therefore, a user must know how much the provider is prepared to face these types of difficulties. Lockdown of the providers: When a user uses the service then the provider is in full control of the service. A user has no guarantee regarding the prices of the features provided. There is always a possibility of price hike or doubling of price. The users and their clients depending on the service are bound to pay the increased price [1]. In case the provider server fails then many online operations by the company will get hampered . Designs used for cloud computing: Structural diagram of a storage system in a cloud: Public APIs for data and management Virtual compute servers Logical storage pools Physical Storage Servers Physical Storage Servers Block, file or object storage Object Storage Virtual compute servers Cloud service location 1 Cloud service location n Architecture, Governance, Business continuity Identity, Access Management Service, (Access Control, SSO, Federation, STS, OAuth, User Provisioning, Logging, Auditing) Automated Life Cycle Management Platform as a Service Virtualized Infrastructure Automated Operations Infrastructure as a Service Firewall API, CA, SSL, Encryption, Key management, logging Security Automation Self-Service, Monitoring, Metrics User and App identity, App Security Testing, AuthZ, Logging Data Center Centric (BYOS) Developer Centric Fully Managed Model Security Services- Infrastructure Security Services- Applications Cloud system security design: Cloud Policy Decision Service End User Cloud Policy Admin Service Log/Audit Service Cloud Authentication service Account/Profile Provisioning service Meter/Billing Service Session User Profile Cloud Usage Records Log/Audit Store 3rd Party Auditor Cloud Policy Store Enterprise Registration UI Cloud Provisioning Service Local Authentication UI Cloud Usage Report UI External IDP (Authentication Service External Policy Decision Point External ID Provisioning Service Enterprise Cloud Service Owner Cloud Identity/Access architecture: Justifications of the design: Architect for security-as-a-service Deployment of application in the cloud to co-ordinate multiple services including automation of DNS, load balancer and many other services. Security automation falls in the same category, which includes automation of firewall policies between cloud security zones, provisioning of certificates (for SSL), virtual machine system configuration, privileged accounts and log configuration. Application deployment processes depending on security processes (such as firewall policy creation, certificate provisioning, key distribution and application pen testing) should be migrated to a self-service model [6]. Applying these techniques will help in reducing human touch points and enable the scenario of security as a service. Initially this will to mitigation of threats due to human errors, improve operational efficiency and embed security controls into the cloud applications. The company S-mart should put great efficiency in securing their data base and take a ll the necessary steps required to protect their data stored in the cloud. All the above steps discussed above needs to be followed by the company so as to continue their business without any difficulties. Implementation and practice of sound identity and access management architecture- Addressing should be done by cloud access control architecture to all aspects of user and access management lifecycles for both end users and privileged users user provisioning DE provisioning, authentication, federation, authorization and auditing. A sound architecture will enable reusability of identity and access services for all use cases in public, private and hybrid cloud models [7]. Employing of secure token service with proper user and entitled provisioning with audit trail is a good practice. The first step for extending enterprise SSO to cloud service is Federation architecture. To protect the data, the company should adopt proper techniques of protecting the data. The accessing of the data should be authentic so to do this there are many ways to prevent the access of the data specially the purchase data of the customers. Automate safeguards to provide Advantage to APIs - Deploying of any new security services with an API (REST/SOAP) to enable automation. APIs can help automate firewall policies, configuration hardening, and access control at the time of application deployment [8]. Security of the companys data becomes more secure by use of this technique. Not relying on an IP address for authentication services- As the IP addresses in a cloud lasts for a short time in nature so the user cannot solely rely on them for enforcement of network access control. Log, Log, Log creation of an end-to-end transaction when the security events are logged in by the application. The only reliable data leveraged by forensic engineers to investigate and understand the exploitation of applications is the security events, logs and audit trails [8]. This step is very much necessary for the company to keep track of each and every details so as to keep the customers details safe and secure in case of any vulnerabilities faced by the service provider. Some of the cloud security principles that are to be considered and customized by the cloud architect of S-mart are listed below: Present services in the cloud to follow the least privilege principles. To Guarantee the Isolation between various security zones by use of layers of firewalls - Cloud firewall, hypervisor firewall, and guest firewall and application container. The policies of the firewall should comply with the trust zone isolations standards. Use of End-to-end transport level (SSL, TLS, IPSEC) by applications to secure the transiting data between the applications deployed in the cloud as well as to the enterprise. Using API, compile the Security monitoring in the cloud with existing enterprise security monitoring tools. References: Catteddu D. Cloud Computing: Business, risks and recommendations for information security. InWeb application security 2010 (pp. 17-17). Springer, Berlin, Heidelberg. Kondo D, Javadi B, Malecot P, Cappello F, Anderson DP. Cost-benefit analysis of cloud computing versus desktop grids. InParallel Distributed Processing, 2009. IPDPS 2009. IEEE International Symposium on 2009 May 23 (pp. 1-12). IEEE. Sether A. Cloud Computing Benefits. Browser Download This Paper accounting. 2016 May 18. Carroll M, Van Der Merwe A, Kotze P. Secure cloud computing: Benefits, risks and controls. InInformation Security South Africa (ISSA), 2011 2011 Aug 15 (pp. 1-9). IEEE. Takabi H, Joshi JB, Ahn GJ. Security and privacy challenges in cloud computing environments. IEEE Security Privacy. 2010 Nov;8(6):24-31. Jadeja Y, Modi K. Cloud computing-concepts, architecture and challenges. InComputing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on 2012 Mar 21 (pp. 877-880). IEEE. Dinesha HA, Agrawal VK. Multi-level authentication technique for accessing cloud services. InComputing, Communication and Applications (ICCCA), 2012 International Conference on 2012 Feb 22 (pp. 1-4). IEEE. Subashini S, Kavitha V. A survey on security issues in service management delivery models of cloud computing. Journal of network and computer applications. 2011 Jan 31;34(1):1-1.