Saturday, November 16, 2019
Eriksonââ¬â¢s Theory of Life Stages Development: Analysis
Eriksonââ¬â¢s Theory of Life Stages Development: Analysis Aminat Lawal TAQ 1: 2.1 Draw a table similar to the one below and identify the life stages from adolescence onwards in an individualââ¬â¢s life, showing the evidence for each of the stages (Balls, 2013) (Psyche100, 2012) (Stages, 2015) 2.2 Examine the evidence provided to support and dispute Eriksonââ¬â¢s theory of life stage development. One of the strengths of the theory is that it gives an expansive framework from which to view development of a whole lifespan. Additionally, it permits us to underline the social nature of individuals and the vital impact that these social natures have on development. This was created mostly from Eriksonââ¬â¢s broad field research with Native Americans, and afterwards from his clinical treatment works which was attached to driving mental health centres and universities. Over the years, psychologists have collected several information that backs the relationship between each stage and the corresponding age groups to affirm that, identifying and resolving the crisis serves to advance respect towards oneââ¬â¢s self-esteem (Stages, 2015). A study that comprised of school children, their parents and teachers concentrated on the phase of industry versus mediocrity. The results of this study backed the idea of industry being legitimate for age group which demonstrates that an industry score positively connected with test scores and accomplishment in school (Stages, 2015). Many people claim that Eriksonââ¬â¢s ideas are equivocal and regularly conflicting. Some people believe that the theory is more applicable to males than females and that, more consideration is paid to early stages in life and youth than the grown-up life (Cortland, 2015). There is also a discussion concerning whether individuals search for identity or character amid the youthful years or if one stage needs to happen before other stages can be completed. As a response, Erikson expressed that each of these courses of action happens all though a lifetime and also, emphasised on ââ¬Å"stagesâ⬠as it is at these times that the clashes get to be generally conspicuous. The lack of common sense fixing genuine issues stays a standout amongst the most criticisms of Eriksonââ¬â¢s work to date, which is why there are just so few supporters of his work among current psychologists (Stages, 2015). Word: 842 TAQ 2: Essay: ââ¬ËAdolescence is a time of storm and stressââ¬â¢ Adolescence otherwise known as immaturity, portrays the early years somewhere around 13 and 19 of a youngster, and this is viewed as the transitional stage from youth to adulthood. Adolescence is regarded as a period of both bewilderment and discovery which is why it is said to raise certain issues and intense decisions with respect to school tasks, sexuality, social life including drugs and alcohol. (Today, 2015). One major reasons that youngsters find adolescence being a time of storm and stress is on the grounds that it is a period of quick physical improvement and profound passionate changes. They can be seen as exciting advancements but at the same time, uncomfortable for a child to his/her parent. Adolescence or the period of transition can be broken down into three stages; Early adolescence which usually comes around between 11 to 14 Middle adolescence which usually comes around between ages 15 to 17 Late adolescence which usually comes around between ages 18 to 21 (Children, 2014). Quick changes can occur both physically and emotionally at this stage of life. These changes are in combination with attending an educational institution, social time with friends which might bring about the use of drugs and consumption of alcohol (Psychiatrists, 2015). There are psychological and social tasks that take place between the ages of 11 to 21. Physical development: Otherwise known as puberty and Includes hormones and physical changes. The process of physical changes in the puberty stage of life begins continuously from around the age of 13 for males and 11 for females. Hormonal changes produce periods of tiredness and fretfulness. Changes in males include the growth of body, deeper voices, facial hair, wet dreams and erections and in females includes, growth of pubic hair in part of the body and menstrual periods. (Psychiatrists, 2015) Intellectual and emotional development: Majority of male and female youngsters enter puberty as yet observing their surroundings properly where, things are either right, wrong, magnificent or terrible. Youngsters seldom set their sights and minds past the present which clarifies more on the incapability to consider the effect of their actions. At the time most youngsters approach late adolescence, they acknowledge nuances of circumstances and thoughts an also properly work their way into the future. The ability for them to handle complex issues and to sense what other people are thinking would have honed significantly. However because they are still moderately unpractised in life, older adolescents use these new aptitudes inconsistently and consequently, may act without consideration. Emotional development demands that youngsters gradually eject themselves from their parents. There is more time spent with friends socially, less affection and love towards folks and pushing the limits. Youngsters as often as possible feel clashed about leaving the safety net of their homes. They might be need for a slight love and affection from their parent but, just as this happens, they turn away once more (Children, 2014). Additionally, when they test the consumption of alcohol and use of drugs socially alone, they are find themselves in a much more serious peril however, when warnings are issued from older adolescents, they are considered more important than when they come from parents (Psychiatrists, 2015). A teenager could be hit with a cluster of challenges at adolescence. Some of these challenges include emotional, sexual and behavioural problems. Signs of a teenager experiencing emotional storm or stress could include over-consumption of food, inordinate tiredness, and tenacious concern with ones appearance at all times. Tension may also create fears and frenzy assaults and due to this, studies carried out by psychologists recommends that enthusiastic issues are frequently not perceived even by the close relatives and friends of the suffering adolescent. Amid adolescence, most teenagers think so little of themselves in a way that proves life not worth living. The physical changes in adolescent ages brings could bring about sexual stress and issues to a few who are modest and those who donââ¬â¢t seek for information. On the other hand, some other teenagers express this issue with exorbitant gloating about their sexual experience and capacity. There is also the risk of pregnancy an d sexually transmitted diseases (HIV/AIDS) within the age of 16 as most teenagers are eager to have the experience (Psychiatrists, 2015). The understanding of adolescence is based on two approaches of comprehending human behaviour by Erik Erikson and Anna Freud. Erikson believed and concentrated on the dichotomy that is between personality formation and accomplishment of roles while Freud believed that psychological unsettling does influences that are connected with adolescence were biologically based and socially all inclusive. Regardless of their different views they accepted that adolescence was naturally a period of unsettling influence and psychological disarray. Freud believed that the psychological procedure of sexual development which begins with the functionality of sexual glands, does impact the psychological domain. As a result of this, there is an awakening of libidinal strengths which, thus, can lead to psychological disequilibrium. She believes that the following factors are involved in the conflict in adolescence; the strengths of the id drive which is controlled by psychological courses of action amid a dolescence, the self-ability to adapt or to respect instinctual strengths and the adequacy and nature of the safeguard techniques at the disposal of ego (King, 2004). Erikson portrays adolescence by the quickness of body development, genital development and sexual awareness. Also, he describes adolescence as the time amid when an individual must establish a character which is usually established in different ways according to different cultures and evade the dangers of part dissemination and identity disarray. During the time of development of vocational identity, certain role confusion comes around. The constructive result of personality crisis is reliant on a youngsterââ¬â¢s readiness to acknowledge his past and build progression with their past encounters (King, 2004). Also as indicated, identity dissemination can prompt suicidal attempts however, once a personality is made, an adolescent cab proceed onward to discover closeness or detachment in interpersonal connections (King , 2004). According to Stanley Hall youngsters in late adolescence restate the condition of the initiation of modern civilization. His psychology did not see a human as the final product of a formative methodology, it only gave the room for further development (King, 2004). Word 997 TAQ 3: Explore one life event such as marriage, parenthood, divorce or bereavement that you, or someone you know, has experienced. Describe the event, keeping the information in the third person to keep the individualââ¬â¢s anonymity. At the age of 6 ââ¬â 7, the life stage of Industry vs Inferiority, his parents fought a lot in his presence which usually began with a scream, noise and rage which resulted to tears from his mother. Fights went on for a while which resulted in their settlement for a divorce. He stayed with his mother while his father began to see someone else who had a wild social lifestyle of drugs, alcohol consumption and carelessness. After the case of custody, it was settled that he should spend a certain amount of days with his mother and rest with his father. His mother on the other hand had an authoritative style of parenting i.e., she was very strict and did not allow any sort of misbehaviour. This style of shared living went on until the age of 13 15, which is when the adolescent period comes along. The authoritative parenting style of his mother was not his favourite so, he enjoyed spending more time at his fatherââ¬â¢s and his new partner. The wild lifestyle of his fatherââ¬â¢s new partner began to reflect on his adolescent age as a result of the much time he spent there and the thought of freedom away from his motherââ¬â¢s strict parenting. According to Eriksonââ¬â¢s theory, his life stage falls under identity vs role confusion which is where he is to learn the roles he will be indulged in as a grown up. It is also amid this stage of life that his personality will define who he is (McLeod, 2013). He had exposed himself to the possibility of freedom and formed an identity based on the lifestyle of his fatherââ¬â¢s new partner. He suffered from role confusion as he was unsure of where he fitted in the society because of the shared moments between a strict mother, and a carefree father. Word 306 References Balls, B., 2013. eriksons psychosocial development theory. [Online] Available at: http://www.businessballs.com/erik_erikson_psychosocial_theory.htm [Accessed 02 Febuary 2015]. Children, H., 2014. Ages and Stages. [Online] Available at: http://www.healthychildren.org/English/ages-stages/teen/Pages/Stages-of-Adolescence.aspx [Accessed 03 Febuary 2015]. Cortland, 2015. Erik Eriksons 8 Stages of PsychosocialDevelopment. [Online] Available at: http://web.cortland.edu/andersmd/ERIK/crit.HTML [Accessed 02 February 2015]. King, R. M., 2004. Kings Psychology Network. [Online] Available at: http://www.psyking.net/id183.htm [Accessed 04 February 2015]. McLeod, S., 2013. Simply Psychology. [Online] Available at: http://www.simplypsychology.org/Erik-Erikson.html [Accessed 05 February 2015]. Psyche100, 2012. Eriksons 8 Stages Of Life Span Development.. [Online] Available at: http://www.cram.com/flashcards/eriksons-8-stages-of-life-span-development-2143446 [Accessed 02 Febuary 2015]. Psychiatrists, R. C. o., 2015. MENTAL HEALTH AND GROWING UP FACTSHEET. [Online] Available at: http://www.rcpsych.ac.uk/healthadvice/parentsandyouthinfo/parentscarers/adolescence.aspx [Accessed 03 February 2015]. Stages, E. P., 2015. Erik Eriksons Psychosocial Theory. [Online] Available at: http://eriksonspsychosocialstages.wikispaces.com/Erik+Eriksons+Psychosocial+Theory [Accessed 2015 February 2015]. Today, P., 2015. Adolescence. [Online] Available at: https://www.psychologytoday.com/basics/adolescence [Accessed 03 February 2015]. Project Design of ABC Corporation: Security Assessment Project Design of ABC Corporation: Security Assessment ABC Corporation Computer Network Organization ABC Corporation is a big brokering company which is founded in China and has a workforce of about 9,000 situated over different office branches distributed all over. The corporation is setup in Los Angeles. The people that sets up the corporations branch in Los Angeles that helps with the current system which they want it to be dependable, quick, secure and will satisfy any future prerequisites of the organization. The implementation of this system is to offer the following platforms: cloud computing, distributed computing and centralized computing in the network which supposed to be a secure computer network system. Purpose: The purpose if this security assessment report is to provide a documentation outlining security gaps and vulnerabilities the project design of ABC Corporation may have experience and may be a threat to corporate security policies of ABC Corporation. The management will be required to allocate the necessary resources to correct any problems and gaps in its project design security. The management may also decide to accept the risk, since its already an informed risk or a reward analysis. This will make sure that the necessary security controls will work best for ABC company and are integrated into the IT design of ABC company. Scope: The scope is to cover all aspects of the Computer Network Design project since it is aimed at creating a risk free Network System. It will cover both vulnerabilities, risks and security gaps that can be a threat due to insider dealings (people working in the company who might have any malicious intentions) and threats that may come from the outside (people who are part of the workforce) to people who might use these vulnerabilities and security gaps if they come to learn their existence. People that works for the organization is a threat to the organizations computer network design project as those from the outside the fact that they are more accustomed to the working of the system they pose as a much greater threat. Data The ABC Corporation has built a LAN and a WAN system program that can help the association to develop a more extensive network system that can boost the financial frameworks which has more benefits and will deal in the forthcoming years. The ABC Corporation LAN have a topology of frameworks trading contraptions which is to work as switches in the center. They are appropriated and can get to the layers that can indicate the structure jointly with a set up plan. They put all the gadgets together. This technique will redesign the system presentation and dispose not so important interconnections at the same time providing flexibility. At the end of the network, the ABC Corporation has different edge switches. They are to be utilized for Web Access Provider (ISP) Openness, Intrusion Prevention Systems and Firewalls that are deliberate to changes and other square intruders which can offer the use and end gadget framework. This system is designed to assist the partnership specialists with employing any new applications that are urgent and the most efficient operation of new preparation plans for the organization deals and constraints. Methodology Although there are different methodologies of conducting a Security Assessment Report, the best methodologies for ABC Company are the ones that was used to access the vulnerability of ABC Computer Network Design and the risks that company may face. The following methodologies were used to access the security state of ABC Computer Network Design: Requirement study and situation analysis: The situation of the ABC Computer Network Design was analyzed using the wireshark program. Document review: Documents recorded by IT personnel were also reviewed for any information that may be suspicious regarding manipulation of the Computer Network Design of ABC Company. Risk identification: Risk identification was mainly done by using the wireshark program, which analyzed the activities that was going on in the network of a given computer design. Data analysis: Data that stored in the computer network due to previous activities that were conducted within the computer network that has analyzed for any suspicious data that may be due to security gaps in the computer network design of ABC Company. Vulnerability scan: A scan that is conducted in the Computer Network Design to cite any vulnerable in the computer network of ABC company that may pose as a threat. Findings The risk levels of ABC Computer Network were high and the vulnerability described as a critical. This is mainly based on the following findings after the scan of the ABC Computer Network: There were many ports which were open and these ports could be used by hackers to get access into the Computer Network. Most of these hackers are malicious individuals that may send viruses and malwares into the Computer Network or use these privileges acquired to exploit the system. The remote host of the Computer Network was seen to be running on a computer with an OS of Windows version. This computer had a fault in its RPC interface, 98 netbios-ssn and 10 microsoft-ds. The flaw can give a hacker an access to execute some arbitrary codes making them to acquire privileges of the computer system. This weakness can also be utilized by a worm and give an ability to control the host. Some suspicious activities in the Computer Network were also noticed. An example of this was an activity from an unknown user who was using an unidentified OS with a mac address 00:ff:eb:48:41:88 (unknown). All unknown users are supposed to be flagged immediately until their identities is known. In addition to these risks and vulnerabilities identified, insider intimidation also poses a risk to ABC Corporation. Individuals working from within the corporation are a potent a threat to the computer network as risks from the outside. The corporation should choose to care if any of its employees might be using commerce information malevolently for their own benefits. Results After assessment of the security situation of the ABC Company Computer Network Design, there were found to be some security gaps which need to be addressed by the management. These gaps are known by a malicious party that would pose as vulnerable to the computer design of ABC Company Computer Network Design. Since the system administrators have full access of the entire system, they should do a follow up on risks and vulnerabilities. The network administrators would be the best to do the follow up on security gaps identified. Labs Ãâà The computer that I scanned was WINATK01 with IP address 172.21.23.73. The transmission control protocol is a service that links and works between an application program sending information and the internet protocol. It also provides host-to-host connectivity at the internet models transport layer. The transmission control protocol can detect any problem at the lower levels of the transport layers such as poor network connectivity and network congestion.Ãâà There are several vulnerabilities as far as transmission control protocol (TCP) is concerned. The two most used attacks are denial of service whereby the attackers use spoofed IP address and connection hijacking whereas the hacker can eavesdrop on an on-going transmission and takes over one of the receiving ends and goes on with the communication as if is the original recipient. Findings The scan was done using Wireshark vulnerability assessment tool. The following are the transmission control protocol/internet protocol (TCP/IP) discovered; TCP and HTTP. The scan further revealed that there was a security communication provided by the security data transport methods especially contained in MySQL. The components of MySQL are; Connectors (Connector/C, Connector/J, and so forth) MySQL Proxy Communication between master and slave replication servers MySQL proxy is a very vital component which encrypts and compresses information end-to-end for proper security optimization to prevent and avoid possible attacks. MySQL protocal also aids in data transmission just as the TCP. Conclusion In conclusion, the network system that analyzed above was found to be effective in information transmission between the different sources and destinations. The security status was also found to be superb with an end to end encryption provided by the proxy in MySQL. Thus, the vulnerability status can be concluded to be at minimum and attackers cannot easily manipulate their ways to attack the network systems. Recommended safeguards The management should there are no ends left unguarded with firewalls and any other programs which would make the network inaccessible from any unauthorized parties from the outside. The dealings of internal workers too should be closely supervised to make sure employees do not use the system malevolently for their own benefits. The network administrators should also look closely to the network system frequently to make sure that there are no ports left open or no suspicious activities take place either due to internal dealing or from outside of the network.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.