Monday, January 27, 2020

Advantages And Disadvantages Of Firewalls Computer Science Essay

Advantages And Disadvantages Of Firewalls Computer Science Essay A firewall is a boundary or a wall to keep intruders from attacking the network. The firewall is network device that is in between a private network and the internet. The firewall is configured to inspect network traffic that passes between the network and the internet. We can assign rules or protocols to the firewall to allow data to be shared. If the protocol isnt included in the approved list it would destroy or discard the packet of data and deny it from entering the network. When a private network is connected to the internet it allows the people to access information from external sources .when the network is connected to the internet it also allow external uses to enter the private network and steal information from the network. To prevent unauthorized access organizations has firewalls to protect them. There are mainly two types of firewalls. Software firewalls and hardware firewalls. A firewall provides configurable network access, authentication before accessing services and other services as well. Scope I will be covering only the 3 types of firewall types, the characteristics of firewalls, types of attacks to an organization, other devices that can be used in place of a firewall. I wont be covering the configuration of firewalls. Firewall What is a Firewall There are basically two types of Firewalls. They are software and hardware Firewall. A firewall is a software or hardware that filters all network traffic between your computer, home network, or company network and the internet. As shown in figure 1 the firewall usually sits between a private network and a public network or the internet. As shown in figure 1 a firewall is kept in the boundary of the privet network and the public network or internet. Figure Firewall A firewall in a network ensures that if something bad happens on one side of the firewall, computers on the other side wont be affected. Depending on the firewall type there many features such as antivirus guard, intrusion prevention etc. Type Of attacks (http://technet.microsoft.com/en-us/library/cc959354.aspx) There are many types of attacks to a network. These are some of them IP Spoofing Attacks IP Spoofing Attacks are where an attacker outside the network may pretend to be a trusted computer either by using an IP address that is within the range of IP addresses for the local network or by using an authorized external IP address that has authorized access to specified resources on the local network. Denial of Service Attacks(DoS Attacks) Denials of Service Attacks are attacks just to make a service unavailable for normal use by flooding a computer or the entire network with traffic until a shutdown occurs because of the overload. The attacker can also block traffic, which results in a loss of access to network resources by authorized users. Denial of service attacks can be implemented using common internet protocols, such as TCP and ICMP. Sniffer Attack A sniffer attack is an application or device that can read, monitor, and capture network data exchanges and read network packets. If the packets are not encrypted, a sniffer provides a full view of the data inside the packet. Even encapsulated (tunnelled) packets can be broken open and read unless they are encrypted. Man in the Middle Attack As the name indicates, a man in the middle attack occurs when someone between you and the person with whom you are communicating is actively monitoring, capturing, and controlling your communication transparently. To prevent such attacks a computer or network should implement a firewall to the companys specifications, so that the firewall will protect the network without been a problem for the employees of the company. Types of Firewall (Google book) Packet filtering routers Packet filtering routers were the first generation of firewall architectures to be invented. Packet filtering firewalls work at the network level of the OSI model, or the IP layer of TCP/IP. As shown in figure 2 a Packet filtering routers will be placed between the boundary of the private network and the public network or internet. Packet filtering routers can provide a cheap and useful level of security to the network. Depending on the type of router filtering can be done at the incoming, outgoing interfaces or both interfaces. Packet filters work by applying a set of rules to each incoming or outgoing packets.The rules are defined based on the network security policy of the enterprise. According to these set of rules the firewall can forwarded or drop the packet. A packet filtering router is able to filter IP packets based on the Source IP address Destination IP address TCP/UDP source port TCP/UDP destination port Packet filters works well for blocking spoofed packets. It also can be used for Block connections from specific hosts or networks Block connections to specific hosts or networks Block connections to specific ports Block connections from specific ports Figure Packet filtering routers The three types of filtering firewall Static Filtering It is one of the oldest firewall architecture and it operates in the network layer. The administrator can define rules which packets are accepted and which packets are denied. The static filter will scan for IP header data and TCP header data. Advantages of Static Filtering Low impact on network performance. Low cost included in many operating systems. Disadvantages of Static Filtering Because it operates in the network layer it examines only the IP header and TCP header. It is not aware of the packet payload. Offers low level of protection. Dynamic Filtering Dynamic Filtering works on the network layer. These firewalls are the most common sort of firewall technology .The decision will to deny or allow the packet will be based on the examination of the IP and protocol header. Dynamic filter can differentiate between a new and an established connection. After a connection is established its information is kept in a table in the router. Advantages of Dynamic Filtering Lowest impact on network performance Low cost Because it can differentiate between a new and an established connection it increases performance. Disadvantages of Dynamic Filtering Because it operates in the network layer it examines only the IP header and TCP header. Provide low level of protection Stateful Inspection Stateful inspection is a technology that is similar to dynamic filtering, with the addition of more granular examination of data contained in the IP packet Advantages of using firewalls based on packet filtering Low cost. Packet filters make use of current network routers. Makes Security Transparent to End-Users. Easy to install. Packet filters make use of current network routers. Therefore implementing a packet filter security system is typically less complicated than other network security solutions. High speed Packet filters are generally faster than other firewall technologies because they perform fewer evaluations. Disadvantages of using firewalls based on packet filtering Packet filters do not understand application layer protocols. Packet filters does not offer any value-added features, such as HTTP object caching, URL filtering, and authentication because they do not understand the protocols being used. Packet filtering routers are not very secure. Cant discriminate between good and bad packet New rules may be needed to be added if an employee needs special requirements to connect to the internet. Difficulty of setting up packet filtering rules to the router There isnt any sort of user based Authentication. Packet filter cannot authenticate information coming from a specific user. (http://www.cse.iitk.ac.in/research/mtech1997/9711107/node14.html) Circuit level gateways Circuit level gateways are the second generation of firewall architectures. Circuit level gateways work at the session layer of the OSI model. It is basically a packet filter with additional features. In figure 3 shows a circuit level gateway works. The circuit level gateway examines and validates TCP and UDP sessions before if open up a connection or circuit through the firewall. So it will provide more security than the static packet and dynamic packet filter. The decisions to accept or deny packet is based on examining the  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Source address  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Destination address  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Application or protocol  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Source port number  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Destination port number Figure Circuit level gateways (William Stallings,) Advantages of firewalls based on Circuit level gateways Less impact on network performance. Breaks direct connection between the untrusted host and trusted client. Higher level security than the packet filter firewalls.. Disadvantages of firewalls based on Circuit level gateways Does not examine the packet payload. Low to moderate security level. Application level gateways The third generation of firewall architectures is called Application level gateways. Application level gateways are capable of inspecting the entire application data portion of an IP packet. When a computer sends a request to the internet the firewall inspects the entire packet against the rules configured by the network or firewall administrator and then regenerates the entire Internet request before sending it to the destination server on the Internet. The returned result will then again will be inspected, if the result meet the requirement of the rules then it will be allowed to pass through the network and into the network, then the firewall will create a response packet and send it to the corresponding computer. If the result does not meet the requirement of the rules then it will be blocked from passing through the network. The figure 4 shows an Application level gateway. Figure Application level gateways Advantages of Application level gateways The application proxy can inspect the entire application portion of the IP packet. This inspection happens both when the Internet request is sent and when the reply packet from the Internet server is returned. Highest level of security Because the application proxy understands the application protocol, it can create a much more detailed log file of what is sent through the firewall. Packet filter log files know only about the IP packet header information. The internal computer and the server on the Internet never have a real connection, because the firewall inspect the packet and then regenerates it. Proxy services understand and enforce high-level protocols, such as HTTP and FTP. Proxy services can be used to deny access to certain network services, while permitting access to others. Disadvantages of Application level gateways Application level gateways require great memory and processor resources compared to other firewall technologies. Have to create filter rule for each application individually. Must be written very carefully Vendors must keep up with latest protocols Software firewall For home users software firewalls are the most popular firewall choices. In figure 5, 6 and 7 are some of the most popular software firewalls in the market. Software firewalls are installed on your computer or server computer like any other software .The firewall can be customize it if necessary allowing you some control over its function and protection features. A software firewall will protect your computer from unauthorized access to the network or home pc and in most software firewall it provides protection against Trojan programs, e-mail worms, antivirus, antispyware and intrusion detection etc.  Software firewalls will only protect the computer they are installed on and not the whole network, so each computer will need to have a software firewall installed on it. There are vast numbers of software firewalls to choose from. A good software firewall will run in the background on your system and use only a small amount of system resources. It is important to monitor a software firewall once installed and to download any updates available from the developer. Norton Internet Security Figure Norton Internet Security Zone Alarm Extreme Security Figure Zone Alarm Extreme Security Kaspersky Internet Security Figure Kaspersky Internet Security Hardware Firewalls As seen in figure 8 hardware firewalls can be purchased as a stand-alone product, in present hardware firewalls are integrated in broadband routers. These will be very important for people with broadband connection for their company network. Hardware firewalls can provide better security and reduce the performance loss by using dedicated memory and processing power .They also can protect every machine on a local network. Most hardware firewalls will have a minimum of four network ports to connect other computers. A hardware firewall  uses packet filtering to examine the header of a packet to determine its source and destination. This information is compared to a set of administrator created rules that determine whether the packet is to be forwarded or dropped. Figure Hardware Firewalls Firewall Characteristics Design goals of a firewall Every firewall has design goals. Because if the firewalls does not achieve these design goals the firewall will be a huge security risk to an organizations network. According to the security policy only Authorized traffic should pass through the firewall. All inbound and outbound traffic should pass through the firewall. The firewall should be immune to penetration. Four general techniques to control access Service control Determines the types of Internet services that can be accessed, inbound or outbound Direction control Determines the direction in which particular service requests are allowed to flow User control Controls access to a service according to which user is attempting to access it Behavior control Controls how particular services are used. Advantages of Using a Firewall A Company network or a home computer will have number of advantages when using a firewall. They are more cost effective than securing each computer in the corporate network since there are often only one or a few firewall systems to concentrate on. There are some firewalls which are able to detect viruses, Trojans, worms and spyware etc. There are Disadvantages of Using a Firewall Even if a firewall helps in keeping the network safe from intruders, but if a firewall is not used properly it would give a false impression to you that the network is safe. The main disadvantage of a firewall is that it cannot protect the network from attacks from the inside. They often cannot protect against an insider attack. Firewalls cannot protect a network or pc from viruses, Trojans, worms and spyware which spread through flash drives, potable hard disk and floppy etc. They may restrict authorized users from accessing valuable services. They do not protect against backdoor attacks. They cannot protect the network if someone uses a broadband modem to access the internet. (http://www.linktionary.com/f/firewall.html)must see Other devices that could be used in place of firewalls Antivirus Software Antivirus software is a programme detects and prevents malicious software programs such as viruses and worm. Malicious software programs are designed to infiltrate the computer network through the internet connection and cause damage to the system. These programmes are installed without the users knowledge. To prevent such programmes from been installed an antivirus has to be installed in every computer on the network. To prevent the latest malware from infecting the computers the antivirus software has to be up to date with the latest antivirus definitions from the developer. E.g.:- Norton antivirus, Kaspersky antivirus etc. Spyware Software Spyware is a type of malware that is installed in the pc without the knowledge of the user, it secretly collects personal information and monitors browsing activities of the computer user. Like antivirus software spyware software has to be updated regularly with the latest definitions. Most antivirus softwares has spyware protection. E.G.:-Spyware doctor, Norton antivirus etc. The purpose of using these devises Critical Analysis In todays world there are so many security risk a computer network cannot be fully protected. Even if a firewall gives protection from outside intruders it cannot protect the network from the inside. I have analyse the network security and come to a conclusion that network to be secured, they should use a hardware firewall to inspect all the outbound and inbound request and a software firewall to protect from other threats such as malware, Trojans, viruses, worms etc. In todays world there are many hackers who would want to hack a company for fun or for money and there are thousands of viruses rereleased to the internet every day. Threats can attack a network of computers in many ways, for example if the firewall allows emails to be sent and received and if an infected email is sent by an intruder, it will pass through the firewall and infect all the computers in that privet network. A software firewall may be considered as an antivirus guard which has a firewall, so this means that this type of software firewalls has more features than just only the firewall. It may have antivirus, spyware, intrusion, browser, email protection and may have many other features as well. As Ive taken the example of the email when the email is been received it will be scanned and filtered if it is detected as spam mail or it will be allowed to enter the network. Because the viruses are becoming more advance the software firewalls has become more advance in detecting threats. Some antivirus software uses three main different approaches to detect threats. They mainly use definition based detection. This is where the software detects viruses and other threats by checking for a known malicious code with the definitions and be removed or deleted. The second main approach is where the software uses is behaviour based detection. This is where the software looks at the installed software or downloaded softwares behaviour. If the software behaviours in suspicious manner where it is collection personal information without the users knowledge it will be removed. Behaviour based detection is more of an advance approach for antivirus software because it does not need the virus definitions to detect threats, it will detect threats even before the virus definitions are been downloaded. The third main approach is cloud based detections. This is where the antivirus company keeps a record of known suspicious and dangerous software in their databases, which has been collected by the antivirus company over the past years. If a user downloads software the antivirus guard will check the downloaded software with their companys databases of known suspicious and dangerous software to see if it is a threat or not to the user. These three approaches of a software firewall will help keep the network safer if the hardware firewall fails to detect threats. These antivirus help protect the network from intrusions through another computer or vulnerabilities in a software installed on a computer. This feature scans all ports the network traffic that enters and exits your computer and compares this information to a set of signatures or definitions. These signatures contain the information that identifies an attackers attempt to exploit a known operating system or program vulnerability. If the information matches an attack signature, Intrusion Prevention will automatically discard the packet and breaks or blocks the connection with the computer that sent the data. A privet network should have a good antivirus programme with all the above mention features and more. Antivirus software like Norton, BitDefender etc are superior antivirus softwares. So I think if there are both hardware and software firewalls in place in the network it will be more secure to threats and vulnerabilities. This is because if the threat is not detected by the hardware firewall there is a chance that the software firewall will detect it. Because these firewall are becoming more sophisticated with advance technology to detect threats these firewalls will be the next defence if the hardware firewall fails to detect the threat. Conclusion

Saturday, January 18, 2020

Descriptive VS. Narrative, You Decide Essay

Many think that narrative and descriptive styles of writing are one in the same, but they are not. Although they complement each other for a complete story; you can successfully write using one style without the other. The authors Connell, C.M. & Sole, K. define narrative writing as, â€Å"Narration is storytelling from the perspective of a narrator, and the story may be true, false, imaginary, or a combination.† (2013, chapter 6.3). When you tell a story you want your readers to experience it through your words as if they were there when it happened. Connell, C.M. & Sole, K. define descriptive writing as, â€Å"Description is a pattern of writing that can be defined as painting pictures with words.† (2013, chapter 6.4). A descriptive story leaves no detail unrevealed and appeals to all of your senses. When comparing Maya Angelou’s descriptive poem â€Å"Caged Bird† and Judy Brady’s narrative essay â€Å"I Want a Wife†, it is clear that there many similarities and differences between the two styles of writing. However, because Maya Angelou’s poem has descriptive language that appeals to your five senses, specific detail descriptions and uses figurative language to compare the unfamiliar with something more familiar it makes it a superior piece of literature. In the narrative style essay written by Judy Brady (1971), â€Å"I Want a Wife†, she uses out right sarcasm and exaggeration with a slight humorous tone. This demonstrates her stance on the unrealistic demands that were placed on women in that era. She starts off her essay stating â€Å"I belong to that classification of people known as wives. I am A Wife. And, not al-together incidentally, I am a mother† (1971). As if being a wife and a mother was almost an undesirable task to bear in life. I suppose that in the 1900 century it pretty much was to an extent. The way Brady goes on to list the expected duties of her wife, makes her sound more like a servant than anything else. She even mentions her wife performing things like party catering, financially supporting the family and goes so far as to say, â€Å"I want a wife to go along when our family takes a vacation so that someone can continue to care for me and my children when I need a rest and change of scene† (1971). Brady’s narrative essay uses a block arrangement structure, with a priority style order. Brady (1971) begins her story by stating, â€Å"Not too long ago a male friend of mine appeared on the scene fresh from a recent divorce. He had one child, who is, of course, with his ex-wife. He is looking for another wife. As I thought about him while I was ironing one  evening, it suddenly occurred to me that I, too, would like to have a wife. Why do I want a wife?† then she proceeds with an exaggerated list of tasks for her wife to fulfill. From the wife working full time, to caring for her and her children, cooking, cleaning, counseling, playing, pleasing, catering parties, shopping, planning and entertaining, all while Brady just goes to school and lives a carefree and extremely selfish life. In the descriptive poem â€Å"Caged Bird†, written by Maya Angelou in 1983, she uses her talent of vivid and eloquent writing to express her stance on being African-American and living in the United States during segregation and the Civil Rights movement. Although she never actually mentions race in her poem the metaphors that she uses makes it clearly evident. Angelou starts her poem talking about a free bird and his arrogance referring to the Caucasian race. According to Angelou (1983) in â€Å"Caged Bird†, she starts off with a free bird riding the wind’s back, and he’s floating as long as the current will take him; when he â€Å"dips his wing in the orange sun rays† and has the audacity to c laim the sky. Now when she goes on to her second stanza; she speaks about the African-American race as the caged bird. She writes, â€Å"But a bird that stalks down his narrow cage can seldom see through his bars of rage his wings are clipped and his feet are tied so he opens his trout to sing† (1983). In Angelou’s poem, she uses a dramatic order in a point-by-point type structure to describe experiences she witnessed as an African-American person living in America. One way that the descriptive is different from the narrative writing is figurative language. Figurative language is the comparison of something unfamiliar to something familiar in order to paint a clear picture. â€Å"Cages Bird† (1983) has a clear example of this in the second stanza, which says, â€Å"But a bird that stalks  down his narrow cage  can seldom see through  his bars of rage  his wings are clipped and  his feet are tied  so he opens his throat to sing.† From this quote, you can see that the bird stalks down his narrow cage like a prisoner in a cell and the bird can seldom see through his bars of rage also  refers to a prisoner in a cell. Much like how slaves were imprisoned on the plantations in the south. On the other hand, the narrative essay â€Å"I Want a Wife† does not rely on fugitive language; instead it just uses concrete language without the extra detail that appeals to the five senses. Another way descriptive writing is different from narrative writing is the use of specific detail description. It is clearly visible in the fourth stanza of â€Å"Caged Bird†. Angelou (1983) writes, â€Å"The free bird thinks of another breeze  and the trade winds soft through the sighing trees   and the fat worms waiting on a dawn bright lawn   and he names the sky his own.†   In her description of the trade winds soft through the sighing trees and the fat worm on the dawn bright lawn. However, in â€Å"I Want a Wife† Brady (1971) merely writes, but without detail. Instead she says, â€Å"I want a wife who is a  good nurturing attendant to my children, who arranges for their schooling, makes sure that they have an adequate social life with their peers, takes them to the park, the zoo, etc.†Ã‚  As you see Brady doesn’t use specific detail in her writing just simple concrete words. Another highlight to Angelou’s writing style was her use of alliteration; which is defined in Essentials for College Writing as â€Å"repetition of initial consonants in words in a series† Connell, C.M. & Sole, K. (2013). An example of her alliteration would be, â€Å"The free bird thinks of another breeze and the trade winds soft through the sighing trees  and the fat worms waiting on a dawn bright lawn   and he names the sky his own.  But a caged bird stands on the grave of dreams   his shadow shouts on a nightmare scream   his wings are cl ipped and his feet are tied   so he opens his throat to sing. The free bird thinks of another breeze and the trade winds soft through the sighing trees and the fat worms waiting on a dawn bright lawn and he names the caged bird sky his own. But a caged bird stands on the grave of dreams  his shadow shouts on a nightmare scream his wings are clipped and his feet are tied so he opens his throat to sing. You see it in the trade winds soft through the sighing trees and in his shadow shouts on a nightmare scream† (1983). With Angelou’s careful selection of words you can almost feel the pain and despair of the caged bird; as well as see the free bird floating through the air in the warm orange sunlight. Although Brady also uses alliteration she uses mostly the same words which are â€Å"I Want a Wife Who Will† (1971). Then she follows with naming a chore of some kind but mostly cooking or cleaning. In conclusion, when considering which of the two forms of literature was superior to the other, not just for personal preference. I would have to deem the descriptive style of Angelou’s writing to be a better overall polished piece of work. Not only does it provide extensive language to portray its message with detail to the most important parts of its story. Like bringing the characters to life and shining light on important social issues, but also submitting a few subtle details in the technique used to compose the text. Like alliteration and metaphors so that parts of her short poem stick out and stay with you more so than others. I believe the more magnificent and detailed the picture is that your words paint, the more impact it will have on its audience. This is something that she was well aware of, so the way Maya Angelou selected her words helped to give her audience a sense of pathos. It also helped to shine light once again on the views and opinions she felt so strong ly about in society.

Friday, January 10, 2020

Positive aspects of tourism

The rise in tourism has occured for many reasons.My first example is; over the past few years an incresseing amount of people in More Economically Developed Countries (MEDC'S) have much more time and money to spend. Because of this, more people in MEDC'S can spend more time and money going on holiday. My second example is that transport has been made much more comfortable, cheaper and quicker to use which has made more people pursaded to travel, because lots of places in the world can now be reached easily. My third point is that Tourists might want ot learn about new cutures and other, different life styles which might incresse the amount of toursim. My fourth and final point is that most holidays come in â€Å"package holidays† or â€Å"family packs† which are usally much cheaper, which will pursaded more people to go on holiday. There are many positive aspects of tourism.For instance, some Less Economically Developed Countries (LEDC'S) see tourism as a way to make there country more devloped so that they can become a more economically developed country, this connectes to the fact that tourism can help LEDC'S build there education system e.g. money to build schools, money for teachers, schools, collage or university. Tourism can help LEDC'S medically e.g. hospitals, money for medcine and treatment, hospital equipment, doctors and nurses and the money to build hospitals. My second point is that tourism in LEDC'S can help more people get jobs aand get more money in the country. Another good aspect of tourism would be that; local teenagers can become independant of there families by getting jobs, and providing money for themselves. Unfortunatley, there are many negative appects of tourism as well, which include; tourists may not respect local customs trodictions, which might offened the local people and other people living in that country. Also the rules in a diffrent country or place might be diffrent to what the tourists is ued to so they might end up offemding or even brakin the law! Even though the country gets money not all of it is atually spent on the country, most of it is atually spent in hotels, which is usally owened by foreign countries. Another bad aspect is that the World Trade Reasurchers Organization (WTRO) have shown that the curren pattern of world trade is not making a diffrence. It showed that LEDC'S are not gettig any richer some have even shown that LEDC'S are getting porrer becuse of the money spent of facilites e.g tourist attractions (buildings-e.x hotels) . Another bad point is that tourusm can lead to crime rate incresses by up to a whooping 49.83% this is almost half! the crime rate is a big issue and is some times uncontrollable. Tourism is managed in diffrent ways. Here are some examples: in Bostwana they have sustanable tourism, this provides jobs and opportunities for the people there without destroying there lifestyles or the enviroment for the future people and animals of Bostwana. They do this by letting tourist experice troditional activities e.g weaving cloth. This is sustanable and it gets more money in the country that can be put to good use e.g farming-for crops/food and there education-money can be put to schooling so more people can go to school. Another example of sustanible tourism is in Tanzania (east Africa) they have sustaible tourism as well e.g they have a national safrai park (Serengeti national park). this is sustanable because they do not harm the amimals as they are kept in wide vast open space to roam about freely, the vewier and tourists always see them from a distance, never to close to startle them. this means they are not harming the amimals in any way, so it is sustaible. In conclusion, I think tourism can be good only if it is sustanible, for example- what they are doing in Bostwana but not if it is unsustanble for example-what they are doing in a place in spain which is ruining ther beach in the end int wont be worth it.but over all i think tourism is good only if sustanible.

Thursday, January 2, 2020

3. Research and explain these gods or goddesses Durga,...

3. Research and explain these gods or goddesses: Durga, Kali, Sarasvati, Ganeshe. The goddess Durga is the protector, vanquishing the demons that threaten Dharma. (Fisher, 2003). She is represented as a beautiful woman with multiple arms that rides a lion, wielding weapons to use to defend the good. The reason she yields so many weapons is to show that one weapon cannot kill different kinds of enemies. (Goddess Durga). Since Durga is the protector of good, she is invoked by the seeker to destroy all his desires and unveil his supreme Self (Morris, 2014). The goddess Kali is compassionate and loving, yet fierce and terrifying. Kali is the destroyer of evil. She is represented as a blue woman, dripping with blood, carrying a severed head†¦show more content†¦He is believed to have the head of an elephant because his father, Siva, removed it when he forbid him access to his mother, Parvati. When Parvati demanded he be restored, an elephants head was the first found (Fisher, 2003). 6. What are the 5 yoga paths? Describe each in detail. Hatha yoga focuses on the body and creating a healthy physical vehicle for spiritual development. This is done through diet, deep breathing, and stretching exercises (Morris, 2014). Ha means â€Å"sun† and tha means â€Å"moon,† signifying that hatha yoga brings the unions of pairs of opposites, in this case the mind and the body. It helps activate the chakras, the centers of energy, and remove blockages in the mind and body. It is also translated as â€Å"forceful yoga,† because it requires a lot of physical effort (Marchand, Hagatha, n.d.). The idea behind hatha yoga is that if you can control and master your breathing, then controlling the mind is within reach. Karma yoga is entirely selfless service. This is done through actions and choices (Marchand, Karma, n.d.). Karma yoga follows the law of dharma, uniting everything and giving back through action. Helping and healing, doing positive actions in order to promote spiritual growth. Bhakti yoga focuses on the love and devotion the bhakta (devotee) bestows by worshipping a god (Morris, 2014). This does not mean that they just worship and love