When designing a plan for research, there are several things to consider in terms of approach, design, and methods of data collection, analysis, and interpretation. Depending upon preference or subject matter, one may choose a more qualitative or quantitative method of research.
Research arises when there are questions about human behavior or beliefs. There are four worldviews that often shape a research question: postpositivism, transformative, constructivism, and pragmatism. There are also three designs in research. Quantitative research is a more traditional approach by testing theories. It uses numbers and focuses upon closed ended questions. Qualitative research are studies that examine social or human problems using open ended questions. Because either method has its advantages and disadvantages, a mixed approach is often used to provide a more complete understanding of a research question. Personal experiences and audience also play a role in which type of approach should be used in research.
Literature reviews are the ongoing conversations about an issue. They provide a deeper understanding of that issue by familiarizing the reader with past and current trends of the research topic. They also render insight as to how others have approached the issue. Reading literature reviews allow the reader to fully engage in the conversation in order to identify its strengths, weaknesses, or gaps that will ultimately become the starting point for new research. Understanding one’s relation to the issue will better assist that reader in developing their own research question.
The most important element to understand is that literature reviews are the ongoing conversations about an issue. Literature reviews reveal what research has or has not been done. They allow the reader to gain meaningful understanding of the current field. It is important to become part of that ongoing conversation through reading and engagement in order to be able to identify one’s position, enabling them to take an informative approach to a new research question.
Implementing cyber attribution for cyber security is very important in the process of tracking, identifying and laying blame on the perpetrator or course of a cyberattack. Establishing cyber attributes can be difficult because the underlying architecture of the internet offers numerous ways for an attacker to hide their behavior. Often companies lack the resources or expertise needed to track down cyber criminals, thus they usually hire outside information security experts. Once the identity or attribution has been established, an analyst should be able to establish:
What was the reason or motivation?
Who was behind it?
Where did it come from?
Will it return?
Key indicators that enable attribution
Tradecraft: Behavior frequently used to conduct cyber-attacks.
Infrastructure: Communication structures used to deliver capabilities.
Malware: Software designed to enable unauthorized functions on a PC or information resource.
Intent: Commitment to carry out certain actions based on content.
Also, metadata can be used to identity where it came from. However, these data points can be easily faked:
The information superhighway or internet is one of the greatest inventions of the 20th century, at least in terms of communication. Since its onset, cyberspace has evolved to become an integral part of the American Dream in its quest for liberty, free expression, and free market. The Federal government recognizes that adversaries and competitors will laboriously work to undermine America’s vision, including malicious cyber activities that expose vulnerabilities and cause great disruption or harm to the government, commercial industry, and private citizen. These are the principals that have shaped U.S. policy regarding offensive cyberattacks and cyber warfare.
In effort to secure and defend America, the Federal government has developed a framework for current issues in cybersecurity. It too, has evolved as cybercriminals have become more sophisticated in their cyberweaponry.
The Department of Defense has clearly defined cyberspace to include all networks, computer systems, and data. Cybersecurity encompasses national security, energy and power, banking and finance, health and safety, communication, information technology, and transportation. In the event of an attack, the government will respond by reporting the incident, prosecute the cybercriminal, and work to reduce future vulnerabilities.
Current U.S. policy has worked to centralize management and oversight of cybersecurity to prioritize risks and improve response. Roles and responsibilities are clearly defined, based upon shared standards and best practices. In addition, the government has employed contractors who work toward improving cybersecurity using improved products and services.
The government is dedicated to their commitment to cybersecurity but must be able to effectively work with or support industry and private individuals as they struggle to combat cybercrime.
Offensive cyber operations should not only be reserved for government agencies. Non-military organizations, such as in private sector, should be allowed as well to conduct an offensive cyber operation within their own network, or contracted by other organizations. Keeping a network secure and safe from a data breach is never easy. Organizations must think both offensively and defensively with digit assets. Having an internal or external cyber team to offensively test the network perimeter will help in detecting and assessing weak spots within a network. With more people working from home, there is a greater chance for data breaches and unauthorized access to networks.
Recent advances in Artificial intelligence (AI) technology are giving cybersecurity teams the edge in reducing the risk of data breaches and effectively prioritizing cyber threats. An AI system can rapidly perform tasks that normally require some degree of human intelligence, whereas Machine Learning is a subset of AI that focuses on building a model based on patterns of data to make determinations. One of the main applications of machine learning in cybersecurity is detecting and fighting fraud in e-commences. An AI system can rapidly analyze large volumes of data and events then, detect and prioritize many different types of threats or risky user behavior from established norms. The data and event can be feed to a system directly from an organization or large group of devices. Thus, giving an organization a better outlook on possible risks on digit assets across their network. An AI system by nature is both iterative and dynamic, but without large volumes of new data the possibilities grow exponentially that the system will deliver inaccurate results and/or false positives.
The industry has a love hate relationship with cyber intelligence, they want to have secure things, but they struggle with balancing security and giving users ease of use. Maintaining all the items needed for effective outcomes for intelligence teams is not very cost effective for many companies. Available data for successful outcome will vary by company, and what risk appetite they elect to have in their information security program
Laws and criminal statutes can vary widely from state to state and from country to country. There is not a set of rules that everyone follows in what is illegal and how data/evidence may be collected. Many of these laws can land intelligence teams and penetration testers on the wrong side of statue and find themselves subject to criminal and civil penalties.
The industry has been dragging their feet on keeping up with security updates on equipment which leaves open an unknown amount of zero day vulnerabilities that are unknown to intelligence teams until they are exploited You never know how many places have unpatched, and equipment that has been many years past the end of development or support windows. Many small businesses rely on router and modem settings for Payment Card Industry Data Security Standard (PCI-DSS) compliance so that they can accept credit cards. Most do not have a firewall or security appliance
There is not a distinctive standard explanation of what exactly what the Internet of Things (IoT) is. Most professionals define the term as the connection of diverse devices that can provides or request a service over the Internet to enable human-to-thing, thing-to-thing, and thing-to-things for the transmission of data. There are many ways that IoT applications are improving everyday life. Vehicles are now being equipped with small IoT devices that enable vehicles to downloading roadmaps with updated traffic information and protection against auto theft. Even are buildings are having IoT device installed with sensors that allow users to remotely control a building’s energy consumption to different systems such as lights and air conditioners based on preferences. Even many household items are sold being sold with their own embedded processing unit which enable product to have IoT abilities.
The concept of what IoT as systems is composed of has caught the attention of many people from academic and industry. The IoT reference model has been used to explain the each of the different sections within an IoT system ranges from three to seven different levels. The first reference model for IoT system consisted of three levels and described IoT as a system of Wireless Sensor Networks (WSNs).
The second model proposed model has five-levels and reduces the complexity during interactions between different sections of the model, resulting in simpler applications with well-defined components. The current model created by CISCO in 2014 extends the previous models into seven different levels, where the flow of data has a dominate direction depending on the type of application. The first three levels of the model are grouped into the Edge-side layer.
Level 1 consists of edge devices computing nodes such as: smart controllers, sensors, and RDIF readers.
Level 2 consists of the many communication components that enable the transmission of data or commands.
Level 3 is the edge ( or fog) computing level. This is where simple data processing starts to reduce the computation load in the upper levels, producing a faster response.
The next three layers are grouped into the server or Cloud-side layer.
Level 4 reduces the amount of data in motion to resting state by filtering and selective storing network packets to database tables.
Level 5 the information becomes abstract to provide the ability to render and store data allowing more efficient and simpler data processing.
Level 6 the information can be interpreted in application for marketing, academic, and industrial needs.
The final group contains only level 7, this is where users interact with the data using application from the IoT node data.
The motivations of potential attackers who launch attacks against IoT devices and systems might include the stealing of sensitive data or compromising IoT component. The vulnerabilities for IoT devices at the first level start with hardware Trojans. These are a major concert for IoT integrated circuits since an attacker can use the circuit to exploit a nodes functionality to get access to data or software running on integrated circuits. This might happen one of two ways:
Externally activated trojan by an antenna or sensor
Internal-activated trojan once a certain condition is met within the integrated circuits
Non-network side-channel attacks in edge node may reveal critical information under normal operation even when a node is not current using any wireless communication to send or receive data. Lastly, a Denial of service (DoS) attacks can occur against IoT devices and the three main types of attack are: battery draining, sleep deprivation, and outage attacks.
In a batter draining DoS attack, an attacker will send many packets to a node forcing it to run varies system checks repeatedly. Since nodes tended to be very small, carrying small batteries with limited energy capacity.
In a Sleep deprivation attack, an attacker will attempt to send a chain of request to a node that will appear to be legitimate. Since most IoT nodes are battery-powered node with a limited energy capacity.
When a possible outage attacks occurs, an edge node stops performing at normal operating. However, this may be as a result of an unintended error or a system issue.
Implementing RFID tags in IoT device at the edge node level requires all such RFID tags to provide a unique identifier that any nearby RFID reader can read. The tag that is attached to a product or an individual making creating tracking information. Certain types of tags can carry information about the product or individual it is attached to making a node easily inventoried for a third party. The electronic product code (EPC) tags contains two custom fields that create privacy concerns for users: the manufacturer and product code.
The scope of attacks at the communication level of the reference model an attacker might consider for reconnaissance is network eavesdropping or packet sniffing. This occurs when an attacker deliberately listening to private conversion over system communication links. This can prove an attacker with invaluable information when the data is unencrypted or sent in plaintext. Data contained within a network packet might contain the following:
Usernames & passwords
Shared network passwords
A side-channel attack is not easy to implement but are powerful attack against encryption algorithms. This type of attack can be launched from the both edge node and communication levels. However, when a side-channel attack is launched from the communication level are not easily defended against since this method is non-invasive and undetectable. Another possible attack at this level is the injection of fraudulent packets into communication links by inserting new packets in networking or the capturing networking packets then manipulation of the data containing with.
There are new and emerging challenges to securing IoT systems such as dramatic increase in the number of weak links and unexpected uses of data. The dramatic increase in the number are as a result of the special characteristics of devices and cost factors by device manufactures such as compact battery-powered devices with limited storage and computation resources, many market devices are not able to support secure cryptographic protocols. Lastly, the unexpected uses of data from environment or user-related data collection by Internet sensors from present computing enabled by IoT technologies has led to the unwelcome influence of Internet-connected sensors in everyday living around create privacy concerns with users.
As more developers push new IoT devices and services to the Internet this will lead to the discovery of new IoT vulnerabilities and attacks against users and systems. Most system are designed to a specific application or service and testing the security of the system might be complex and time consuming but is necessary as the number of new devices deployed to the Internet by manufactures increases each week. Some security threats might not be as widely recognized other are, but new threats to IoT devices and application should be made addresses both by security professionals and developers to minizine the scope of possible risk to users and devices.
MOSENIA, A., & JHA, N. (2017). A Comprehensive Study of Security of Internet-of-Things. IEEE Transactions on Emerging Topics in Computing, 586-602.
The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines equipped with unique identifiers (UIDs) which have the ability to collecting, sharing, and analyzing data over a networking without requiring human-to-human or human-to-computer interactions. It is an interconnection of heterogeneous entities where the term “entity” refers to a human, sensor, or anything that may request or provide a service. As more wireless networks come online, the total number of IoT devices around the world will only expand the scope of IoT devices and applications. Vendors are now leveraging IPv6 address schemes with high-speed Internet connections to improve the design and performance of IoT devices, thus creating an increased growth and demand for new IoT products.
IoT is playing a key role in transforming everyday life with a greater connectivity and functionality generating data faster than most applications can process and filter. By combining these connected devices with automated systems, it is possible to gather information, analyze it, and create an action or event to help someone with a task or learn from a process. However, many IoT devices have several operational limitations on the computational power available to them. These constraints often make them unable to implement basic security measures and have a low price and consumer focus of many devices makes a robust security patching system uncommon.
The scope of IoT applications has opened the door for many new business opportunities and revenue streams. Many businesses who implement IoT services to have a better view of operational expenses creating a better marketing insight based on consumer behavior and product placement. This can lead to a reduction in the total time it many take for a product to be available to a consumer. IoT also offers businesses just-in-time training for employees to improve labor efficiency to increasing organizational productivity. Logistics and supply chains are improved with IoT by creating a unique identifier for individual items from supply chains to make intelligent choices on how to deliver goods and services more efficiently to consumers. IoT helps manufacturing companies to measure a product’s performance, diagnose errors, and improve a product’s quality, performance, and support.
II. IoT reference model
The initial proposed IoT reference model consists of three levels and represents IoT as an extended version of wireless sensor networks (WSN).
In 2014, a new IoT Reference Model was created by Cisco and consists of the following seven levels and has data generally flowing in a bidirectional manner.
Collaboration and processes (People & Business Processes)
Application (Reporting, Analytics, Control)
Data Abstraction (Aggregation & Access)
Data Accumulation (Storage)
Edge Computing (Data Analysis & Transformation)
Connectivity (Communication & Processing Units)
Physical Devices & Controllers (Devices)
Level 1 – This level is concerned with physical devices at the edge-side, this contains the physical devices such as: smart controllers, sensors, and RFID reader. Data confidentiality and integrity is considered from here upward.
Level 2 – This level contains all communication and processing units that enable the transmission of data or commands by using routing and switching protocols. Communication happens between IoT devices in the first level and components in the second level, including communication across data networks.
Level 3 – Edge Computing, is simple data processing that is initiated and is essential for reducing computation loads in the higher levels as well as providing a fast response to events. Learning algorithms are implemented at this level.
Level 4 – Data Accumulation, data is combined from multiple sources to enable the conversion of data in motion to data at rest. At this level, data is converted into a format from network packets to database tables then is determined if it’s of interest to higher levels through filtering and selective storing for future analysis or shared with high levels computing servers.
Level 5 – Data Abstraction, this provides the opportunity to read and store data such that further processing becomes simpler or more efficient. Services at this level may include data normalization/denormalization then indexing and consolidating data into one place with access to multiple data stores.
Level 6 – Applications information interpretation and software cooperates with data accumulation and data abstraction levels.
Level 7 – This level involves users and business processes using IoT applications and their analytical data to make informed choices.
III. Fog and Edge Computing in IoT
IoT vendors are implementing edge and fog computing technology to providing enhanced data analysis and management to increase the scope of possible IoT applications. In computer networking, the control plane is the part of the router architecture that is concerned with the network topology or the information generated in the routing table that defines what to do with incoming packets. The data plane is the part of the software the processes the data requests. Fog computing is a standard that defines how edge computing should work and it facilitates the operation of computation, storage, and networking services between IoT devices and cloud computing centers. This enables computing services to reside at the edge of the network as opposed to servers in a data center. Whereas, the control plane is the part of the software that configures, and shuts downs the data plane. In Fog computing, there is only one centralized computing device responsible for processing data from different endpoints in the networks. This style of architecture uses edge devices to carry data out from substantial amount of computation storage and communication locally then sending it over the Internet backbone. Fog computing can be perceived both in large cloud systems and big data structures, referring to the growing difficulties in accessing information objectively. This brings data closer to the user as compared to storing data far from the end point in data centers, providing location awareness, low latency, and improves the overall quality of service.
Edge computing is located at the edge of the network, this how IoT data is collected and analyzed directly by controllers or sensors then transmitted to a nearby computing device for analysis. This brings processing closer to the data source and does not need to be sent to a remote cloud or other centralized system for processing. This eliminates the distance and time it takes to send data to a centralized source, which improves the speed and performance of data transport, as well as devices and applications on the edge. Instead of completely depending on a cluster of clouds for computing and data storage, edge computing can prove intelligent services by leveraging local computing and local edge devices. Edge computing applications can pre-process, filter, score, and aggregate data.
Pushes communication capabilities, processing power, and intelligence data directly into devices; programmable automation controllers
Pushes intelligence data to the local area network and processes data either in IoT gateway or a fog node.
IV. The Vulnerabilities of IoT
Security is a significant challenge for company to adopt and deploy IoT innovations. There is not much motivation for vendors to change with little or no consequences for selling insecure devices since device can be manufactured very cheaply and are not maintained with regular patches and updates by vendors. An example of a major security concert for integrated circuits is hardware trojans. A malicious modification of an integrated circuit (IC) enables an attacker to use the circuit or exploit its functionality obtain access to data or software running on the integrated circuitry.
Externally Activated (Antenna or sensor)
Internally Activated (Given Condition; Logic)
IoT systems are higher security risk for several other reasons: insecure network interface or services, insufficient authentication/authorization. These systems might include data or services that were not designed to be connected to the global Internet. These systems may not have a well-defined perimeter and are continuously changing due to device and user mobility.
IoT systems are highly diverse in character with respect to communication medium and protocols, platforms and devices. As a result, IoT systems, or portions, could be physically unprotected and/or controlled by different parties. Also, IoT devices could be autonomous entities that control other IoT devices. Routing Attacks against IoT network will affect how packets are routed in by being spoofed, redirected or misdirected to another network. An attacker can inject fraudulent packets into communication links using three different methods: insertion, manipulation, or replication.
There are several communication vulnerabilities in IoT devices sometimes as a result of a lack of transport encryption/integrity verification this may cause packet being intentionally listening to private conversions over the communication lines by a third party. As a result, there are several privacy concerns with IoT devices such as: Insufficient security configurability, insecure software/firmware, and poor physical security.
DOS Attacks is standard attacks used against IoT devices that jams the transmission of radio signals by either continuous jamming by blocking all transmissions or intermittent jamming by reducing the performance of systems. There are three well know types of DOS attacks against edge computing nodes: battery draining, sleep deprivation, and outage attacks. When a DoS battery draining attack happens nodes usually must carry small batteries with very limited energy capacity. In a Sleep Deprivation attack, the victim is a battery powered node with a limited energy capacity the attacker attempts to send an undesired set of requests that seem to be legitimate. Lastly an outage attacks happens when an edge node outage occurs when an edge device steps performing its normal operations
V. Botnets and Internet of Things
A botnet is a robot network of compromised machines, or bots, that run malicious, or bots, that run malicious software under the command-and-control of a bot master. Bots can automatically scan entire network ranges and propagate themselves using known vulnerabilities and weak passwords an on other machines. Once a machine is compromised, a small program is installed for future activation by the bot master, who at a certain time can instruct the bots in the network to execute actions. A network of infected machines or bots (zombies) that has a command-and-control infrastructure and is used for various malicious activities. Botnet architecture has evolved over time in an effect to evade detection and disruption. Bot programs are constructed as clients with communicate via existing servers. This allows the bot master to perform all control form a remote location, which obfuscates their traffic in a Client-Server or Peer-to-Peer network.
Once the software is downloaded, the botnet will now contact its matter computer and let it know that everything is ready to go. An individual botnet device can be simultaneously compromised type of attack and often at the same time. Servers may choose to outline rules on the behavior of internet bots. This informs the web robot about which areas of the website should not be processed or scanned.
The text file, robots.txt, is normally place on the root of a webserver to govern a bot’s behavior on that server, then it can be used by search engines to categorize websites. Robots that choose to follow the instructions try to fetch this file and read the instructions before fetching any other file from the website. If this file does not exist, web robots assume that the website owner is not wishing to place any limitations on crawling the entire site.
Botnets can be used to perform Distributed Denial of Service (DDoS) attacks, steal data, send spam, allow an attacker to access the devise and its connection, or mine cryptocurrency. A Distributed Denial of Service (DDoS) attack is a malicious attempt to make a server or a network resource unavailable to users. It is achieved by saturating a service, which results in its temporary suspension or interruption. The goal of the attacks is to overwhelm a target application with an extreme number of requests per second (RPS) with high CPU and memory usage. A single machine used to either target a software vulnerability of flood a targeted resource with packets, requests, and queries. Application layer type DDoS attacks occur by Http floods, slow attacks, or Zero-day assaults.
Network layer DDoS Attacks
Gigabits per second (GPS)
Packets per second (PPS)
Consume the targets upstream bandwidth
VI. The Mirai Botnet
On October 12th, 2016, a massive DDoS attack left much of the internet inaccessible on the United States East Coast. This was a first of a novel category of botnets that exploit IoT device & systems, turning IoT devices that ran a Linux operating system into a remotely controlled bots that can be used as port of a botnet in large scale network attacks. It primarily targets online consumer devices such as: IP cameras and/or home routers. Mirai has two core purposes to locate and compromised IoT devices to further grow the botnet and launch DDoS attacks based on instructions received from a remote command and control. Mirai performs wide-ranging scans of IP addresses, continuously scan the internet of the IP address of IoT devices. Yet, there is hardcoded list of IP address ranges which Mirai bots are programmed that it will not infect during scans. These addresses belong to the US Postal Service, the Department of Defense, the Internet Assigned Numbers Authority (IANA), Hewlett-Packard and General Electric.
Mirai identifies Locating under-secured IoT devices that could be remotely accessed vulnerable IoT devices using a table common factory default username & passwords, and log into them to infect them with the Mirai malware. Attack function enable it to HTTP flood and OSI layers 3 to 4. DDoS attacks when attacking HTTP floods, Mirai bot hide behind default user-agents. Infect devices will continue to function normally, except for occasional sluggishness, and an increased use of bandwidth.
If an IoT device becomes infected with the Mirai, an administrator should immediately disconnect the device from the network, then reboot the device. Since Mirai malware exists in dynamic memory rebooting the device clears the malware. Afterwards ensure that the previous password for accessing the device has been changed to a strong password. If you reconnect before changing the password, the device could be quickly infected again with the Mirai malware.
VII. Countermeasures/ Protection Techniques of IoT Devices
The following are basic protection techniques suggested by the Cybersecurity and Infrastructure Security Agency (CISA) that would provide basic IoT security protection against a 3rd party or hostile attacker. A many IoT devices might not have powerful processors or enough memory to have an intrusion-detection analysis will likely occur at a gateway device.
An IoT device owner should stop using default/generic passwords and disable all remote (WAN) access to the device. Ensure that all default passwords on the IoT devices have been changed. Updating devices with security patches from the manufacture, when available. Even if a device has a have known software vulnerabilities, patches or work arounds might not be downloaded for a very long period; thus intrusion-detection technique becomes more important.
Device administrators must disable universal plug and play (UPnP) on routers, unless necessary. Lastly, a networking administrator should monitor port 48101 for suspicious traffic on as infected devices often attempt spread malware by using this port to send results to a 3rd party or threat actor. Also, monitoring TCP ports 23 and 2323 for 3rd party to attempts to gain unauthorized control over IoT devices using the network terminal.
As more developers and vendors push new IoT devices and services to the Internet this will lead to the discovery of new IoT threats and attacks against users and systems to control a system or steal data. Most IoT system are designed to a specific application or service and testing the security of the system might be complex and time consuming, but it’s necessary as the number of new devices deployed to the Internet increases each week. Some security threats might not be as widely recognized or known as other are, but new threats to IoT devices and application should be made aware by security professionals and publicly available to developers and administrators to minizine the scope of possible risk to users and devices.
Bertino, E., & Islam, N. (2017, February 2017). Botnets and Internet of Things Security. Computer, 76-79.
Cybersecurity and Infrastructure Security Agency. (2017, October 17). Alert (TA16-288A) – Heightened DDoS Threat Posed by Mirai and Other Botnets. Retrieved from Cybersecurity and Infrastructure Security Agency: https://www.us-cert.gov/ncas/alerts/TA16-288A
War is an extremely serious event that occurs when an issue cannot be resolved in peace or compromise. Slavery was the issue of the mid-nineteenth century in America. The agrarian South wanted slavery maintained, and even expanded. The industrious North did not, promoting personal liberties and opportunity. Tension grew over the issue of slavery as America spread throughout the west. Ironically, the nation began breaking apart as one-by-one, southern states decided to secede into their own confederation, all united in slavery.
The newly elected President Abraham Lincoln worked diligently with Congress on possible scenarios to intervene or allow the institution of slavery to continue. Slavery had fulfilled a unique way of life to the Cotton States. It brought prosperity to its citizens. Many believed in their right to uphold slavery under the Constitution. Unfortunately, Lincoln understood the Constitution all too well. The carefully written manuscript did not address slavery. As any spreading disease, Abraham Lincoln believed it should not be encouraged for a young nation based upon freedom. As a competent leader, President Lincoln recognized diverse interpretations of the Constitution. However, in light of ongoing rebellion and secession, and for the sake of a nation’s integrity, he felt it necessary to resolve.
Winning a war takes strength, strategy, a suitable battleground, and a firm conviction for success. Neither side was expecting war, nor were they wanting to do so. But the majority of Southerners thought it would be a quick victory as they easily captured the ill-equipped, federally occupied Ford Sumter off the South Carolina coast on April 12, 1861. With these first shots of the American Civil War, Lincoln concluded it would take more time, more resources, and more manpower to secure victory and unite the nation once again.
Our nation may not have been prepared to go to war although to some, it seemed a foregone conclusion. Yet the North was already in position to win the war. Essentially, the federal government had the money and resources to outfit and supply a successful war campaign. The Northern states were an industrialized culture with various types of mills and factories. The government maintained arsenals such as Liberty, Kansas, and they were also equipped to mass produce more guns and ammunition. In contrast, the Confederate South was primarily a society of farmers whose available tools and machinery supported an agrarian economy. There was but one manufacturer capable of producing heavy arsenal, located in the state of Virginia. The South could import weaponry from overseas unless they were blocked by the Union navy. Lack of munitions prompted desperation and creativity. Many volunteers supplied their own guns while others converted weapons from farm implements. Moreover, countless weapons were salvaged through Union capture or conquer.
The Civil War was fought in Southern terrain and along the extensive Atlantic coastline. The North already had access to over 300 vessels of various sizes and capabilities, naval shipyards, and the means to build more and repair as needed. The coastal region was difficult for the Confederates to defend as they scarcely owned or had limited access to warships. While they did import large ships from Britain, they again resorted to converting and outfitting available vessels, including tugboats and cutters for immediate battle. In fact, the Confederate Secretary of the Navy Stephen R. Mallory is credited for construction of torpedo boats and a submarine, the C.S.S. Hunley, which took down many vessels belonging to the North. In addition, Jefferson Davis solicited privateers to help capture additional ships for their cause.
The Union easily accessed the battleground via rivers such as the Tennessee and the Cumberland. Rivers and bridges were heavily patrolled with armed steamboats developed out of the Transportation Revolution. The steamboats supplied food and equipment to Northern soldiers. The modern railroad and telegraph were also used by the North. The Alleghenies of West Virginia provided railroad access, a great barrier, and gave the Union a strategic advantage over the Confederates. In addition, macadamized roads were much easier for Union soldiers to travel upon foot, as opposed to muddy gravel over difficult terrain that often wore Southern soldiers down. Without food and provisions, many Confederate soldiers became weak with hunger.
The availability of manpower was one of the most significant resources that brought the North to victory. In total population, the North outnumbered the South by 2 to 1, which was reflected in armed strength. There were career soldiers and volunteers. The North organized recruitment camps. The very first Union regiment came out of the state of Massachusetts. Northern soldiers organized for battle, security, and protection, especially at the rivers, railroads, and the area surrounding Washington D.C. When the South sabotaged telegraph lines, destroyed railroad bridges, or damaged ships, the North could send workers for repair and reconstruction. When Lincoln needed more men, he was able to order a new supply.
Each side could boast skillful leadership including commanding leaders Ulysses S. Grant and Robert E. Lee, highly trained at West Point but chose which side to fight, based upon loyalty. Training of soldiers, on the other hand, varied greatly. Conviction was noteworthy but sometimes questionable due to drunkenness and inappropriate behavior. Regardless, thousands of soldiers went into battle inadequately outfitted and ill-prepared. While attempting to reclaim western Virginia in 1862 against the North’s General George McClellan, Confederate soldiers were observed to be exposed and vulnerable. Furthermore, many were weak and sickened from disease.
Directing them all was President Abraham Lincoln who exercised his authority and knowledge of the Constitution, helping to facilitate a Northern victory. At the onset, he arrested underground secessionists and other defiant activity, holding them under Article I, Section 9. He imprisoned Southern privateers as well, deeming them rebels and pirates. After the Battle of Antietam, September 1862, Abraham Lincoln delivered the infamous Emancipation Proclamation. As of January 1, 1863, all slaves became free from any slave or rebellious state. The Proclamation not only released indentured laborers in the South, it allowed 186,000 newly freed males to enlist in the Civil War, providing additional military strength to the Union army.
The issue of slavery was at the core of the American Civil War. The South felt so strongly in their belief that they were willing to rebel, to secede in order to continue the traditional aristocratic life they had enjoyed. There was much at stake and they were confident they could win. Yet the South had no means of winning. The best they could hope for was to avoid great loss.
For Lincoln and much of the North, allowing slavery to continue was a violation of the Constitution. Their convictions lie not, as much, in taking slavery away, but upholding the Constitution, reinforcing the integrity of our forefathers’ vision, and securing a united nation. They had to go to war. It was not an easy victory. Hundreds upon thousands of lives were lost. In the Spring of 1865, the American Civil War ended as General Lee and the Confederate army surrendered. Abraham Lincoln did not live to see the end of the war, but history would still remember him as one of our nation’s greatest heroes.
Confiscation Act of 1862 was an updated version of the 1861 Act that gave the federal government the right to take away all property, which included slaves. This law was directed toward anyone who was considered a threat to Lincoln’s government or war effort. There was concern about federal government’s power in taking away personal freedoms or right to property. But it was an important step toward releasing the slaves from bondage and it added to the number of solders who could help fight in Lincoln’s army.
Microservices architecture is a style that structures an application as a collection of services. This breaks all processes into its own service, where each service has its own container with its own data storage, does not share data. The inverse is monolith architecture which builds all capabilities into a single executable and process. This is a server-side system based on a single application to develop and manage.
Microservices implements smart endpoints uses no complex middle-ware the brain lay in the application and the network just help to route information.
Some characteristics of microservices architecture are:
Componentization via services
Organized around business capabilities
Decentralized data management
Designed for failure
Advantages of using microservices are:
A team can choose an any language for the service
Less risk in change
No availability when other services failed
Some availability when other services fail
What is a chaos monkey?
A chaos monkey is a tool that randomly stops services in the infrastructure during the data, while services are being monitored. Since Failure will happen in any disturbed services having a chaos monkey will force developers to anticipate how that failure would happen and how it will be handled. Since failure will happen in any distributed system telling a chaos monkey into an infrastructure will make people more aware of the fact that things will break by forcing it to happen, then monitoring and recovery can handle the event. This effects how to code is designed and written to become more robust. This is chaos engineering which is the discipline of experimenting on a software system in production in order to build confidence in the system’s capability to withstand turbulent and unexpected conditions.
Conway’s law states that an “organizations which design systems are constrained to produce designs which are copies of the communication structures of these organizations.” This is based on the reasoning that for a software module to function, multiple authors must communicate frequently with each other. Thus, the software interface structure of a system will reflect the social boundaries of the organization that produced it. In microservices, there is a lot of variation on how big the size of each team and the number of services to support should be.