Sunday, December 29, 2019

Research Paper about Internet Security

The connectivity of a computer to other of networks that allows communication with other computers presents many risks to the computer. According to Kallol Bagchi, (2003), internet security involves mechanisms and procedures taken to protect and secure files and data in the computer connected to the internet against intrusion by other internet users. The internet being insecure mediums of exchanging information presents high-risk attacks which results in loss of data or files, destruction of computer software or access of information by unwanted or unknown computer users. To protect the transfer of date via internet several methods such as encryption have been employed. (p. 686) History of internet security According to Gollmann, since the evolution if the World Wide Web (WWW) in 1995, experts predicted that by the year 2000 internet will be accessed by at least 200 million users. Latest data from US census bureau show that as of June 2010 at least 2 billion people visit the internet daily. There has been a tremendous change over the past in the usage of internets. There has been increase exchange of data, electronic business and the world is now a global village. Networks have become cheaper, and computers and mobile phone are more powerful to access internet connectivity. Computer crime has since emerged (Gollmann, 2010 p. 548). In 1995, when www emerged and became the   easiest and fastest browsing tool,   police in Hong Gong had to disconnect all except one Internet Service providers (ISPs) in search for a hacker. Over 20, 000 internet users were affected. Since then, Internet Security has become a real concern as cyber crimes have increased. As the number of internets users swell daily, internet security continues to elicit security issues. Types of cyber crimes Hacked advertising A hacker is computer user with knowledge and expertise in computers and networking whose intention is to get unauthorized or illegal access to a computer system. Hacked advertising is where internet criminal access an originations websites and illegally modify information thereon. Some even go ahead and send malicious emails using the email accounts. The first serious crime of this kind occurred on December 29 1996, when a hacker accessed US Air Force and replaced the cover page with a pornographic picture. Industrial military espionage This is hacking into websites hosts in order to steal and tamper with confidential data. This included stealing identity, destruction or corrupting of files. Once the data is tampered with, the organization without realizing will continue to use and reproduce faulty ones. This costly incident can occur to an organization. For example, in 1997, two university student hackers got their way into Boeing’s computers. They managed to access the courthouse systems in Seattle, which cost Boeing $ 57000 to check the integrity of their system. Fraud The emergence E-commerce and electronic money led to more challenges in making transactions. Credit card security has been one of the biggest concerns since the emergence of online commerce has created a big opportunities for fraudsters. Virtual shops that serve the online client use credit card as a form of payment. In this case the customer send the credit card number to the virtual shop so as to enable him debit the amount required to pay for the purchased goods. The information can be hacked without the knowledge of either of the two parties. While growth of E-commerce has been robust, it is also becoming a large concern for credit card customer and organizations. Systems disabling This is where hackers attack ISP’s service stations this disabling all their services. The service may not be destroyed bust they get impaired, crashed, or exhaust memory rendering is operational. During the time it is not functioned, the company loose money and sometimes data may be lost. Other crimes include pornography, crime network syndicate such as piracy, terrorism, and kidnapping. How do hackers work? The flaws of the networks create different opportunities for hackers. They use different methods to achieve their goals. Like hackers, crackers breaks into systems, wipes all memories, crash machines or stop running processes. The following are ways or tools used by hacker and crackers in cyber crimes. Social engineering This where crackers use social network such as twitter, Facebook, yahoo mails, etc to trick people to reveal their passwords or other information that put a   system security at a risk or compromise. These could include posing as client or employee with an urgent need of technical support. Common nowadays are emails from hacked accounts with enticing messages such need for business partnerships, donation, and grants. Password cracking Passwords are the first defense lines against any possible attack on to a system. Passwords cracking involve hackers and cracker attempting to gain access by breaking this line. They use programs that generate millions of possible passwords from a given users, domain, or emails address. Packet and password sniffing If the hacker cannot access the passwords by guessing them, they use password-sniffing tools, which involve use of broadcast technology, where the hacker scrutinizes the network transmissions read by other networks. The sniffing tools are programs that look at every message on the network and attempt to sniff the sender or recipient’s network access details. IP spoofing This is where internet criminals use IP source routing by pretending as a genuine host or client hence obtaining authorize information for accessing hosting servers. Another spoofing method is where the hacker will wait until a client computer is turned off and then attempting to impersonate the clients’ systems to access the internet host. Prone to spoofing is emails that do not have electronic signatures. Trojan Horses This is program that hides itself in another so that when the actual program is run, the hidden Trojan is also run. When the Trojan run it maliciously could destroy files or send out signals to the attacker thus allowing them direct access who then can modify programs or install other destructive programs. Worms This is a program that replicates itself without being triggered by other programs or by any person. An example is a worm created by a student, which within 8 hours, over 2000 computers had been infected and began to hut down because the replication of the programs was very fast for deletion. Though nowadays rare, hackers still use worms as a technique to attack operating systems. Viruses According to Kaspersky, viruses are programs that deliberately written that alter how computers operate, without the permission or knowledge of the user. They damage program, reformats storage programs or deletes files. Kaspersky’s, one of the companies dealing internet security services and products collected data in 2009 about IT products most vulnerable to attacks. The graph below is the presentation of data on which Kaspersky’s products contained the most vulnerability Source: Kaspersky Security Bulletin 2009. Statistics, 2009   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   (http://www.securelist.com/en/images/vlill/ksb09_malware2_pic02.png) There are a plenty of programs or methods used by hacker and crackers to launch attacks, posing the challenge of internet security. Other methods include NIS/NFS attacks; send mail attacks, TCB-SYN flooding, FTP attacks, and so many others. The graph below shows data on the most common vulnerabilities were classified by type: Source: Kaspersky Security Bulletin 2009. Statistics, 2009   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   (http://www.securelist.com/en/images/vlill/ksb09_malware2_pic02.png) In 2009, the International Decision Systems in Kaspersky Internet Security 2010 deflected 219,899,678 network attacks as tabulated below. Similar data of 2008 was slightly more than 30 million. Name of the worm/virus   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Number of attacks   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   % 1 DoS.Generic.SYNFlood 156550484 71.192 2 Intrusion.Win.NETAPI.buffer-overflow.exploit 32605798 14.828 3 Intrusion.Win.MSSQL.worm.Helkern 23263431 10.579 4 Intrusion.Win.DCOM.exploit 3245943 1.476 5 Scan.Generic.UDP 1799685 0.818 6 Intrusion.Win.LSASS.exploit 812775 0.37 7 Intrusion.Generic.TCP.Flags.Bad.Combine.attack 604621 0.275 8 Intrusion.Win.LSASS.ASN1-kill-bill.exploit 555107 0.252 9 DoS.Generic.ICMPFlood 131925 0.06 10 Scan.Generic.TCP 101737 0.046 11 Intrusion.Win.HTTPD.GET.buffer-overflow.exploit 86511 0.039 12 Intrusion.Win.MediaPlayer.ASX.buffer-overflow.exploit 24375 0.011 13 Intrusion.Win.SMB.CVE-2009-3103.exploit 19378 0.009 14 Intrusion.Win.WINS.heap-overflow.exploit 15200 0.007 15 Intrusion.Generic.OmniWeb.Alert.format-string.exploit 14291 0.006 16 Intrusion.Win.Messenger.exploit 10296 0.005 17 DoS.Win.IGMP.Host-Membership-Query.exploit 8976 0.004 18 Intrusion.Win.PnP.exploit 8783 0.004 19 Intrusion.Win.EasyAddressWebServer.format-string.exploit 6561 0.003 20 DoS.Generic.Land 3505 0.002 Total: 99.986 Source: Kaspersky Security Bulletin 2009. Statistics, 2009   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   (http://www.securelist.com/en/images/vlill/ksb09_malware2_pic02.png) Methods of enhancing internet security There three main methods of enhancing internet security: password protection, encryption and firewalls. Firewalls A firewall is a type of a controlled access technology that restricts access of information and resources by placing a barricade or a ‘wall’ between an unsecured networks and an organizations network. It prevents any illegal or unauthorized import or export of information from and to a corporate network. Some of the most common firewall in current market include: McAfee Personal Firewall Plus, Norton Personal Firewall, ZoneAlarm ProSymantic,   and BlackICE PC Protection. (Cheswick, Bellovin, Rubin, 2003 p.9) Firewall compares the request from the devise on side with information on the devise in the others side. Firewalls are essentially a set of rules, thus the sets of information in the internet that of the external are compared against each fire rule. Only those that correspond to the rules will cross the fire wall. They are configured to secure networks against unauthorized logins thus preventing possible data vandals. They allow internal users to communicate freely to the outside but restrict traffics coming in the networks. (Cheswick, Bellovin, Rubin, 2003 p.14) However, firewalls are not able to protect the networks or data against attacks that cross the wall. For this reason, experts advise against corporations hosting very confidential data on the internet. Such data do not require firewalls. Firewalls also may not protect against attacks from worms and viruses. Protecting Passwords and generating safe passwords Enhancing the safety of password is one way of enhancing internet security. Generating safe passwords and shadow passwords are the two main methods for this. Shadow passwords are where the plain text of the password remains hidden from the user except the root. Generating safe passwords is where users are encouraged to avid too easily to guess passwords. Effective ones are easy to remember but difficult to guess or greater using computer programs. (Great Britain: Parliament: House of Lords: Science and Technology Committee, 2007 p. 150-153) Encryption This is a cryptographic method of using technology so that shared date is only understood by the removing client’s computers. The process involves encrypting and decrypting. This improves traffic flaws end minimizes insecurity vulnerability. Encryption can be symmetrical pr asymmetrical. Asymmetric (key) encryption uses two methods at the same time: a public key known to everyone and a private known only to the recipient of the message. The public key encrypts the message while the private or secret key decrypts the message. Knowing the public key does not make possible to know the private key (Sinrod Reilly, 2000 p.18). Symmetric encryption is where the same key is applied in encryption and decryption of the access keys. Conclusion The need for internet security and sharp rise in cyber crime is the recent concern for businesses. Legislations have been enacted to apprehend and prosecute suspect of this crime. References Cheswick W. R., Bellovin S.M., Rubin A.D. (2003). Firewalls and Internet Security: Repelling the Wily Hacker. Boston: Addison-Wesley Professional Gollmann, D. (2010), Computer security. Wiley Interdisciplinary Reviews: Computational Statistics, 2:  544–554.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://onlinelibrary.wiley.com/doi/10.1002/wics.106/full Great Britain: Parliament: House of Lords: Science and Technology Committee (2007). Personal internet security: 5th report of session 2006-07, Vol. 2: Evidence.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   London: The Stationery Office Publishers. ICANN, (September 2010) Plan For Enhancing Internet Security, Stability, And   Ã‚  Ã‚   Resiliency (Fy 11) http://www.icann.org/en/topics/ssr/ssr-draft-plan-fy11-13sep10-en.pdf Kallol Bagchi, (2003). An Analysis Of The Growth Of Computer And Internet Security Breaches Journal of Communications of the Association for Information Systems (Volume 12,) 684-700 Kaspersky Security Bulletin 2009. Statistics, 2009 (http://www.securelist.com/en/images/vlill/ksb09_malware2_pic02.png) Sinrod E. J. Reilly W.P., (2000) Cyber-crimes: A Practical Approach to the Application of Federal Computer Crime Law. Santa Clara Computer and High   Ã‚   Technology Law Journal May, 2000

Friday, December 20, 2019

Life Choices as Represented in Robert Frosts Road Not Taken

Life Choices as Represented in Robert Frosts Road Not Taken Choices are never easy, facing hundreds upon thousands of them in our lifetime, man has to make decisions based upon these choices. Some decisions are clear while others are sometimes not clear and more difficult to make. The poem The Road Not Taken by Robert Frost is a prime example of these choices in life. This poem is a first person narrative that is seen by most people as being told by Frost. The poem opens up with the narrator encountering a point in the woods that has a trail diverge into two separate paths. In the poem Frost presents the idea of man facing the difficult predilection of a moment and a lifetime. I believe this idea in the poem is embodied in the fork†¦show more content†¦Both roads diverge into a yellow wood and appear to be about the same in their purpose. The first of the two paths is the more common route than the other less traveled path. Frost presents a classic conflict, the decision between the common easy path and the less traveled challenging one. Or, does he? Is this poem really about the one true choice in life or is it simply a silly little poem that has been looked at wrong? Heres what I think. Maybe this poem should not be praised upon as the classic confrontation of the big choice in life. Is there really a geographical place that has two paths, one leading to a boring 9-5 office job while the other much more challenging path leads to your dream in life? I dont think so. The choices represented in this poem seem to me to be magnifications of a walk through the woods. Perhaps Frost did really take a walk one day and came to a fork in the trail and was able to magnify that situation into this poem. Maybe people have since read way to deep into this piece. The poem could be about the magnification of a path and the really making a life altering decision but it could also be simply a factual account of a day in the life of Robert Frost. While reading this poem I drew a connection to the music of the Beatles. It just seemed that everyone alive during the late sixties read way too much into what they were doing. The whole notions that Yellow Submarine and Lucy in the Sky with Diamonds wereShow MoreRelatedEssay about Robert Lee Frost1452 Words   |  6 PagesRobert Lee Frost The mark of a great poet is his ability to engage the reader so that they analyse their own lives. Robert Lee Frost (1874 – 1963) – an influential American poet often associated with rural New England – is brilliant at this and uses poetry as a platform for the expression of his own general ideology. Frost’s belief that human society was often chaotic and stressful and that the meaning of life is elusive, has been promoted in his poetry. Frost looked to nature, whose undyingRead MoreLife Choices in Robert Frosts The Road Not Taken and Stopping by Woods on a Snowy Evening970 Words   |  4 Pages Robert Frost’s â€Å"The Road Not Taken† and â€Å"Stopping by Woods on a Snowy Evening† both portray weighing of choices in life. The former is about youth and experiencing life and the latter is about old age, or more probably, an old spirit wearied by life. In both poems the speaker is in a critical situation where he has to choose between two paths in life. In â€Å"The Road Not taken† the speaker chooses the unconventional approach to the decision making process, thus showing his uniqueness and challengingRead MoreThe Road Not Taken By Robert Frost Essay1554 Words   |  7 PagesTwo Roads, Two Choices, One Decision â€Å"The Road Not Taken,† written by Robert Frost, discusses a traveler who has to make a choice between two roads. In the first stanza, the traveler remembers standing at an intersection of two roads. Indecisive about which road to take, he seems to believe that one of the roads would be more beneficial to him (Lee 5). In stanza two, the narrator refers to the traveler’s unexpected decision to take the other road by giving details of it. In addition, the narratorRead MoreThe Road Not Taken By Robert Frost1026 Words   |  5 PagesThe poem, â€Å"The Road Not Taken† describes a person having a hard time choosing what path to take. Robert Frost elicits the central idea, theme, meaning, and how the speaker came to his decision by the use of metaphors describing the want for his readers to think through the hard decisions in life. One decision in life can make you or break you. It is all on how a person approaches the situation. Two roads diverged in a yellow wood, Frost introduces the metaphor of two diverging roads. He is depictingRead MoreFinally In To Kill A Mockingbird, The Issue Of Coming Of1161 Words   |  5 Pagesstock of the community. Jem starts to see life is not what everyone says it is. â€Å"It’s like being a caterpillar in a cocoon, that’s what it is† (englishworks.com). Jem was taught by his father at a young age that life was unfair. He knew the world was cruel, but never realized how unfair it really was. When Atticus, Jem’s father, defends Tom Robinson, most of the town began shunning Jem’s family. The town was treating them as if they were outcasts. This made life for Jem and his family much harder thanRead MoreThe Life Of Robert Frost ( 1874-1963 )1683 Words   |  7 PagesWhile he lived Robert Frost (1874-1963) enjoyed the recognition as an accomplished po-et. He was a multiple Pulitzer Prize recipient as well as of the honor of the Congressional Gold Medal. Considered one of the finest modernist poets of the twentieth century his poems to this day are admired for the depiction of the bucolic nature of New England and his practiced use of the everyday spoken word. Mr. Frost was born in California in later moving across the country to Lawrence, Massa-chusetts in 1885Read MoreThe Road Not Taken By Robert Frost1075 Words   |  5 Pagesis diction? The choice and use of words and phrases in writing. How does that affect a piece of literature? It creates and shapes it. What is structure? The complex construction of an arranged plan. How does structure relate to a poem? Structure in a pieces of literature, generates tension and deposition. The Road Not Taken, is a poem published in the early 1950’s by Robert Frost. The poem is summarized into the decision one has to make in life, when approached with a cross road. While Frost mightRead MoreThe Road Not Taken, by Robert Frost and A Worn Path, by Eudora Welty2347 Words   |  10 Pageschosen to compare and contrast two separate literary works from â€Å"Journey into Literature† (Clugston, 2010), with similar themes. . The poems I will discuss are â€Å"The Road Not Taken†, by Ro bert Frost and â€Å"A Worn Path†, by Eudora Welty. I have chosen these works over the others in our course text because they both offer a deeper look at life, from an outside perspective, as the reader looks into the lives of the main characters and relates with the journeys they are on. By analyzing these forms of literatureRead MoreThree Elements Of Robert Frost Poetry1145 Words   |  5 PagesThere are three common elements that feature in much of Robert Frost’s poetry. The first is a portrayal of nature through vivid imagery (as appears in â€Å"Nothing Gold Can Stay†), which partially stems from Frost’s life as a farmer in rural New England (Pritchard). The second is a discussion of depression, darkness, and death (as appears in â€Å"Out, Out—† and â€Å"Acquainted with the Night†), which issues from Frost’s own experiences after his 3-year-old son, mother, and grandfather died within two years ofRead MoreThe Importance of Journeys Essay2150 Words   |  9 Pagesendless possibilities. They can offer an escape from the realities of life, and are frequently used to comment on social or human traits and characteristics. Imaginative Journeys are represented in the focus text, The Tempest by William Shakespeare, the 2003 calendar cartoon in the Sydney Morning Herald by Michael Leunig, and the Board of Studies Booklet Prescribed text The Road Not Taken, a poem by Robert Frost. The composers attempt to create a world in which imagination

Thursday, December 12, 2019

Environmental Hazards and Toxicity for Weather - myassignmenthelp

Question: Discuss about theEnvironmental Hazards and Toxicity for Weather. Answer: Introduction Weather is becoming warmer and warmer, throughout the world, because of the increasing ambient temperature and the resultant global warming. The condition of the workers in the weather that is humid and hotter increases the heat stress risk, especially, for those, who are working in open and no shaded surfaces. Hence, additional care has to be taken care for the open place working workers, to ensure safe working conditions and hazardless environment. The risk assessment for the heat stress is developed for ensuring safe working conditions, by ensuring them to prevent the workers from any possibilities of developing the heat stress. Heat Stress Heat is generated, basically within the body itself and also gets acquired from the environment, externally. The extra heat generated in the body is lost from the body, by the attempts of sweat evaporation from the surface of the skin. If the body is cold, excess heat is generated through shivering. Heat stress is the result of heat accumulation exceeding the bodys ability for removing this excess heat. Core temperature is maintained by a human body and it is done in a range that is very narrow. When this limit is exceeded, failure of the vital organs will be resulted and eventually, the human may die after becoming unconscious. The mechanism of the main human body is losing the heat that is in excess, through sweat evaporation. The sweat evaporation causes to lose only water, so that much heat is not lost, from the body (WSH, 2010). Sweat evaporation involves the process of changes of sweat from the state of liquid to gas. More sweat evaporation is done for the lower moisture content of the air, relatively and when the moisture content is high, less evaporation gets occurred, in high relative humidity. When the physical work is intense, more than one litre of sweat or liquid can be lost, in an hour, in the form of sweating. In case, the loss of this body fluid is in larger amounts, through the sweating process, the result would be dehydration and it results in blood circulation impairment and also the body temperature regulation. So, replacement of water should be done through frequent drinking of water for maintaining adequate hydration, so that the mechanism of sweating of human functions optimally. Risks Though continuous intake of water is done, in the heat, there is a possibility of the heat stress, since the body continuously tries to remove the heat that is excess. The syndromes of the heat stress are heat cramps, heat stroke and heat exhaustion. Heat Cramps This earliest sign is the muscle tonic contraction symptom of cramping in the legs. It is usually, because of the electrolyte and fluid losses from huge sweating and happens after heavy physical work. The treatment for this is replacing electrolytes and fluid and taking rest. Heat Stroke Heat stoke occurs, when extra heat was unable to remove, because of increase of core temperature. It results in inability to talk, become unconscious and lose functions of bowel and bladder and may fail the seating mechanism. It may damage the vital body organs, like kidney, brain, liver. If it not treated in time, it may result in death. The treatment is to alert the workers and first aiders. Immediate attention must be sought by the worker, if he or she feels dizzy, unwell, painful cramps, headache or if anyone collapses. The body has to be cooled, preferably in an air conditioned area, sponge with water, after, removing cloths and then fanning. Circulation has to be restored and legs are to be elevated one foot above the ground. Then ambulance has to be called for sending to the hospital. Heat Exhaustion It occurs, when the electrolytes and water are lost from the body, as it effects the flow of blood to the vital organs. The symptoms are dizziness, feeling weak or even fainting, vision blurring, headaches and abdominal pain. Sweat is continued and body temperature is higher. The treatment would be electrolytes and fluids replacement, cooling the body and physical activity cessation (WSH, 2010). Then move the person to the area of air-condition or cooler place, sponge down after removing cloths, wet with cloth or towel and fan. Elevate the legs to above one foot above teh ground. Risks Associated The heat stress, if increased to an extent of uncontrollable condition could result into the heat stroke development. And the consequences of the heat stress would be serious. Workplace Safety and Health Act WSH Factors of Heat Stress in the Workplace There are three important factors that contribute the heat stress in the site, of the company (WSH, 2012). Factors, related to the personal workers, such as acclimatisation, hydration, general health condition, age, alcohol consumption, diabetes, immune suppression, obesity and other medical conditions Nature or type of work, such as rate of work, work load, cloths worn, type of work Environment of work, such as humidity, temperature, ventilation Companys Responsibility Heat stress and the resulting heat stroke would have serious conditions and hence, the management and other stakeholders have to take important measurements of minimizing the risk of the heat stress, as they are responsible to act under (Workplace Safety and Health) Act. Regulations of WSH, Singapore, risk management need conducting the risk assessment by the workplaces, so that measures are taken for reducing and eliminating the risks. It demands acclimatization of the workers in the local conditions of weather, before the operations begin (WSH, 2010). Since, the workers are planned to arrive two weeks prior to the operations, the two weeks time has to be utilized in such a way that they get acclimatized to the conditions of the local weather. (Stephan Constantin, 2012) Risk Assesment Specifies Against the heat stress Against the open working Against work load According to WSH, Singapore Recommendations Preventive Actions and Measures It is important that the risk assessment includes the following measurements to be taken, so that maximum risk of the heat stress can be prevented (Hale Ytehus, 2004). Provide polyolefine coveralls to all the workers and set its wet bulb global temperature to 29,50 Temporary shelters have to be arranged within the site, so resting is possible, during shorter and regular periods. All the workers have to go through Construction Safety Orientation Course to be aware of the heat stress issues. Change the timings of total 8 or 10 hours of working, in such a way that the first 4 or 5 hours are allocated from early in the morning and finish the first half, earlier. And second half should be started just four hours before the light fails (WSH, 2013). So, lunch break should be given between 11AM to 3PM. It is possible, since all the workers are accommodated by the company. The accommodation is recommended to be maintained closer to the site, so that they can have enough time to sleep, during the night, without wasting time much in travel. It should ensure that the temperature should not be exceeding 290C and the relative humidity to 85%, according to the WSH Act (WSH, 2010). Breaks to be given after every 1 hour of working for fluid intake. Lemon water can improve the stamina to work in the hotter weather, with less exhaustive nature. Conduct outdoor activities for the workers during the two weeks prior to the beginning of work, towards acclimatisation. Maintain an AC room near the workplace. Make the cool drinking and sports drinking water closer to the workers and also ensure that the workers have 500 ml water, every hour. First aid equipment and necessary materials. First aider and doctor to be present always in the site, during The companys park construction comes under Heat Stress 2, since the workers work under sun. Initially, the workload has to be 2 days and should be gradually increased. Requisites The company is requested to provide the following equipment, infrastructure and the necessary budget. Equipment, infrastructure, Material and Others Sports drinking water, supplied closer to every part of the operational site. One air conditioned room to accommodate the workers to rest for a while, before and after the shift and in case of any heat strokes. Temporary Shades WBGT Monitor First aid First aider Doctor close to the site Contact numbers of ambulance, hospital Risk supervisor Other facilities Budget Request The budget required - S.No. Facility Budget in USD 1 Sports drinking water 500 2 One air conditioned room 1000 3 WBGT Monitor 100 4 Temporary Shades 100 5 First aid 50 6 First aider 1000 7 Doctor close to the site 1500 8 Risk Supervisor 1500 9 Polyolefine Coveralls 1000 10 Other facilities 250 The total budget required is = 7000 USD Evaluation Measures Ensure personal fitness enough to work in construction of the park, before appointment of the worker. Conduct medical test after one week of the initiation of the work, to ensure the acclimatisation of the workers. Ensure checklist of the risk assessment factors to be verified, every day, before the shift begins. Report to Company The parking construction project is carried in the open sun, with no shade and so the risk assessment, risk factors and recommendations, along with the budget are provided in the report. It is requested to provide the recommended facilities, according to the WSH Act. Conclusion Risk assessment has been performed after a detailed exploration of heat stress, its causes, factors and treatments. Risk assessment is performed to prevent the accidents and hazards and the recommendations are provided in the report. References WSH Council, 2010, Workplace Safety and Health Guidelines: Managing Heat Stress in the Workplace, Workplace Safety and Health Council. WSH Council, 2012, Code of Practice on Workplace Safety and Health Risk Management Workplace Safety and Health Council. WSH Council, 2013, Workplace Safety and Health Guidelines Statutory Medical Examination Workplace Safety and Health Council. WSH Council, 2008, Workplace Safety and Health Guidelines Healthcare Workplace Safety and Health Council. WSHC, 2008, Workplace Safety and Health Guidelines - Hotels, Food and Beverage, Workplace Safety and Health Council. 2006, Occupational Safety and Health Management System, Fanning, F. E., 2003, Basic Safety Administration A Handbook for the New Safety Specialist, American Society of Safety Engineers, Chicago Ladou, Joseph, 2006,Current Occupational Environmental Medicine,4th ed. McGraw-Hill Professional.. Roughton, James, 2002,Developing an Effective Safety Culture: A Leadership Approach, 1st ed. Butterworth-Heinemann Stephan, Constantin, 2012, Industrial Health, Safety and Environmental Management, 3rd edition, epubli, Berlin. Hale A, Ytehus I, 2004, Changing requirements for the safety profession: roles and tasks, Journal of Occupational Health Safety, Australia and New Zealand Della, Giustina, Daniel, E. 2000, Developing a Safety and Health Program, Lewis Publishers, New York.