Thursday, January 30, 2020

Cause and Spread of Infection Essay Example for Free

Cause and Spread of Infection Essay 1.1. Identify the differences between bacteria, viruses, fungi and parasites All 4 are different types of pathogens Bacteria is a single celled organism that multiply by themselves. They lives within and on most living and nonliving things. The majority of bacteria’s are harmless and beneficial to the human body but some can cause infectious diseases. A bacterium usually affects one part of the body and doesn’t spread across or through the body. Bacterial infections are normally treated with a cause of antibiotics. Viruses: are made up of genes and proteins that spread throughout the body by invading the body’s own cells so they can reproduce and multiply in the body. They use the body’s cells as a host because they are unable to multiply on their own. They are normally spread directly from human to human. Viruses can be very tough and there are not many effective medicines available for viral diseases. There are currently 21 families of viruses known to cause disease in humans. Fungi: like to grow in warm, moist places. Some fungi can be beneficial to us such as penicillin, but certain types of fungi can be harmful to our health. Like bacteria and viruses, some fungi can act as pathogens. Human fungal diseases can occur due to infection or fungal toxins. Symptoms for fungal diseases can be as common as itching, coughing, fever, wheezing, but they can also be as serious as meningitis or even death Parasites are organisms that use other organism for its survival. They draw nourishment and other needs from its host organism. Parasites that cause infection and disease are known as Pathogenic parasites 1.2. Identify common illnesses and infections caused by bacteria, viruses, fungi and parasites Bacteria: Ecoli/food poisoning, MRSA, CDIF, Sickness and diarrhea Viruses: Common cold, Influenza, Chicken pox, Cold sores, HIV Fungi: Athletes foot, Thrush, yeast infections, Ring Worm Parasites: Tape worms, Scabies, Malaria 1.3 Describe what is meant by â€Å"infection† and â€Å"colonisation† An infection is an invasion of the body by pathogens i.e. Bacteria and viruses which can cause disease and infections Colonisation is when microorganisms live on or in a host organism but do not invade tissues or cause damage 1.4 Explain what is meant by â€Å"systemic infection† and â€Å"localised infection† A â€Å"localised infection† is an infection that is limited to a specific body part or region of the body A systemic infection is when the infection is spread throughout body and affects a number of different organs and tissues 1.5 Identify poor practices that may lead to the spread of infection †¢Not wearing provided personal protective clothing when dealing with personal care and bodily fluids †¢Not changing PPE clothing in-between dealing with service user’s personal care. †¢By walking out in to corridors in PPE clothing whilst in the middle of deal with personal care. †¢Not washing hands correctly †¢Not disposing of solid and wet pads in the correct manner. .2.1 conditions needed for growth of microorganisms Temperature this will be between 8-63 degrees cc this is also called the danger area as bacteria multiply very fast. You will also need food for the bacteria or parasites for feed on. Moisture is another key important fact that will make growth easier Time is another important areas as more time made available as other conditions remain constant makes it easy. 2.2 and 2.4 Infective agents enter the body through open skin, wounds, saliva, blood exchange, oral areas such as mouth, anus. the person infected gets in contact with an infected person and through the media listed and appropriate condition then multiplication will take place and that will lead to infection. 2.3 common sources of infection †¢ Patient as a source for a) Air borne †¢ Patient as a source b) Blood borne †¢ Sexually transmitted †¢ Direct contact †¢ Fecal /oral tansmission †¢ Employees eg MRSA transmission †¢ Animals as source of infection. 2.5 Poor hygiene is most important factor that will always make it likely for any infection to take place. Lack of hand washing, ensuring that we get appropriate treatment and to be contained in one area until we heal or doctor gives us clean bill of health.

Wednesday, January 22, 2020

The Age of Innocence :: Age of Innocence Essays

The Age of Innocence   The Age of Innocence, by Edith Wharton, contains many flat, static characters representing Old New York society. At the apex of that society is Mr. and Mrs. Henry van der Luyden. As the narrator describes, their appearances are rare, but yet these few appearances provide more than enough information for the reader to "know" the characters. This information comes from several sources. The first is the narrator, when most of Old New York society is described. The second reference involves Newland Archer and Mrs. Mingott’s seeking of approval of the van der Luydens and the exchanges that took place. The final instance is the rare occasion of a dinner at the van der Luyden home and the occurrences here. From the information here, readers develop a complete picture of the van der Luydens. At the end of chapter VI, the narrator describes the hierarchy of Old New York. The last family described is the van der Luydens. The narrator writes, "†¦the van der Luydensâ⠂¬ ¦stood above all of them" (50). The narrator blatantly tells us that the van der Luydens are the highest "ranking" family of Old New York society. Just previous to this, the narrator informs the reader that they descended from both British and French aristocracy, supporting the fact that the van der Luydens are the most revered family. Next the narrator makes it known to readers that "[Mrs.] and Mr. van der Luyden were so exactly alike†¦ neither had ever reached a decision without prefacing it by [a] mysterious conclave" (52), this conclave being, "I shall first have to talk this over with my husband/wife." This shows that, one, the van der Luydens cannot be characterized separately for they are exactly alike, and, two, they consult each other before making decisions. Once again the narrator brings forward, quite openly, information about said characters. The narrator’s informing the reader of such facts sets up the reasoning behind the character’s motivations, and the reactions of other characters. One of such instances involves Archer and Mrs. Mingott’s seeking of the advice of the van der Luydens. First, it is important to note that double-checking one’s plans, as Archer does here, indicates the high status of the van der Luydens. Archer and Mrs. Mingott’s having to ask another family for the "proper" thing to do proves their dominance over society and that they are the experts of "good form.

Tuesday, January 14, 2020

Health and social care Essay

Explain how the plan meets the health and wellbeing needs of the individual In health and social care the wellbeing of the individual is essential for all round health and well-being. Using the case of Miss JB, this essay I will explain how my plan will meet the health and wellbeing needs of this individual. To assist this process an action plan have been drawn up to support the short term, mid-term and long term goals of the individual to enable Mr JB to achieve his health and wellbeing needs. NOW TALK ABOUT WHAT HEALTH AND WELL BEING IS A person’s health and well-being is affected by a number of different factors. In general terms, health and well-being can be defined as†¦Ã¢â‚¬ ¦ having a balanced diet (e.g. improved immunity, feeling healthy controlling weight) adequate rest and sleep (e.g. improved concentration, refreshes body, restores energy) regular exercise (e.g. improved fitness, weight control, circulation, mobility) supportive relationships (e.g. friends, family, professionals, improved self-esteem, self-worth) adequate financial resources (e.g. social security benefits, free prescriptions, free dinners, pension, mobility allowance) stimulating work, education and leisure activity (e.g. improve mental ability, valued) According to Mr JB BMI he is considered to be overweight and he does not get much exercise or sleep. Mr JB also lives in a confined space, sharing 2 bedrooms flat with 7 people. He is takes paroxetine and mirtazapine for stress and depression and does not spend any time with his family. Mr JB is at high risk I have created a plan to help improve Mr JB health and well-being. I have suggested the Mr JB move out of his parent’s house and buy a house of his own on a long term goal. I have also suggested to him that he could rent as an alternative action. The benefit of Mr JB owning his own home is he will have his independence, having his own space for him and his family and feel less stress about living with his parents. Having regular exercise will help Mr JB to lose weight; I have suggested that he exercise three times a week on a mid-term goal. For an alternative action he needs to lose 3 st one in 3-6 months. He need to join a gym, drink  more water and eat healthy (five a day fruit and vegetable). The benefits he will get are self-confidence, energy which will help him to spend time with his family, relief of stress and reduce the risk of a heart attack. Regular physical activity can help you prevent or manage a wide range of health problems and concerns, including stroke, metabolic syndrome, type two diabetes, depression, and certain types of cancer, arthritis and falls. Mr JB will also need to take paroxetine gradually. Stop Paroxetine hydrochloride abruptly can cause withdrawal symptoms or cause your original condition to return. In these instances, reducing the dose of Paroxetine hydrochloride gradually over time may reduce the chances of having these problems. Spending quality time and creating happy memories with his family will help reduce stress and strengthen the bond between him and his family which will result in being more relax less stress and help him to stop depending on his medication. I have suggested that he stop smoking because the amount he smoke long term can cause lung cancer, high blood pressure, cardiovascular disease and chronic obstructive pulmonary disease (COPD). Alternatively he should reduce that amount he smoke daily from 10 cigarettes a day to 3 a day and also used Nicorette patches to help him to stop over a period of 6 months on a short term plan. If he decides to follow the plan to stop smoking the result can be rewarding; less stress, reduce headache, feeling less tired, your sense of taste and smell improve and your heart will be less strained and work more efficiently which reduce that chance of lungs cancer and heart diseases. The recommended amount of alcohol to drink for a man is 21 units a week. Mr JB drinks 28 units a week. Your liver processes alcohol. It can only cope with so much at a time. Drinking more alcohol than the liver can cope with can damage liver cells and produce toxic by-product chemicals. The more you drink, and especially above the recommended limits, the greater the risk of developing serious problems such as: liver disease (cirrhosis or hepatitis); cancer; gut and pancreas disorders; depression; anxiety; sexual difficulties; muscle and heart muscle disease; high blood pressure; damage to nervous tissue; serious accidents; obesity (alcohol is calorie-rich). Also can mental health problems, including depression, anxiety, and various other problems. I have suggested that Mr. JB reduce his alcohol intake by 19  units a week which is just under the recommended amount. The benefit of reducing his intake will reduce his chance of liver disease; You will immediately start having more money, reduce calories in take, Your liver will begin to rejuvenate All the little aches and pains throughout your body will slowly but surely go away, Your natural energy will slowly but surely return, You will find joy in all the little things of life, Your family will love the new you When I created this plan for Mr JB I thought about his preferences and circumstances I have chosen long term, mid-term and short term goal for him to achieve. I thought about what are his favourite five a day and encourage him to buy the and gradually introduce new ones if need. Mr JB like the idea of going to the gym so I suggested he join one, he work on shift base, so when he is on late shift I suggest that he take his younger child to school in the morning and pick them up when he is on early shift which will enable to spend more time with his children.

Monday, January 6, 2020

Investigating Website

Investigating Website Introduction The advancement of technology has enabled businesses to seek technological solutions to improve operational efficiency. Companies have realized that operating on the frontiers of technology drives success and boosts the quality of service. However, regardless of the many benefits that technology brings, various challenges affect its adoption. Hacking has become a big concern for most organizations. Some of the software solutions used in businesses possess security risks as they are as vulnerable to attacks. Hackers are individuals with advanced skills in information technology and spend most of their time analyzing the vulnerabilities exposed by these solutions to find ways to penetrate the organizational systems. Established companies face the risk of hacking as the primary goal of these individuals is monetary gain by exposing sensitive company information including financial statements and trade secrets. They use sophisticated hacking tools that bypass the security perimeters put in place. Significantly, adhering to the security best practices can go a long way in discouraging hacking. Factors such turning on software updates, using the current versions, using strong antiviruses, and using monitoring tools such as IDS (intrusion detection systems) and IPS (intrusion prevention systems) can help mitigate these risks before they cause harm to the infrastructure in place. Fundamentally, the internet is considered insecure as it is not regulated. As such, users might download malware while visiting unverified sites that might compromise the system. As such, using firewalls and other monitoring tools can block the unwanted packets, thus serving as an additional layer of defense. Choosing the right network devices and software for the IT infrastructure is essential. Apart from improved efficiency, the software from recognized vendors ensures high security as they have enhanced features that block some common security threats. Software vulnerabilities and how to mitigate them Cross-scripting is one of the main attacks that affect systems in the contemporary society. This attack involves initiating malicious payloads into vulnerable web applications and software such as PAN-OS. Essentially, the hacker injects unencoded input into the output the web application generates. Most users usually visit unverified sites in the workplace during their free time to access information about entertainment, shopping experience, and general information about politics. Most of these sites might have malicious scripts injected in the web pages visited by end-user that might download into the computer. In many cases, these untrusted websites pop up with an attractive deadline to lure the end user to click on them. The hacker uses this opportunity to administer browser-side scripts to the targeted and unsuspecting end-user. Since the internet does not have security parameters to filter which content is malicious, the attackers take advantage to initiate attacks of this natur e. There exist two XSS attacks: reflected and stored attacks. For stored attacks, the injected scripts are severe and persistent as they permanently embed in the target end-users computer in the form of logs. When the user revisits the same site, the malicious script is replicated and it is permanently stored in the application database. On the other hand, the reflected attack appear when the injection is manifested in the form of error message when the end user tries accessing the website. Most of the reflected attacks are initiated by clicking web links that appear in emails. For instance, they tend to trick the user that he/she has won a prize and needs to click on the provided link to claim. The user is then prompted further to input personal details such as an email and phone number after which the script will be embedded into the target users email. Consequently, these two types of scripting attacks cause annoyance. They usually hijack the users sessions by redirecting to othe r sites that the customer did not request. This might lead to installing other malware such as Trojan horse and modifying content presented in the existing sites. There have been instances where cross-scripting attacks have resulted in changing the financial information of companies including their stock prices in the market. Other reports indicate that these attacks have compromised healthcare information by modifying prescribed dosage resulting in under-dose, or overdose. On the other hand, Synology and DSM software allow an authenticated-remote user to download any system file. The software does not consider the privileges each user as while accessing files. This possesses as a threat as the attack can use this capability to initiate cross-site scripting. However, ensuring the best practices when using the internet can help mitigate this type of attack. Firstly, users should be discouraged to access any site that is not https (secure). Http websites are untrusted as hackers use such site to initiate attacks. Also, it is advisable to refrain from clicking on any site that pop-up into the browser. Some of these attacks assume the exact links of the original site, and it is difficult sometimes to tell if they are fake. As such, always search the real company information by manually typing their links. Kerberos key distribution center (KDC) affects window server 2012 R2 and other older versions. This vulnerability grants users who sign into an active dir ectory domain system remotely administrative privileges using invalid session signature. By having administrative privileges, the hacker can access any computer belonging to the same domain. Microsoft is working countering this attack in future. On the other hand, versions of windows operating system exhibit a number of vulnerabilities including file sharing permissions, insufficient firewall protection, and lack of malware protection. Essentially, the file sharing capability in Windows 7 and 8.1 grants everyone on the network permission to access files from a file server located in another computer. This is risky as anyone on the network can access such file and inject scripts into the system corrupting all files. Also, the firewall feature present in the OS is inefficient as it cannot block all untrusted applications that masquerade as trusted. Also, it is incapable of filtering packets from the internet and blocking malicious ones. However, installing strong antivirus such as Kaspersky can help block unwanted programs. Also, installing host-based intrusion prevention software monitors malicious packets and blocks them. Hardware vulnerabilities and how to mitigate them Hardware components such as routers, PCs, Switches, Firewall, and servers also present a number of weaknesses. For instance, CAM table attack is common among switches. When the attackers gain unauthorized entry into the local area network, they flood the switch with mac-address until it becomes full; thus can listen to any frame across the network since it now acts as a hub. However, port security can help mitigate this problem by only enabling the switch to learn a specified number of mac addresses. In routers, especially, those that do not have firewall feature enabled. The attack can send requests through SQL injection to the local area network from the internet, accessing personal credentials of the users. As such using network-based honeypots and IPS (Intrusion Prevention systems) can help block such requests from the outside. Concerning the firewall, lack of creating zone to distinguish trusted zone and untrusted zone can pose a threat as anyone can easily infiltrate the system . To mitigate this problem, the administrator can implement the firewall functionality by using ACL command to filter and inspect packets. In summary, the ability to have the right measures in place for combating security vulnerabilities can help the company avoid losses. As such choosing the right software solutions and hardware is fundamental in securing the system from both the internal and external attacks