Monday, May 18, 2020

A Timeline of the Suez Crisis

Learn what events lead to the Suez Crisis, which was an invasion of  Egypt  in late 1956. 1922 Feb 28:  Egypt is declared a sovereign state by Britain.Mar 15:  Sultan Faud appoints himself King of Egypt.Mar 16:  Egypt achieves  independence.May 7:  Britain is  angered over Egyptian claims to sovereignty over Sudan. 1936 Apr 28:  Ã‚  Faud dies and his 16-year-old son, Farouk, becomes King of Egypt.Aug 26:  Draft of Anglo-Egyptian Treaty is signed. Britain is allowed to maintain a garrison of 10,000 men in the  Suez Canal Zone and is given effective control of Sudan. 1939 May 2:  King Farouk is declared the spiritual leader, or Caliph, of Islam. 1945 Sept 23:  Egyptian government demands complete British withdrawal and the cession of Sudan. 1946 May 24:  British premier  Winston Churchill  says the Suez Canal will be in danger if Britain withdraws from Egypt. 1948 May 14:  Declaration of the Establishment of the State of Israel by David Ben-Gurion in Tel Aviv.May 15:  Start of the first Arab-Israeli War.Dec 28:  Egyptian premier Mahmoud Fatimy is assassinated by the  Muslim Brotherhood.Feb 12:  Hassan el Banna, leader of the Muslim Brotherhood is assassinated. 1950 Jan 3:  Wafd party regains power. 1951 Oct 8:  Egyptian government announces that it will eject Britain from the Suez Canal Zone and take control of Sudan.Oct 21:  British warships arrive at Port Said, more troops are on the way. 1952 Jan 26:  Egypt is placed under martial law in response to wide-spread riots against the British.Jan 27:  Prime Minister Mustafa Nahhas is removed by King Farouk for failing to keep the peace. He is replaced by Ali Mahir.Mar 1:  The Egyptian Parliament is suspended by King Farouk when Ali Mahir resigns.May 6:  King Farouk claims to be a direct descendant of the prophet Mohammed.July 1:  Hussein Sirry is new premier.July 23:  Free Officer Movement, fearing King Farouk is about to move against them, initiate a military coup.July 26:  Military coup is successful, General Naguib appoints Ali Mahir as prime minister.Sept 7:  Ali Mahir again resigns. General Naguib takes over the post of president, prime minister, minister of war and commander-in-chief of the army. 1953 Jan 16:  President Naguib disbands all opposition parties.Feb 12:  Britain and Egypt sign a new treaty. Sudan to have independence within three years.May 5:  Constitutional commission recommends 5,000-year-old monarchy be ended and Egypt become a republic.May 11:  Britain threatens  to use force against Egypt over the Suez Canal dispute.June 18:  Egypt becomes a republic.Sept 20:  Several of King Farouks aides are seized. 1954 Feb 28:  Nasser challenges President Naguib.Mar 9:  Naguib beats off Nassers challenge and retains the presidency.Mar 29:  General Naguib postpones plans to hold parliamentary elections.Apr 18:  For a second time, Nasser takes the presidency away from Naguib.Oct 19:  Britain cedes Suez Canal to Egypt in new treaty, two year period set for withdrawal.Oct 26:  Muslim Brotherhood attempt to assassinate General Nasser.Nov 13:  General Nasser in full control of Egypt. 1955 Apr 27:  Egypt announces plans to sell cotton to Communist ChinaMay 21:  USSR announces it will sell arms to Egypt.Aug 29:  Israeli and Egyptian jets in fire-fight over Gaza.Sept 27:  Egypt makes deal with Czechoslovakia -- arms for cotton.Oct 16:  Egyptian and Israeli forces skirmish in El Auja.Dec 3:  Britain and Egypt sign agreement granting Sudan independence. 1956 Jan 1:  Sudan achieves independence.Jan 16:  Islam is made state religion by act of Egyptian government.June 13:  Britain gives  up Suez Canal. Ends 72 years of British occupation.June 23:  General Nasser is elected president.July 19:  US withdraws financial aid for Aswan Dam project. The official reason is Egypts increased ties to USSR.July 26:  President Nasser announces a plan to nationalize Suez Canal.July 28:  Britain freezes Egyptian assets.July 30:  British Prime Minister Anthony Eden imposes an arms embargo on Egypt, and informs General Nasser that he can not have the Suez Canal.Aug 1:  Britain, France, and the US hold talks on escalating the Suez crisis.Aug 2:  Britain mobilizes armed forces.Aug 21:  Egypt says it will negotiate on Suez ownership if Britain pulls out of the Middle East.Aug 23:  USSR announces it will send troops if Egypt is attacked.Aug 26:  General Nasser agrees to five nation conference on Suez Canal.Aug 28:  Two British envoy s are expelled from Egypt accused of spying.Sept 5:  Israel condemns Egypt over Suez crisis.Sept 9:  Conference talks collapse when General Nasser refuses to allow international control of the Suez Canal.Sept 12:  US, Britain, and France announce their intention to impose a Canal Users Association on the management of the canal.Sept 14:  Egypt now in full control of the Suez Canal.Sept 15:  Soviet ship-pilots arrive to help Egypt run the canal.Oct 1:  A 15 nation Suez Canal Users Association is officially formed.Oct 7:  Israeli foreign minister Golda Meir says the UN failure to resolve the Suez Crisis means they must take military action.Oct 13:  Anglo-French proposal for the control of the Suez Canal is vetoed by the USSR during the UN session.Oct 29:  Israel invades  the Sinai Peninsula.Oct 30:  Britain and France veto USSR demand for Israel-Egypt cease-fire.Nov 2:  UN Assembly finally approves a cease-fire plan for Suez.Nov 5:  British and French forcesà ‚  involved in the airborne invasion of Egypt.Nov 7:  UN  Assembly votes 65 to 1 that invading powers should quit Egyptian territory.Nov 25:  Egypt begins to expel British, French, and Zionist residents.Nov 29:  Tripartite Invasion  is officially ended under pressure from UN.Dec 20:  Israel refuses to return Gaza to Egypt.Dec 24:  British and French troops depart Egypt.Dec 27: 5,580 Egyptian POWs exchanged for four Israelis.Dec 28:  Operation to clear sunken ship in Suez Canal starts. 1957 Jan 15:  British and French banks in Egypt are nationalized.Mar 7:  UN  takes over the administration of the Gaza Strip.Mar 15:  General Nasser bars Israeli shipping from Suez Canal.Apr 19:  First British ship pays Egyptian toll for use of the Suez Canal.

Wednesday, May 6, 2020

Comparing The Egyptians And The Mesopotamians Essay

Issa Hawa Hawa 1 Teacher Ms. Smith Pre-AP World History Oct 6, 2016 Comparing the Egyptians and the Mesopotamians Egyptians and the Mesopotamians were neolithic civilizations. They both grew crops and they both relied on agriculture and had many rulers as time went on. We start at Egypt In 3100 B.C and Mesopotamians at 5000 B.C (1). The Nile river was a key place for the start of the Ancient Egyptian empire. Egyptians themselves were located near lower Egypt closeby the Nile Delta. They then slowly moved up around upper egypt. With clear fertile and rich soil, agriculture was most efficient and made the Ancient Egyptians very rich. Mesopotamians also had their own rivers known as the Tigris and Euphrates Rivers which were rich in soil for farming. Mesopotamians were located around Zagros Mountains and located inside the Persian gulf. Mesopotamians were Mediterraneans. Egyptians and the Mesopotamians were very alike. Equal rights between men and women existed in both of the empires societies. (2). This is important because the demographics of females were not small in Ancient Egypt and Ancient Mesopotamia. Also, the religion of both empires were polytheistic (Meaning â€Å"many gods†) (2). Because the gods controlled Egypt and Mesopotamia through land and powe r, people dedicated a large portion of their time to the gods. An example is that templesShow MoreRelatedEgypt Mesopotamia Comparison961 Words   |  4 PagesEgypt and Mesopotamia Comparison In order to completely understand the relationship between two events, comparing and contrasting is necessary. Through comparing similarities and differences it is easier to analyze why things developed and occurred the way they did. For example, in comparing Egypt and Mesopotamia it will be easier to achieve understanding of major aspects of their culture, the way other cultures impacted them, and their influence on the future. InRead MoreMesopotamia and Egypt Comparative Essay876 Words   |  4 PagesHistory AP-3 21 September 2011 Mesopotamia and Egypt Comparative Essay While both the Egyptian and Mesopotamian civilizations share similar political, social and economic qualities, the details of these broad spectrums branch off in opposite directions. For example, both Mesopotamia and Egypt were ruled by kings, but in Egypt, their kings were called pharaohs and they had significantly more power than the Mesopotamian kings of the city-states. Both civilizations also had social classes in which a personRead More Comparing Mesopotamia and Egypt Essay1100 Words   |  5 PagesComparing Mesopotamia and Egypt Before the beginning of history, people from across the land gradually developed numerous cultures, each unique in some ways while the same time having features in common. Mesopotamia and Egypt are important to the history of the world because of religious, social, political and economic development. Mesopotamia was the first civilization, which was around 3000 B.C., and all other countries evolved from it. Mesopotamia emerged from the Tigris and EuphratesRead MoreThe Epic of Gilgamesh1742 Words   |  7 PagesBosco Professor Byczkiewicz World Civilization 1 Final Paper For my final paper I will be comparing and contrasting how women were affected and regulated by the Code of Hammurabi and the Laws of Manu, and will examine the mythological evidence and materials related to Ancient Mesopotamian polytheism, Egyptian polytheism, and Hinduism. The Laws of Manu were compiled over the years between 200 - 400 C.E. While the position of women in early Vedic IndiaRead MoreComparing The River Valley Civilizations1509 Words   |  7 PagesComparing and Contrasting River Valley Civilizations In the following treatise, the research that will be presented will provide criteria involving similarities and differences in three attributes of life in the four primary river valley civilizations. The river valley civilizations are composed of Mesopotamia, Egypt, the Indus Valley, and China. While each of these civilizations is unique in their habits and traditions, they share many similar qualities. For this work to be as comprehensive asRead MoreCompare and Contrast the Rise and Fall of Mesopotamia and Egypt1635 Words   |  6 Pagesstudied in that class was ancient Empires. Mr. Herman, my AP teacher during that time, went through the Mesopotamian and Egyptian Empires rather too quickly for my tastes. I felt as though there were a lot of things that I missed and would have loved to study. So during my preparations for the AP exams I wrote a brief essay on comparing and contrasting the rise and fall of the Egyptian and Mesopotamian Empire. I enjoyed writing this essay and was q uite interested in the topic. Despite the fact this didn’tRead MoreEssay on Egypt, Mesopotamia and Ancient Greek Civilizations1810 Words   |  8 PagesMichael Jones 10/5/2012 Cabrera Egypt, Mesopotamia and Ancient Greek Civilizations The Ancient Egyptians, Mesopotamia, and Greeks were some of the oldest complex societies, although similar in many aspects. Mesopotamia is located in the Fertile Crescent, land in and between the Tigris and Euphrates rivers usually known as modern day Iraq and Eastern Syria.(24) In Egypt, the Nile River creates a fertile valley which is rich in nutrients and essential to their survival. The Nile flows fromRead MoreMesopotamian And Ancient Egyptian Are Two Very Comparable946 Words   |  4 PagesMesopotamian and Ancient Egyptian are two very comparable cultures. There are similar and differences in regards to their Government, Law, Writing, Cities, Religion, Jobs, and Technology. This is reflected in their literatures, Epic Gilgamesh, and the Story of Sinuhe. Gilgamesh in the Epic of Gilgamesh and Sinuhe in the Story of Sinuhe are important characters that outline the perspective of an ancient society’s. The Epic of Gilgamesh was a story completely written in cuneiform. The author forRead MoreModern Art : Ancient Art1555 Words   |  7 Pagesdimensional sculptures made of limestone from Mesopotamia, Persia, and Egypt, will be presented. Including, the Assyrian Lamassu, Achaemenid Colum Capital in the form of Man- Bull, and the Colossal Bull- Head, and an Egyptian â€Å"servant† statue. Beginning with ancient Mesopotamian art, one significant art work was excavated in 1929, and now presented in the Oriental Institute in Chicago with its museum number A7369 is the Lamassu from Dur- Sharrukin; also known as the Human- headed Winged Bull.Read MoreCivilization: Which Aspects Define1491 Words   |  6 Pages Next, the earliest civilizations all seemed to have a need for an organized administration system. In a society with a growing population and expanding territories, we can see the need for a hierarchical government to keep them operating. By comparing the earliest civilized societies, we can determine which features set them apart from so called â€Å"barbarian societies† and why the need to become civilized arose. The birth of primary urbanization happened first in Mesopotamia. It makes sense to

IT Risk Management Applications and Sub-Systems

Question: Discuss about theIT Risk Management forApplications and Sub-Systems. Answer: Introduction: NSW Government is composed of a number of components, applications and sub-systems. There is a massive exchange and storage of information on a daily basis in every single operation. With the expansion of operations, there are a number of security risks that have emerged and the document describes the same with the help of a diagram and also suggests the measures to overcome the same. Security Risk Diagram Security Risk Diagram (www.finance.nsw.gov.au, 2016) The risks that have been displayed above have been classified in a number of different categories on the basis of the information that they impact. Information Types in NSW Government (www.finance.nsw.gov.au, 2016) For Office Use Only This is the category of information that is allowed to be used specifically by the officials of NSW Government. Protected The information that must be kept secure and authenticated at all times such that only authorized users are allowed to access the same. Confidential This is the information that is critical in nature and comprises of the details that cannot be revealed without proper authentication. Private The information associated with NSW Government that must be kept private without authorized permission of disclosure. Public This is the information that is okay to be disclosed to the entire public. Sensitive Information The disclosure must be least in the case of this information category and the security that is applied must be extremely high. Sensitive: Personal The information that contains the personal details about the resources those are associated with NSW Government along with the users and the organizations. Sensitive: Legal This information qualifies for the legal professional privilege related to NSW Government and its various sub-systems and components. Sensitive: Cabinet The information that is contained under this category includes official documents and records of the cabinet and the decisions that are taken by the same. Sensitive: NSW Cabinet The records that are related to the NSW cabinet come under this category of information. It may include official records, policies, and decisions and may others. Sensitive: NSW Government This information if revealed without proper authorization can cause huge damage to the internal and external stakeholders Sensitive: Law Enforcement This is the information that is related to the law enforcement activities of the NSW Government. Sensitive: Health Information Health information is the category of information that is bound by a number of legal and regulatory policies The risks can now be explained on the basis of their category. Data Integrity Risks: It is important for every entity to maintain the integrity of the data such that unauthorized modifications are not allowed. These risks are caused mainly during the transfer of data from source to destination. Network Threats: The threats and risks that occur with network as the medium of execution fall under this particular category of risks. Malware Threats: Software that are developed with a malicious intent such as anti-virus and worms can be fatal for an application or a product and the same occurrences are included in this category. Application Vulnerabilities: Risks such as account hijacking or unsecure APIs and likewise occur due to the external APIs. Operations Risks: The fault or deviation due to operations that are involved in NSW Government and its applications come under this category. These may be caused due to insufficient knowledge or experience. Business Risks: These are the risks that may lower down the profits that are associated with NSW Government. Legal Risks: These risks are the ones that occur due to inability to adhere to the legal compliance and regulatory policies that are defined for a particular activity. RiskRegister Risk ID Risk Likelihood Impact Risk Ranking RS1 Data Integrity High Medium/High High RS2 Network Threats Medium High High RS3 Malware Threats High Medium-Low Medium RS4 Application Vulnerabilities High Medium Medium RS5 Operations Risks Medium Medium Medium RS6 Business Risks Low High High RS7 Legal Risks Low High High Risks Register NSW Government Deliberate and Accidental Threats Deliberate threats or attacks are defined as the category of threats that are caused due to malicious intent (Vavoulas, 2016). Accidental threats are the ones that occur by chance or by mistake and do not involve the presence of malicious intent behind the same. There are a number of threats that can cause substantial amount of damage to NSW Government. Out of all the probable risks and threats, there are some which qualify as deliberate attacks and some which come under accidental threats. Malware threats, network threats and data integrity threats are the ones that are always deliberate in nature as they come coupled with a malicious intent behind the same. Business risks and application vulnerabilities are often accidental in nature which is generally caused due to the involvement of external parties (searchsecurity.techtarget.com, 2016). There are also a few categories of risks which may be deliberate or accidental in nature depending upon the procedure of attack. Legal risks and operations risks are the two examples of such threats which may either be deliberate or accidental as well. Challenges to Implement Security/Risk Management Policies Human Factors Workforce and clients that are a part of the world of NSW Government is massive. Conflicts and disputes are common occurrences due to the same which may prove to be a big hindrance in the implementation of an improved security/risk management policy. Organizational Factors At the organizational level, there can be a number of factors which may emerge as a barrier to the implementation of security policy such as existing infrastructure or capacity. Technological Factors Technology is something that is changing at a lightning speed. There are technological trends that come and go and the same can contribute to the factors that may disturb the implementation of security policy. There can also be compatibility issues between the existing infrastructure and the required infrastructure to implement the policy. Risks and Uncertainties Risk Uncertainty Comprises of the probability to either win or loose Future is never known and cannot be predicted as well Measureable and Controllable Cannot be measured or controlled Can be determined through a defined procedure Cannot be determined through any means Difference between Risks and Uncertainties (Surbhi, 2016) The risks that may occur in case of NSW Government have been listed above. There can also be a few uncertainties associated with the same which cannot be predicted well in advance. One of the examples of an uncertainty is the natural hazards and disasters that may occur any time without certainty but have the potential to cause some serious damage. Approaches to Risk Control and Mitigation Enhanced Disaster Recovery Disaster Recovery can be improved and applied in the architecture of the NSW Government so that there may be a back-up plan ready in advance in case of an attack. Network Controls Network is one of the prime mediums of risks and threats and the controls that are put up on the same are extremely essential. These include network scans and networking and many more. Malware Controls These controls will compel the malware to stop the attack on the target system and will also enhance the system security. Legal and Regulatory Compliance Legal and regulatory compliance is essential to maintain the desired level of quality of the product. Also, these controls will put a check on the validation and verification of the processes as per the defined rules. Advanced Identity and Access Management There are a number of measures that must be included to form an accurate identity and access management schemes. Use of One Time Passwords (OTPs), Single Sign On and single sign offs, physical security and display of ID cards at every exit and entry point is a must. Conclusions NSW Government is composed of a number of applications and sub-systems. Risks such as legal risks, operations risks, business risks, malware threats, network threats and data integrity threats are some of the examples of the same. Some of these risks are deliberate in nature whereas some are accidental. The challenges to overcome these risks include human factors, organizational factors and technological factors. There are also certain mechanisms and practices which if followed can reduce the probability of occurrence. References searchsecurity.techtarget.com,. (2016). Accidental insider threats and four ways to prevent them. SearchSecurity. Retrieved 16 August 2016, from https://searchsecurity.techtarget.com/tip/Accidental-insider-threats-and-four-ways-to-prevent-them Surbhi, S. (2016). Difference Between Risk and Uncertainty - Key Differences. Key Differences. Retrieved 16 August 2016, from https://keydifferences.com/difference-between-risk-and-uncertainty.html Vavoulas, N. (2016). A Quantitative Risk Analysis Approach for Deliberate Threats. Retrieved 16 August 2016, from https://cgi.di.uoa.gr/~xenakis/Published/39-CRITIS-2010/CRITIS2010-RiskAnalysisDeliberateThreats.pdf www.amsro.com.au,. (2016). Information Technology and Security Risk Management Top 12 Risks What are the risks? What are the solutions?. Retrieved 16 August 2016, from https://www.amsro.com.au/amsroresp/wp-content/uploads/2010/12/AMSRO-TOP-12-Information-Technology-Security-Risk-Management-1.pdf www.finance.nsw.gov.au,. (2016). NSW Government Digital Information Security Policy | NSW ICT STRATEGY. Finance.nsw.gov.au. Retrieved 16 August 2016, from https://www.finance.nsw.gov.au/ict/resources/nsw-government-digital-information-security-policy www.praxiom.com,. (2016). ISO IEC 27000 2014 Information Security Definitions. Praxiom.com. Retrieved 16 August 2016, from https://www.praxiom.com/iso-27000-definitions.htm