Thursday, January 30, 2020

Information Security Policy Essay Example for Free

Information Security Policy Essay 1. Executive Summary Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. The goal of this security policy is to lay out a basic plan for a secure information system to be used by Bloom Design Group. This policy will protect the company’s systems from threats that can come from humans and from natural disasters as well. The policy will also put into consideration the privacy, reputation, intellectual property and productivity of the Bloom Design Group. The continued operation of this company depends on being able to access and use resources within the organization and being able to remote access with security. Each persons role in the company will be considered and appropriate access will be given to ensure the efficient operation of the business, while not giving access to those who are not authorized. This policy will also help in the company’s adherence to any governmental regulations. Any disruptions of service or security related issues will be dealt with immediately by means of system software that is automated to handle certain threats. More serious issues will be dealt with by the IT staff whose responsibility it is to oversee the everyday operation of the information system. 2. Introduction Due in Week One: Give an overview of the company and the security goals to be achieved. 2.1. Company overview The Bloom Design Group is a company that offers interior design services to businesses and individuals around the world. There corporate office is located in New York with a secondary office in Los Angeles for handling operations on the West coast. They have a web site that offers their customers the ability to work up their designs online and then purchase them through a electronic order processing system. Also, the designers use secure logins and passwords to access the web site. A large number of the workforce work remotely possibly using tablets or ipads connected to secure VPNs or Virtual Private Networks. 2.2. Security policy overview Bloom Design group already provides secure logins and networks to their employees so they already have some type of system setup already. However, this does not mean it is a system that works efficiently. I think the appropriate security policy to implement for this project would be system specific. 2.3. Security policy goals As applies to your selected scenario, explain how the confidentiality, integrity, and availability principles of information security will be addressed by the information security policy. 2.3.1. Confidentiality The policy I plan to implement will help to protect information by reviewing how the company stores sensitive information such as employee and client records, trade secrets, and other sensitive data. 2.3.2. Integrity Since the company will be using passwords and secure logins the system will not be accessible to the public. So the primary focus should be on the employees. Authentication and verification can be done using a data log to keep records of employees activity while on the company’s VPN. Also, the use of a firewall will help with integrity as it will prevent employees from unknowingly accessing damaging websites. 2.3.3. Availability The policy I plan to use will help with back-up and recovery by the possible use of cloud storage or a central data storage center. Although they are already using secure logins for access control the whole system needs to be reviewed. This is to make sure only authorized personnel have access to sensitive areas. 3. Disaster Recovery Plan Due in Week Three: For your selected scenario, describe the key elements of the Disaster Recovery Plan to be used in case of a disaster and the plan for testing the DRP. 3.1. Risk Assessment 3.1.1. Critical business processes The mission-critical business systems and services that must be protected by this DRP are: Payroll, Human Resource Data, POS backup media, and Web Servers and their services. 3.1.2. Internal, external, and environmental risks Examples of internal risks that may affect business are unauthorized access  by individuals who are employed by the company, and those who aren’t employed by the company but still have access to individual store’s computer systems, applications, or areas where the servers and backup media are located. Other external and environmental risks include fire, floods, power outages, hardware failure, software glitches and failure, storms, and other acts of nature. 3.2. Disaster Recovery Strategy Most cases, having an alternative site (a hot site, or cold site depending on the disaster) would be the correct way of dealing with most disasters. With Bloom design group I think having a warm site facility would be the best option. Warm sites are cheaper than hot sites but require more effort. On the other hand, they are more expensive than cold-site facilities but less labor intensive and more likely to be effective in a disaster. Also, having a backup and retention site to work from, and recover from for the main servers and web services is a good idea. 3.3. Disaster Recovery Test Plan For each testing method listed, briefly describe each method and your rationale for why it will or will not be included in your DRP test plan. 3.3.1. Walk-throughs This test plan would be a great way for the key personnel to come together and formulate a plan of action in the event of an emergency. Due to Bloom Design group being spread across a large area it might require some video conferencing and traveling on the part of some employees. 3.3.2. Simulations I think this test plan is the most effective when compared to the others. Simulating an actual emergency is a great way for people to get used to operating in a critical time under pressure. This will show you where your people have their strengths and weaknesses when trying to recover from a disaster. 3.3.3. Checklists This passive type of testing would be a good system to implement on a weekly or monthly basis depending on the needs of the company. This will help in detecting problems before they become a major issue. 3.3.4. Parallel testing Since Bloom Design group is updating their security parameters and do not have an equal type of system already implemented parallel testing would not be appropriate for this security policy. 3.3.5. Full interruption I think this is another very effective way to test the system in the event of an emergency. However, to minimize inconveniences to the customers it would have to be done during off hours. 4. Physical Security Policy Due in Week Five: Outline the Physical Security Policy. Merkow and Breithaupt (2006) state, â€Å"an often overlooked connection between physical systems (computer hardware) and logical systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure† (p.165). Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario. These controls may include the following: Physical controls (such as perimeter security controls, badges, keys and combination locks, cameras, barricades, fencing, security dogs, lighting, and separating the workplace into functional areas) Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics) Environmental or life-safety controls (such as power, fire detection and suppression, heating, ventilation, and air conditioning) 4.1. Security of the building facilities 4.1.1. Physical entry controls At the two office locations (Los Angeles, New York) for Bloom Design Group I would use employee badges that double as an electronic key to access the building and other sensitive locations. This will work in conjunction with  an access control system that limits entrance/exit to the offices through one main entrance. There will be an employee entrance as well also to be accessed by an electronic badge. 4.1.2. Security offices, rooms and facilities For the security offices I would implement biometric scanners due to the sensitive equipment inside. Other rooms and facilities of a sensitive nature will utilize electronic badges with a photo and name of the employee. 4.1.3. Isolated delivery and loading areas For these areas I would implement electronic key card access with the use of a CCTV system recording to a DVR. With a CCTV camera located on the driver door in the loading area the person responsible for deliveries will know when a delivery is being made and can observe he outside environment before opening the door. 4.2. Security of the information systems 4.2.1. Workplace protection For this part of the security policy I would utilize pre-employment screening and mandatory vacation time. This prevents people from hiding illegal activities while performing their duties. Also, I would setup privileged entity controls so operators and system administrators have special access to computing resources. 4.2.2. Unused ports and cabling For unused ports I would use a piece of security equipment that can be plugged into the unused port and can only be removed by someone with a special key. This will help prevent unauthorized access into the network. For unused cabling I would secure it in a secure storage room which can only be accessed by authorized personnel. If the above mentioned equipment isn’t available then the port should be removed. 4.2.3. Network/server equipment Being that this is some of the most critical equipment for business operations I would use biometric locks and scanners on any room that  contains this equipment. Also these rooms will be environmentally controlled with air conditioners and dehumidifiers to allow the equipment to operate at peak efficiency. 4.2.4. Equipment maintenance Since a lot of the equipment is spread across a large region I would utilize remote communication connections to troubleshoot issues. If the maintenance need is more severe than I would have a small centrally located facility that specializes in assessing and repairing malfunctioning equipment. 4.2.5. Security of laptops/roaming equipment For laptops and roaming equipment I would install all devices with a GPS tracker and encryption software to protect against unauthorized access. The equipment itself would be stored in a secure storage room with access being tightly controlled. 5. Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems 5.1. Authentication Authentication credentials permit the system to verify one’s identification credential. Authenticating yourself to a system tells it the information you have established to prove that you are who you say you are. Most often, this is a simple password that you set up when you receive the privilege to access a system. You may receive an assigned password initially with the requirement that you must reset it to something more personal—something that only you can remember. However, passwords are the easiest type of authentication to beat. Free and widely available programs are available on the Internet to break the security afforded by passwords on most of the commonly used systems. With two or three factors to authenticate, an information owner can gain confidence that users who access their systems are indeed authorized to access their systems. This is accomplished by adding more controls and/or devices to the password authentication process. Biometric scanning uses unique human characteristics to identify whether the person trying to gain access is authorized to enter or not. One common  approach to managing IDs and passwords is to create a password or PIN vault. These programs use secure methods to locally store IDs and passwords that are protected by a master password that unlocks the vault when it’s needed. 5.2. Access control strategy 5.2.1. Discretionary access control The discretionary access control system will be used for Bloom Design Group because this is the favored approach in the corporate environment and due to the wide area of operations this will allow several authorized users to have access to the system at any given time. The principle of least privilege is the predominant strategy to assure confidentiality. The objective is to give people the least amount of access to a system that is needed to perform the job they’re doing. The need-to-know dictates the privilege (authority) to perform a transaction or access a resource (system, data, and so forth). An information owner is one who maintains overall responsibility for the information within an information system. For the Bloom Design Group the information owner is going to be the corporate head of IT operations. 5.2.2. Mandatory access control In a system that uses mandatory access control (MAC; also called nondiscretionary access control), the system decides who gains access to information based on the concepts of subjects, objects, and labels, as defined below. Since the Bloom Design Group is spread out over such a large area I do not think this is the best choice for this scenario. MAC is better suited for military or governmental systems. 5.2.3. Role-based access control Role-based access control (RBAC) group’s users with a common access need. You can assign a role for a group of users who perform the same job functions and require similar access to resources. This would also be appropriate for this scenario because it will allow the information owner to easily assign access to certain groups such as designers, office personnel, customer service associates and so forth. 5.3. Remote access Remote Access Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access users to communicate with a central  server to authenticate dial-in users and authorize their access to the requested system or service. RADIUS allows a company to set up a policy that can be applied at a single administered network point. Having a central service also means that it’s easier to track usage for billing and for keeping network statistics. A virtual private network (VPN) is another common means for remote users to access corporate networks. With a VPN, a user connects to the Internet via his or her ISP and initiates a connection to the protected network (often using a RADIUS server), creating a private tunnel between the end points that prevents eavesdropping or data modification. 6. Network Security Policy Due in Week Nine: Outline the Network Security Policy. As each link in the chain of network protocols can be attacked, describe the policies covering security services for network access and network security control devices. 6.1. Data network overview Due to the large geographic distances between Bloom Design Group offices a WAN is going to be utilized. WAN covers a larger geographic area than a LAN (technically, a network that covers an area larger than a single building). A WAN can span the entire nation or even the globe using satellites. 6.2. Network security services 6.2.1. Authentication Access to documents can be restricted in one of two ways: by asking for a username and password or by the hostname of the browser being used. For Bloom Design Group employees will need to enter a user ID and password to access restricted documents and sites. 6.2.2. Access control Unlike authentication, which is security-based on the user’s identity, restricting access based on something other than identity is called â€Å"access control.† For Bloom Design group access control to physical locations will be done by controlled by electronic badges. More sensitive areas such as the server rooms will utilize biometric scanners. 6.2.3. Data confidentiality This service protects data against unauthorized disclosure and has two components: content confidentiality and message flow confidentiality. For Bloom Design group all messages transmitted and received through company offices will be encrypted to prevent the unauthorized viewing of sensitive company documents. 6.2.4. Data integrity The goal is to protect data from accidental or malicious modification whether during data transfer, data storage, or from an operation performed on it, and to preserve it for its intended use. For Bloom Design Group the only people who will be authorized to make changes or modifications will be the Head of the IT department and anyone else they deem necessary. 6.2.5. Nonrepudiation A service guaranteeing that the sender of a message cannot deny having sent the message and the receiver cannot deny having received the message. I do not think this will be necessary for Bloom Design group. However, if it does then the proper modifications can always be made. 6.2.6. Logging and monitoring These services allow IS specialists to observe system activity during and after the fact by using monitoring and logging tools. These include operating system logs, server records, application log errors, warnings, and observation of network, switch and router traffic between network segments. I do not think this will be necessary for Bloom Design Group as a whole. However, it will be utilized for any programs having to do with the servers due to its sensitive business content. 6.3. Firewall system Outline the roles of the following network security control devices and how these basic security infrastructures are used to protect the company’s network against malicious activity. Provide a description of each type of firewall system and how it is used to protect the network. Include how the firewall system is or is not applicable to the company’s network configuration in your selected scenario. 6.3.1. Packet-filtering router firewall system The most common Internet firewall system consists of nothing more than a packet-filtering router deployed between the private network and the Internet. A packet-filtering router performs the typical routing functions of forwarding traffic between networks as well as using packet-filtering rules to permit or deny traffic. 6.3.2. Screened host firewall system The second firewall example employs both a packet-filtering router and a bastion host. This firewall system provides higher levels of security than the previous example because it implements both Network-Layer security (packet-filtering) and Application-Layer security (proxy services). Also, an intruder has to penetrate two separate systems before the security of the private network can be compromised. This will be the option chosen for Bloom Design Group based on needs and cost. Since Bloom Design group is not a governmental or military related company then it doesn’t require the most elaborate form of firewall protection. 6.3.3. Screened-Subnet firewall system The final firewall example employs two packet-filtering routers and a bastion host. This firewall system creates the most secure firewall system, as it supports both Network-Layer and Application-Layer security while defining a â€Å"demilitarized zone† (DMZ) network. 7. References Cite all your references by adding the pertinent information to this section by following this example. American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC: Author. Information Security: Principles and Practices, by Mark S. Merkow, CISSP, CISM and Jim Breithaupt.

Wednesday, January 22, 2020

A Home that I Can Point To Essay -- Personal Narrative Moving Essays

A Home that I Can Point To We are moving once again. The new place is barely down the street, but we have to move again. This is the fifth time in six years that I have moved from one apartment to another. Im glad we are finally moving out of the old apartment, because the guy below us constantly banged on his ceiling when I walked from one room to another. Its been awhile since I have had a place to call home, a place I can grow fond of. I have hope that one day we will live in a house and not have to worry about cranky neighbors or stairs to climb before I reach my front door. As I read the short piece from Sandra Cisneross, The House On Mango Street, I began to appreciate everything that I had in life. The story is narrated through the thoughts and emotions of a young girl whose family lives in poverty and struggles to find a decent place to live. The message that Cisneros tries to convey to her readers is that those who have plenty in life must realize that there are people who struggle every day and work hard in order to survive, and they too have dreams and goals of one day living an adequate life. People who have such elaborate homes or even simple homes always want more, never understanding the value of what they have. Once I read the story, I came to terms with what life is like for those who hardly have means of getting water. I have gained more respect for those who struggle, but still make an effort to ameliorate their situation. From my experience, I can relate to her need for a solid ground, but when it comes to the difficulty of living in pove rty, I can only learn to be grateful for what I have. The oldest home that I can remember is an apartment my mother, stepfather, and I lived in. The building was ... ...the place I call home. As a child, one needs to make memories of their childhood and this girl loses that opportunity. In the girls case, she is unhappy with her home, and unappreciative of what her family provides for her. However, she is no different from any other person in society. We all desire more than what we can realistically acquire, and constantly expect better things in life. This is not a negative aspect of human nature; it is simply a mechanism to strive us to do better in life. I knew then I had to have a real house. A real house. One I could point to. This attitude shows the reader that she has used the torment she has endured as a means of reinforcement on striving for a greater future. I hope that someday, my Dad and I can find a place to settle down in, but it will probably be awhile. Like the little girl would say, I know how those things go.

Tuesday, January 14, 2020

Saving Private Ryan Сoursework

‘Saving Private Ryan' is an academy award winning film set during the time of D-Day invasion in World War 2. It was made in 1998 and was directed by Steven Spielberg and written by Robert Rodat. It was a very successful film and won 5 Oscars. Spielberg has made this film to make the audience feel the essence of war and the effects behind it. Spielberg also focussed on making it more realistic and to make the audience a part of the movie. The film is notable for its opening 24 minutes as it contains high level intensity, which depicts the Omaha beachhead assault, June 6, 1944. In this essay I will be looking at how Spielberg uses presentational devices to create ‘chaos and realism at all times. ‘ ‘Saving Private Ryan' begins with a single brass instrument playing a slow melchonly sound which gradually builds up to orchestral music. This sounds like the last stand and is reminiscent of funerals. The American flag is shown waving with light shinning through it representing patriotism, power and pride. Then a medium shot is used on an old man as he is walking towards the cemetery, in search of something, with his family walking behind him and looking at him. Then a series of establishing shots show the background imagery and a lot of crosses. The crosses are white, (symbolising innocence and purity) and are in lines as if soldiers are standing there. The camera then slowly zooms into the mans face as he has fallen to the ground, weeping beside the place he was searching for. This shows his feelings of unhappiness and shows that he is upset. This also makes the audience question, why is he in that state of emotion. The music also adds tension to the atmosphere. The sound then switches to waves and bombings as the film heads into the next scene. This scene shows a connection between the mans face, the graveyard and D-Day. It also builds tension, which is slowly portrayed with an emotional atmosphere. The next scene begins with the sound of waves crashing against Higgins boats which are taking American soldiers towards the beaches of Normandy. The audience have already been told that this action is set on June 6, 1944, the date of the d-day landings. A close up of a soldiers shaking hand is shown as he takes a drink from his water bottle. The audience may feel that he is scared, reversing the model of a typical war hero. Other closes up shots of soldiers are shown to introduce briefly the characters who will be important later in the film. The sound of soldiers vomiting and of orders being given can be heard going off. This makes the audience feel nervous on the soldier's behalf. As the doors of the boats open the audience are confronted immediately with the deaths of the soldiers. Some men slip under water to escape the bombardment and the camera follows. The sound changes as the audience see men being shot, or drowned under the weight of their own packs. An over the shoulder shot is used to show the German armies power and control as they are shooting the men. As the main character, Tom Hanks, makes his way through the beach, he goes into a state of shock as he witnesses the carnage around him. A medium shot is used to show a man searching for his arm, which has been blown off. A long shot shows the deaths of several men who are on fire. The colour of the fire stands out against the dull colours of the scene. The fact that Tom Hank's character is in a state of shock reinforces the image of a non-typical war hero. The following scene begins with a medium shot on Tom Hanks as he is brought back into reality. He looks around and sees carnage everywhere and soldiers shooting at each other. Then a long shot is used showing the imagery in the background and the essence of war. Soon after the soldiers are shown heading towards the beach, trying to get close to the Germans. This is shown in an extreme long shot which also shows the impact of them heading there and everything that was happening at the time. A medium shot is used as Captain Miller is dragging another soldier who is in pain and in desperate need of help. At this point the scene is put into slow motion as a deafening sound is played. This makes the audience feel shocked and on edge as the scene is put into slow motion. The director wants the audience to know that despite war hitting the American soldiers, they have not lost hope and courage and they are persevering with the circumstance. This shows that the Americans will continue to work with each other and try and emerge victorious against the opposing Germans. The war is then shown in several different long shots to show the chaos because of the war and to show the soldiers trying to seek refuge as some of the soldiers are in pain and agony. The close ups shows the emotions, feelings and the fear that they are having. We also see action from the Germans point of view as an over the shoulder shot is used to show the Germans advantage of shooting down at the Americans and trying to kill them. This is included to show the audience how the Germans are in control and when all the action is happening, the camera shakes, to make them feel the action. Soon after high angle shots are used to show medics on the battlefield trying to help the wounded men. Everyone is helpless as blood is scattered on the camera. The director chooses to add this to make it more realistic and exaggerated shots of soldiers being blown into pieces adds to this. Later, the Americans try to climb up the hill to shoot gunfire at the opposing soldiers at the top shooting down at them. Panning is used to show the audience what war would be like as if they were there and it makes them feel that they are involved in the action. As the American soldiers are getting into position a handheld camera is brought in to, again show the essence of war. As one soldier gets around to the side of the hill to get an accurate aim at the Germans shooting down, an extreme close up shot is used to show the level of concentration that he is using in killing the Germans. The soldier aims at the Germans and recites some prayers as he tries to get an accurate shot. He takes a deep breath before pulling the trigger of his gun and killing them. Throughout this scene, a handheld camera and panning is used as Spielberg wanted the audience to feel as part of the movie. The shooting continues in the next scene as the Americans appear to be in control. This is because they are running up the hill as the Germans at the top off the hill are still falling down. This is displayed using a medium shot. Soldiers are shown running towards their trenches in a long shot, showing that they are striving and are need of help in order to win the war despite the fact that they can now go to the top of the hill with decreased difficulty from before. This shows that they are cooperating and are working together to defeat the Germans. This symbolises to the audience that there is a ray of hope for the Americans winning. Later, German prisoners are shown being shot, as they are trying to surrender because they know that they have lost. This is shown from a medium close up angle and then is zoomed in as a close up shot so that the audience can see the agony the Germans are facing, as they are getting shot. The Americans are shown getting revenge by shooting and killing the prisoners. Spielberg chose to add this so that he could make the audience either sympathise with the Germans or feel relief and satisfaction because the allied forces are proving to be dominant at this point. Soon after screams can be heard as there are large explosions being given off, fire is everywhere burning soldiers and machine guns firing. It was carnage. The tables are turned when we see the Americans in total dominance as they begin to shoot at the German soldiers as they are shown dying and suffering. Then we see a soldier collecting sand and dust of the ground. He is holding 3 silver tins, and is filling one of them. These tins may represent three countries where he has possibly been to war at as they were labelled, Italy, Africa and France. This man is probably collecting this sand as a memorial and a remembrance to the war. One soldier is shown weeping over the death of hi fellow soldiers. He also possesses a Hitler youth knife, which could be important to him. As the scene heads for an end we see Tom Hanks in an extreme zoom in on his eyes showing his emotions as dramatic music begins to play. The battle field is shown in extreme long shots as the audience can see the devastation on it. The audience see the dead bodies scattered everywhere on the beach, with some being washed away by the shore. The scene ends with the camera zooming into Private Ryan's backpack. Saving Private Ryan is undoubtedly one of the best movies made on the d-day invasion. Spielberg clearly shows the essence of the war and has made the audience feel how war would be. The film is well known around the world and it is truly epic. It is concise to the point and the opening 24 minutes reflect on how excellent the movie is, as there is a lot of intensity. This is why it has won so many awards and nominations, topping them with 5 Oscars. Overall I think Saving Private Ryan is a great movie and Spielberg has used a wide range of camera shots and angles to get his message across to people and that is why Spielberg has been very successful with it. Spielberg clearly used a variety of presentational devices and has produced an authentic movie, which will be remembered for a long time.

Monday, January 6, 2020

Migrant Workers as Outsiders in Of Mice and Men Essays

‘Of Mice and Men’ is a novel written by John Steinbeck. The novel is set in the 1930s, where the Great Depression years occurred and had a huge impact of many lives in California. California was struggling not only with the economic problems of the Great Depression but the severe labour strife too. ‘Of Mice and Men’ has an explicit context, because of the social and political events during the 1930s America. This also creates the climate of the novel. Hardship and homelessness ran through the country, creating many problems that ordinary people had to face. ‘Of Mice and Men’ also follows the careers of two men, George and Lennie, who dream of a better life on their own farm. Steinbeck wrote this novel because he had strong†¦show more content†¦An outsider is a person who does not fit in well with everyone else in a particular environment or society. The outsiders I have chosen are George, Lennie and Crooks, purely because they are the only characters who are different from the rest. George is an outsider because he is like a father-figure to Lennie. He always looks after him, and this is significant throughout the novel. As evident, George keeps looking out for Lennie to ensure everything is okay and there are no problems with him or anyone else. George knows Lennie is big and strong, and after the incident in Weed, he takes more care into ensuring Lennie is not having any difficulties settling in with the other people in the ranch. Steinbeck included George in the novel to show how people similar to George had to live every day of their lives knowing that it was going to be tough. George tries his best at protecting Lennie and so orders Lennie to be careful in what route he chooses, and then gets mad at Lennie when he disobeys. This creates a sense of rebellion between both him and Lennie, who yells at George for being too mean. For example, in chapter 1, George is seen talking to Lennie aggressively using foul language, â€Å"You crazy son-of-a-bitch. You keep me in hot water all of the time†. These conflicts relate to Steinbeck’s portrayal of life in this period of time. AShow MoreRelatedJohn Steinbeck s Of Mice And Men1275 Words   |  6 Pagesconnect to each other. The novella Of Mice and Men by John Steinbeck, is a story about Lennie and George, two migrant workers in the Salinas Valley, California. These friends stick together through the troubles of the Great Depression and survival in a world where differentiating qualities threaten these two workers’ hopes and dreams. There are three main deaths in this work, whether real or metaphorical, that are portrayed with primary themes. The novel The Outsiders by S.E. Hinton, is about PonyboyRead MoreAnalysis Of John Steinbeck s Of Mice And Men 1476 Words   |  6 PagesCurley’s Wife Mice of Men Of Mice and Men is a novel set in the 1930’s based upon the hardship and rough times of the great depression. It was written by Nobel prize winning novelist John Steinbeck. Steinbeck’s life influenced his literature, as he was in identical situations as the character he describes in his novel. Steinbeck was a migrant worker who also conveniently grew up on a ranch. He also wrote another book called ‘The Grapes of Wrath’ during this time period. We can imagine that his ownRead MoreJohn Steinbeck s Of Mice And Men1312 Words   |  6 Pagesof its uselessness. In S.E. Hinton’s The Outsiders, there are three major deaths occurring in the novel: Bob, Johnny, and Dally. Similarly, in John Steinbeck’s Of Mice and Men, there are also three major deaths of Candy’s dog, Curley’s wife, and Lennie. The Outsiders is a story depicting the life of Ponyboy Curtis, who is struggling to find his place in the world while battling the rival gang, t he Socs. Of Mice and Men is a story of two migrant workers, George and Lennie, who are bound togetherRead MoreThe Theme Of Loneliness In Of Mice And Men By Stienbeck1596 Words   |  7 Pages In the book Of Mice and Men the author Stienbeck captures life,segregation,friendships and rivalries all wrapped in one. For instance when Curley’s wife says â€Å"Listen nigger† she said â€Å"you know what I can do if you open your trap?† (80). That portion of the scene reveals just a slight representation of what life as a black man in the 1930’s was like on the farm. Candy, Curley’s wife and Crooks are three very different people who live on a farm with other workers and acquaintances, yet somehow experienceRead MoreEssay on Analysis of John Steinbecks Of Mice and Men2005 Words   |  9 PagesAnalysis of John Steinbecks Of Mice and Men    Steinbecks ‘Of Mice and Men’ is a novel about people, their dreams, relationships and disappointments.   The characters are diverse and represent a cross section of society during the American Depression of the 1930s.   The novel is set in Steinbecks birthplace of Salinas Valley, California, and it is at the ranch where he grew up that we meet the majority of characters.   There are three specific locations in the novel where most of theRead MoreJohn Steinbeck s Of Mice And Men1485 Words   |  6 Pagesdeaths occurring in them. In S.E. Hinton’s The Outsiders, there are three major deaths occurring in the novel: Bob, Johnny, and Dally. Similarly, in John Steinbeck’s Of Mice and Men, there are also three major deaths: Candy’s dog, Curley’s wife, and Lennie. The Outsiders is a story depicting the life of Ponyboy Curtis, who is struggling to find his place in the world while battling the rival group, the Socs. Of Mice and Men is a story of two migrant workers, George and Lennie, who are bound togetherRead MoreJohn Steinbeck: Experiencing the Dust Bowl Essay1364 Words   |  6 Pageswhat he experienced through his travels with the migrant workers. His method was not to present himself notebook in hand and interview people. Instead he worked and traveled with the migrants as one of them, living as they did and arousing no suspicion from employers militantly alert against agitators of any kind. (Lisca 14) John Steinbecks The Grapes of Wrath was derived from his personal experiences and his journeys with the migrant workers. John Steinbeck was born on February 27, 1902 inRead More John Steinbeck: Experiencing the Dust Bowl Essay1346 Words   |  6 Pageswhat he experienced through his travels with the migrant workers. â€Å"His method was not to present himself notebook in hand and interview people. Instead he worked and traveled with the migrants as one of them, living as they did and arousing no suspicion from employers militantly alert against â€Å"agitators† of any kind.† (Lisca 14) John Steinbeck’s The Grapes of Wrath was derived from his personal experiences and his journeys with the migrant workers. John Steinbeck was born on February 27, 1902 inRead More The title of the novel Of Mice And Men refers to how dreams often go1884 Words   |  8 PagesThe title of the novel Of Mice And Men refers to how dreams often go wrong. Discuss how John Steinbeck achieves this. Question 3-The title of the novel Of Mice And Men refers to how dreams often go wrong. Discuss how John Steinbeck achieves this. One of the main themes that runs through Of Mice And Men is of dreams and how they go wrong. The title of the book is very appropriate to this theme as it comes from a poem by Robert Burns called To A Mouse, On Turning Up Her Nest With TheRead MoreThe Crucible and the Mice of Men Essay2059 Words   |  9 PagesThe Crucible and Of Mice and Men John Steinbeck’s novel, Of Mice and Men, and Arthur Miller’s play, The Crucible, both have similarities and differences that appear through the history of the United States, prejudice, and also through the themes. Of Mice and Men and The Crucible, share the similarity of teaching the history of the United States throughout the pieces. In the novel, Of Mice and Men, the reader will be able to learn the history of the United States through the writing style of