Sunday, January 26, 2020

Principles of Information Security

Principles of Information Security Purpose:In order to protect against accidental or intentional damage or loss of data, interruption of College business, or the compromise of confidential information we must classify data and establish minimum standards and guidelines to ensure a secure system. Effective from: 02/02/17 Scope: This policy must be applied to all of the following: students, faculty, staff, contractors, consultants, temporary employees, guests, volunteers and all other entities or individuals with access to confidential information through the Modern College of Business and Science its affiliates/partners. Responsible Party: Database Department Information Technology Support Department Terms of Reference:Access Any personal inspection or review of the confidential information or a copy of the confidential information, or an oral or written account of such information. Confidential Information Information identified by the applicable laws, regulations or policies as personal information, individually identifiable health information, education records, personally identifiable information, non-public personal data, confidential personal information, or sensitive scientific or sponsored project information. Data Information generated in official College business. Information that is personal to the operator of a system. Disclosure To permit access to or release, transfer, distribute, or otherwise communicate any part of information by any means Incident A possibly reportable episode that may incorporate, however is not restricted to, the accompanying: Attempts to increase unapproved access to frameworks or information; Undesirable disturbances or Denial od Service; An infection spreading; Burglary, abuse or loss of electronic gear containing private data. Unapproved utilization of frameworks for handling or information gathering An office or unit cant dispose of confidential of paper information in a proper manner. Unapproved changes to framework equipment, firmware and programming. Policy Statement: The Modern College of Business and Science must aim towards making a safe environment for all in terms of data confidentiality and personnel. Information Security professionals must employ techniques which can prevent any threat from exploiting any vulnerability as much as possible. Threats could target privacy, reputation and intellectual property along with lots of other data. Data Classification In order for the policy to be entirely effective and be able to know which data protect the data must be classified into 3 categories Category 1 Data that can be freely distributed to the public. Category 2- Internal data only not meant for outsiders. Category 3- Sensitive internal only data that could affect operations if disclosed to public. Category 4- Highly sensitive internal data that could put an organization at financial or legal risk if disclosed to public. Security Prevention Measures Security prevention measures ensure security and prove comfort for the business and also the customers. Prevention measure could consist of many things. Existing Security Measures. Access control which ensure only allowed users granted permission to access the database may do so. This applies to accessing, modifying and viewing the data. Frequent SQL input validation tests are conducted in order to ensure no unauthorized users can access the database. Three separate cloud based servers are available, two of which are for back up purposes this ensures the availability of the data in the case of the intrusion on one of the servers. All servers are backed up daily. Database auditing is frequently conducted. Database log files are frequently checked to observe in case of any malicious activity. All database security is managed by a third party in order to ensure maximum security. In order to avoid Denial of Service (DOS) attacks which could affect the availability the web applications are put on different servers. Role-Based Control is used in order to make sure employees can only retrieve content from the database that they are authenticated and authorized to. Discretionary access control is only permitted to the database department as no other faculty or staff needs access or is permitted to access. Flaws which need reviewed Password policy is not implemented strictly to students which can result in the compromising of an account. Solution: Password Policy MUST be applicable to all therefore, database department must make it mandatory. No honeypotting is available. Solution: The necessary equipment and software should be purchased for this to be done. This will help the College avoid attacks in the case of SQL injection or any other database attack. No digital certificates are utilised when messages are sent across the website. Solution: Create system to have to send digital certificate/signature to ensure a better level of security. No certified security professionals are currently employed. Solution: Raise issue to Human Resources as a matter of concern and seek the hiring of a professional or train existing staff. Lack of awareness among staff and faculty regarding security in general. Solution: Conduct training for faculty and stuff on how to spot basic threat and potential intrusions etc. *After these flaws are fixed, policy MUST be reviewed and updated. iii) Added Policies Conduct penetration testing frequently and Risk Assesment, report must be generated, reviewed by Chief Information Security Officer (CISO). Vulnerabilities must be fixed. In the case of an incident CISO must be informed to take necessary action. Any employee failing to do so shall face disciplinary action. Database MUST use views rather than tables no ensure security, all entries must be predefined queries. Database remote access and other distance access must not be enabled by blocking ports such as the telnet port, FTP and others. Database password MUST be updated ever fortnight to ensure security of the password. Password strength policy must be implemented for the database ( min 8 characters, capital small, numerical, special characters). Back Ups must also be done offsite and not only on the cloud. Backing up data of Category 3 4 as mentioned above must also be done on a certain specially encrypted drive and separate from normal back ups. Group Responsibilities All the members of the College are responsible some extent of the security of their own data and other things. Below is what each group of individuals is responsible for. A. Custodians are responsible for: 1. Information Security Procedures Establishment 2. Managing authorizations 3. Recordkeeping. 4. Incident handling and reporting B. Users are responsible for: 1. Abiding the College IT policy 2. Physical security 3. Information storage 4. Information spreading and sending 5. Method of disposal of info and devices 6. Passwords 7. Computer security 8. Remote access 9. Logging off 10. Virus and malicious code protection 11. Backups 12. Incident handling and reporting C. Managers are responsible for: 1. All what users are responsible for 2. All that the custodians are responsible for 3. Sharing responsibility for information security with the employees they supervise 4. Establishing information security procedures 5. Managing authorizations 6. User training and awareness 7. Physical security 8. Incident handling and reporting D. Information Service Providers are responsible for: 1. More extensive information security requirements than individuals 2. Establishing information security procedures 3. Physical security 4. Computer security 5. Network security 6. Access controls 7. Passwords 8. Contingency planning 9. Incident handling and reporting Administrative Responsibilities A. The CISO should always be monitoring the colleges database security system to ensure no flaws or loopholes and should propose tools or mitigation strategies. S/He must do the following: 1. Creating, reviewing, and revising policies, procedures, standards. 2. Ensuring security training and awareness. 3. Overall authority for College networks and systems security. 4. Incident handling, remediation, and reporting. 5. Collaborating with the Office of Internal Audit to ensure policy conformance. Enforcement Implementation The required actions mentioned in the policies and rules must be carried out from the effective mentioned above, those who fail to comply and follow this policy shall face disciplinary action. This policy must be strictly implemented. Principles of Information Security Principles of Information Security Man in the Middle and Man in the Browser Attacks on Financial Institutions. Abstract Four decades ago, what started as a US military research initiative to build network for linking US universities and research centers is now the Internet. Today it has expanded to every corner of the globe (Privgcca, 2016). The number of Internet users has risen from few computer scientists to 3.17 billion users. It has helped in reducing costs of communication as one can easily be in touch and communicate with each other with the help of chatting, email applications and online transactions/payments (Friedman, 2014). It has also helped organizations to offer better customer service, reduce amount of paper work, increase productivity, and enable customers to perform enquiry and transactions anytime and from anywhere. This paper will be focusing on the importance of online banking/transaction security. Introduction Banking organizations have been developing for years in a broad scope and have started to replace more traditional banking techniques in certain fields such as processing cheques, making transactions and money transfers to online, therefore; payment systems are constantly undergoing radical changes. More security measures are present but the users of these systems must also be allowed decent compatibility. Due to the amount of modern day threats these banks have also been facing a vast amount of risk and vulnerability exploitations, banks are usually very concerned about two kind of attacks, man in the middle attack (MITM) and man in the browser attack (MITB). As a result, financial institutions must ensure to provide effective authentication techniques. These two attacks (MITM and MITB) will be the main concentration and the focus of the analysis will on these attacks as well. The Two Common Attacks. The Man in The Middle and Man the Browser are the very predominant attacks in the finance industry. The difficult part is identifying each type of attack and taking precautionary measures from either attack. MITM occurs when a hacker can see and modify the communication between the client and the bank, it makes both parties believe they are directly communicating with each other to deceive but there is usually an attacker eavesdropping. Therefore, this is very common on unsecured and unprotected networks. On the other hand, MITB uses malware to infect a web browser. This is done by the malware exploiting vulnerabilities in the browser security which enables them to modify and manipulate the page. Getting Technical, MITB vs. MITM One of the few important differences between these two attacks is that MITM attacks operate at the network layer whereas MITB operate on the application there, in this case on the web browser. Although MITM attacks remain popular attackers prefer MITB as banks may use sessions IDs to identify MITM attacks. Using session IDs banks can determine whether there has been malicious activity during a transaction and notice the fraudulent attempt and consequently cancel it. By giving the customers device a unique ID, the bank can then use algorithms to analyze and link the multiple user sessions from where they typically perform their banking (Eisen, 2012). MITB attacks are a lot more deceitful, they completely take control over the users website and control the browser while the user thinks everything is normal. The attackers in this scenario alter web views and account balance without the users knowledge. Once the user logs in they can also redirect any sensitive traffic to an attackers sy stem, while keeping the original SSL/TLS protections intact (Trusteer, 2013). MITB People are very commonly exposed to the risk of these attacks due to the browser security problems in the case of MITB browser extensions are frequently the malware which allows the attacker to exploit the vulnerability. Browser extensions are frequently portrayed as useful software which enhance user experience but is malicious software or code. This is known as a Trojan. Browser extensions may be plugins, Browser Helper Objects (BHO), JavaScript and add-on features. The functionality of BHOs is usually to provide add functionality to a browser these could be written by the attacker with programming experience. The problem with BHOs is that they can hide from antivrus this makes them undetectable. In a MITMB attack these are used to change a site, add fields, remove fields. They also can add registries to the system and load at booting (Utakrit, 2009). Grease Monkey is a popular add on for chrome which can allow a user to change the appearance of a website or eliminate ads. This JavaScript is not malicious but it uses the same methodology as the malicious JavaScript applets. The danger of add-ons is that they can easily monitor and retrieve the users information at any time. SSL has been thought of as a solution by some security experts for MITB attacks but even this control has been proven to be ineffective. The reason for this is that the attacker injects or gives the user a Trojan which carries out malicious activities directly inside the browser. Therefore, no suspicious activity is detected. MITM MITM are less common as security professionals have learned ways to mitigate the attacks that use this method. It is also widely known as session hijacking. In this case, the attacker usually seeks vulnerable hotspots or networks. The attacker would usually direct the victim to a fake login page of a website (perhaps a phished paged) and then get the credentials as soon as they are authenticated. The attacker could then simply access the account and withdraw money or make transactions. Security measures such as the OTP are not effective as defense against this attack as the attacker could fraudulently capture the temporary password and forward it on the portal in the 30 60 seconds provided. In this attack the main issue is that the user has no way of being sure or verifying who is asking for information. As a result, two step verification is also considered vulnerable. Protective measures. The security triad which is an important principle to security experts evolves around three elements. C- Confidentiality, this means do not allow unauthorized individuals to access or see data or systems. A- Availability, which means ensure the system/data is available when needed. I- Integrity, if data or a system or in this case a transaction it loses its integrity which means it has been manipulated with. In the case of transactions, Integrity is a very important principle. Banks and financial institutions need to always ensure the integrity is maintained. By doing so, we need to implement controls, also known as countermeasures. User Protection Strategies and Controls MITB In order to minimize these attacks the knowledge has to be known on either side of the equation, the users should be aware as well as the bank. Users can take precaution by installing anti virus, although not entirely effective it does depend on the detection capability and reduces the chances. Secondly, use a hardened browser in a USB drive, this will provide moderate protection. Thirdly, only do online banking with banks who are aware of these kinds of threats and implement countermeasure. Ultimately there is risk in every procedure, unless you are will to completely not use online banking there will always be risks and threats. MITM Mitigation for Banks. MITB As previously mentioned, attackers have also learned how to compromise two step authentication as well the same also applies to captcha and others. The malware can simply wait till the user has authenticated himself. It can also intercept and modify response when using SSL or encryption. Moderate protection could be offered by the bank itself providing clients with Hardened Browsers on USBs containing cryptographic smart tokens for authentication. The hardened browsers are harder to infect. Similarly, OTP token with signature would be effective, the user would have to re-enter the transaction details to the OTP device and then it could generate a signature based on that in that way it would not match if the MITB alters the request, this is also rather inconvenient. Fraud detection based on transaction type and amount is also sometimes effective, in the case of an abnormal transactions some banks call the client to check if it is genuine or not. User profiling could also be used. MITM

Saturday, January 18, 2020

Nature and nurture on development Essay

In the study of development, nature refers to the inherited (genetic) characteristics and tendencies that influence development. Some inherited characteristics appear in virtually everyone. For instance, almost all children have the capacity to learn to walk, understand language, imitate others, use simple tools, and draw inferences about how other people view the world. Thus all children have a set of universal human genes that, when coupled with a reasonable environment, permit them to develop as reasonably capable members of the human species. Other kinds of genes create differences among people. Children’s stature, eye color, and facial appearance are largely determined by genes. Children’s temperament—their characteristic ways of responding to emotional events, novel stimuli, and their own impulses—seems to be in part affected by their individual genetic makeup (Rothbart, Ahadi, & Evans, 2000; D. C. Rowe, Almeida, & Jacobson, 1999). Similarly, being slow or quick to learn from instruction and everyday experiences has some genetic basis (Petrill & Wilkerson, 2000; Plomin, 1989). Inherited characteristics and tendencies are not always evident at birth. Many physical features emerge gradually through the process of maturation, the genetically guided changes that occur over the course of development. Environmental support, such as food, reasonably safe and toxin-free surroundings, and responsive care from others, is necessary for maturation to take place; nature never works alone. Thus nature’s partner is nurture, the environmental conditions that influence development. Children’s experiences in the environment affect all aspects of their being, from the health of their bodies to the curiosity of their minds. Nurture affects children’s development through multiple channels: physically through nutrition, activity, and stress; intellectually through informal experiences and formal instruction; and socially through adult role models and peer relationships. With good environmental support, children thrive. Unfortunately, the conditions of nurture are not always nurturing. For example, children who grow up in an abusive family must look outside the family for stable, affectionate care. Historically, many theorists saw nature and nurture as separate and rival factors. Some theorists believed that biological factors are ultimately responsible for growth. Other theorists assumed that children become whatever the environment shapes them to be. Increasingly, developmental theorists have come to realize that nature and nurture are both important and that they intermesh dynamically in the lives of children. Consider these principles of how nature and nurture exert separate and combined effects: The relative effects of heredity and environment vary for different areas of development. Some abilities are strongly influenced by genetically controlled systems in the brain. For example, the ability to distinguish among speech sounds develops without training and under a wide range of environmental conditions (Flavell, 1994; Gallistel, Brown, Carey, Gelman, & Keil, 1991). In contrast, abilities in traditional school subject areas (e. g. , reading, geography) and advanced artistic and physical skills (e. g. , playing the piano, playing competitive soccer) rest heavily on instruction and practice (Gardner, Torff, & Hatch, 1996; Olson, 1994; R. Watson, 1996). Inherited tendencies make children more or less responsive to particular environmental influences. Because of their genetic makeup, some children are easily affected by certain conditions in the environment, whereas others are less affected (Rutter, 1997). For example, children who are, by nature, inhibited may be quite shy around other people if they have few social contacts. If their parents and teachers encourage them to make friends, however, they may become more socially outgoing (Arcus, 1991; J. Kagan, 1998). In contrast, children who have more extroverted temperaments may be sociable regardless of the environment in which they grow up: They will persistently search for peers with whom they can talk, laugh, and spend time. Environment may play a greater role in development when environmental conditions are extreme rather than moderate. When youngsters have experiences typical for their culture and age-group, heredity often plays a strong role in their individual characteristics. Thus, when children grow up with adequate nutrition, a warm and stable home environment, and appropriate educational experiences, heredity affects how quickly and thoroughly they acquire new skills. But when they have experiences that are quite unusual—for instance, when they experience extreme deprivation—the influence of environment outweighs that of heredity (D. C. Rowe, Almeida, & Jacobson, 1999). For example, when children grow up deprived of adequate nutrition and stimulation, they may fail to develop advanced intellectual skills, even though they had the potential for such development when they were born (Plomin & Petrill, 1997; D. C. Rowe, Jacobson, & Van den Oord, 1999). Similarly, when malnourished, children tend to remain short in stature regardless of their genetic potential to be tall (J. S. Kagan, 1969). Timing of environmental exposure matters. When children are changing rapidly in any area, they are especially prone to influence by the environment. For example, early in a mother’s pregnancy, her use of certain drugs may damage the quickly growing organs and limbs of the developing fetus. Just prior to birth, exposure to the same drugs may adversely affect the baby’s brain, which at that point is forming the connections that will permit survival and the ability to learn in the outside world. In a few cases environmental stimulation must occur during a particular period for an emerging ability to become functional (Blakemore, 1976; Hubel & Wiesel, 1965). In such cases there is a critical period for stimulation. For example, at birth, certain areas of the brain are tentatively reserved for processing visual patterns—lines, shapes, contours, depth, and so forth. In virtually all cases, infants do encounter adequate stimulation to preserve these brain circuits. However, when cataracts are present at birth and not removed for a few years, a child’s vision is obstructed, and areas of the brain that otherwise would be devoted to vision lose some of this capacity (Bruer, 1999). In many and probably most other developmental areas, however, children may be most receptive to a certain type of stimulation at one point in their lives but be able to benefit from it to some degree later as well. Tonya, in the introductory case study, may have encountered only limited exposure to language as a result of her mother’s weakened condition. Immersed later in a rich verbal environment, Tonya would have a second chance to expand her verbal talents. Thus educational experiences at a later time can often make up for experiences missed at an earlier period (Bruer, 1999). Many theorists use the term sensitive period (rather than critical period) when referring to such a long time frame of heightened sensitivity to particular environmental experiences. Children’s natural tendencies affect their environment. In addition to being affected by nature and nurture, children’s own behaviors influence their growth. Youngsters make many choices, seek out information, and, over time, refine their ideas (Flavell, 1994; Piaget, 1985). For example, children often request information (â€Å"What cooperate mean, Mommy? †) and experiences (â€Å"Uncle Kevin, can I play on your computer? †). Children even help create environments that exacerbate their genetic tendencies. For example, children with irritable dispositions might pick fights and provoke others to lash back at them, creating a more aggressive climate in which to grow. As children get older, they become increasingly able to seek stimulation that suits their tendencies. For example, imagine that Marissa has an inherited talent for verbal skills—learning vocabulary, comprehending stories, and so on. As a baby, she relies on her parents to talk to her. As a toddler, she asks her parents for particular kinds of stimulation (â€Å"Read book, Daddy! †). In elementary school she reads to herself from books supplied by her teachers. As a teenager, she takes the bus to the library and selects her own books. Marissa’s experience would suggest that genetic tendencies become more powerful as children grow older—an expectation that is in fact consistent with genetic research (Scarr & McCartney, 1983).

Friday, January 10, 2020

A Study of Trends in Indian Partition Literature Essay

The Partition of India was the geographical division of colonial India into two bordering nation states of India and Pakistan based on religious demographics.1 It was proposed as an unsavoury but necessary accompaniment to the Independence of India from the British Empire. However, it was not only a diplomatic and administrative exercise but rather had a long-lasting psychological impact on the human population of these areas. Though Bapu2 was firmly against this idea, it was reluctantly accepted by Nehru and Jinnah as the only solution to the growing communal divide between the Muslim and Hindu communities. 3 However, what the political class had never predicted was the unprecedented amount of bloodshed, violence and widespread civil unrest that followed in its wake. Even years after this event, the perpetrators and the victims are still baffled as to the cause of this â€Å"madness†4 that gripped civilized society. In the aftermath, historians pretended to ignore it terming it unfortunate but somewhat inevitable while literature tried to come to terms with its bestiality and future implications. The authorial response of the first generation was severely limited however due to a level of emotional attachment and involvement in the subject matter. They lacked perspective and varied in two ways: either they were very brief and lacked empathy or tended to be voyeuristic in nature. The official responses attempted to historicise Partition through statistics, facts and figures while literature, to the contrary attempted to give voice to subaltern perspectives personalising victim narratives. Despite such a movement, it was not until the 70’s that it was realised that hardly any attention was paid to the experiences of women during Partition. There was a deep reluctance to address the gender atrocities committed during Partition and it manifested itself through the invisibilisation of women voices. Although it had been clear from the start that the worst sufferers of Partition violence had been women5, a stoic silence upon the tragic reality had been maintained. Many of these women had led forgotten lives and their trauma suppressed in an attempt to forget the onslaught upon their bodies and minds. Therefore, renewed efforts began to document and portray the forgotten stories of such women. But it was a complex problem in many ways. Partition had had a multifaceted impact on the women of India and Pakistan that not only defined their coming lives but also impacted the future generations as psycho-somatic memories and construction of familial structures post-Partition.6 Literature took the initiative of this task: there were two major strains of women oriented Partition narratives that emerged in the period thus. One school of thought dealt with Partition as a backdrop to the â€Å"larger narrative†. In such stories, the lives of the main characters were highlighted and their lives were allegorised to represent the trauma of the nation itself. The stories of their existence were represented dually: as human beings involved in personal dramas and as social creatures part of a larger mainframe. Their places within the higher superstructure and as creatures dominated by the larger contexts were analysed by writers. A startling example of this was â€Å"The Clear Light Of Day† by Anita Desai which never referred to Partition in specific incidents but rather subtle, broken reflections into the people whose day-to-day lives were affected by the growing communal tension and changing socio-political equations. It refers to the ties of family, friendship, kinship and love that were abruptly ruptured by the literal division of the nation. There were novels such as â€Å"Ice-Candy Man† by Bapsi Sidhwa that looks at Partition from the ‘outside’. The narrator Lenny is imbued with unique qualities that were highly unconventional for the times. She was a child, hence she had a limited worldview, a Parsee, hence not religiously biased and neither a participant, physically disabled, therefore able to sympathise with the suffering of others and, a girl therefore her narration is unapologetically gender-conscious. What she learns, is all by association. The story is a sharp attack on official discourses that denied the suffering of millions of people. Lenny’s story is not only her own but a mirroring of girl-children everywhere that were faced with questions with identity, sexuality, community and nation as a whole and how they shaped individual lives. A child is brutally honest and spares nobody and nothing. She has no inbuilt prejudices so she can speak for those who cannot speak for themselves. As a result of such experimental tales, women felt ready to finally speak up. But, their attempts were met with more resistance than expected. They were themselves reluctant to speak about they went through; it was too painful but combined with societal pressures, their mouths had been almost sealed shut from fear. For daring to break this unspoken taboo, some of them faced severe consequences and were even disowned by their own families for besmirching the family name. But such actions often took a huge toll on their mental and physical health and though they had survived, they hadn’t healed. As a result of mass migration, women were abruptly uprooted from their homes to move to a strange and unfamiliar place. They had to build their lives and homes anew, sometimes with no support system. Many of these women were so bereaved at losing their home and hearth, that they could never recover from this sense of loss. Women in traditional society had since ancient days been tasked with looking after the home. Since they were not allowed to venture outside their domain7, the home had been almost personified for them. It was a living breathing space. The only place which they could rightfully stake claim to and which was a source of comfort and solace for them. They were so tangibly attached to their land that family was synonymous with home and her identity came to be defined by her place in the home. Hence when forced to migrate, their sense of unsettlement and upheaval was immense. They could never return to their past lives and change was not so easy for these women who had never been given the opportunity to trespass their comfort zones. Some stories that movingly illustrated the dilemmas of such women are â€Å"Jadein† by Ismat Chughtai, â€Å"Sikka Badal Gaya† by Krishna Sobti Sahni and â€Å"The Thirst Of Rivers† by Joginder Paul . These women had to undergo the process of relocating their selves. Many women like Bebe from â€Å"The Thirst†¦Ã¢â‚¬  refused to leave their homes assured of its protection from evils outside. However, their families were broken up with some members choosing to stay back and some leaving for a new land. Due to differences in opinion, family members become estranged and refused to talk to each other or had problems meeting each other due to large geographical distances. Often, migrants did not have enough money to travel back and forth and permits were hard to come by. Due to mutual hostilities, communication across borders was sketchy at best. Hence, many a times, a natural void between families occurred. All the while, the matriarch of the family remained a silent witness to events. The family ties that she had spent all her life building up and nurturing were breaking up right before her eyes and she was helpless, unable to act or intervene. Who would listen to her? Partition had served to further communal tension and hardening religious identities than perhaps any event in the history of India or Pakistan. People who had lived together for several millennia with tranquillity were suddenly made conscious of their differences from each other. They who had been friends earlier were suddenly staunch enemies and women bore the brunt of these realizations. In â€Å"Peshawar Express†8, one such incident is narrated when at Wazirabad station, where Muslim, Hindu and Sikh communities had celebrated Baisakhi together for ages becomes a site of base humiliation and gruesome celebration; the women of the Hindu and Sikhs communities were paraded around naked as if they were nothing but objects of gratification for the general public. These women had become mere shells, their souls long dead. In Kamleshwar’s â€Å"Kitne Pakistan†, the author ruminates upon the fruitlessness of Partition and the breaking of bonds of families, love and friendships due to its occurrence. It is the story of a Muslim girl, Bano who falls in love with a Hindu boy, Mangal but is not able to marry him because of religious dogmas. She is told that she will cause communal riots. There is a hidden implication in this viewpoint that seems to say that the cause of every mishappening must be a woman somehow. Rules for men and women in traditional dogmatic societies are different It is ironic that men are not chastised for forcibly marrying a man of the other religion but they will not allow their daughters to choose her spouse on her own and he may never belong to another religion. There is rampant hypocrisy and hollowness in societal mores regarding women. Bano is married off to Muneer who unable to provide for his family with his own hard work resorts to selling his own wife’s body to earn money. The shamefulness of this situation is beyond imagination. These are not falsifications as advocated by fundamental religious leaders but a retelling of many women’s lives. Another kind of psychological trauma that many women underwent was the loss of a child. Many women were forced to leave their children by their husband and children during flight. Children became a burden during this time. They had to be cared for especially with crucial funds required by the family going for their supplies. Also, escapees with children were more vulnerable to attacks by rioters since they not only had to look after themselves but look after their child as well. There are real life cases documented by Urvashi Bhutalia in her book, â€Å"The Other Side Of Silence† wherein women of Muslim as well as Hindu communities were forced to desert their infants that could raise an alarm in the rioters by making noise. Sikh men told tales of killing their children, asking the author, if they should be saving themselves or their daughters? Clearly, man’s inherent selfishness had come to the fore where no one mattered more than the self. Many children were abducted during the widespread chaos to be sold off as domestic help or prostituted in the streets. Women who lost their children during this time were incessantly plagued by guilt and grief. One such woman was Kulsum from â€Å"Pali†9 who lost her child and along with him, her mental balance as well. She was blanketed completely by her grief and only the return of her child restored her sanity. But meanwhile, Zenab who had taken care of her son, Dilip when she found him lost had developed a motherly bond with him and cannot bear parting with him. She knows that she has no biological claim over him but what the mind knows, the heart does not. Eventually, she has to reconcile herself with the reality of her situation. But her life will forever be shadowed by this sadness. Women who were forced by circumstances to give up their child were forever haunted by their own actions and decisions. They were always in search of redemption and peace and could not reconcile themselves to the loss of their offspring. One example of this can be seen in â€Å"The Abandoned Child†10. Infant as well as toddler girls were left by the roadside or killed by their families to avoid making them a target. The life story of one such girl is narrated in â€Å"Where Did She Belong† by Suraiya Quasim wherein the protagonist Munni is not sure of her religious or national identity. She is pushed into prostitution by her so-called ‘saviour’11 , who only wants to use her for economic gain. She is deceived by two of her customers who pretend to love her, but leave her bereft when Partition happens. Nobody asks for her or enquires as to her whereabouts. She is deceived by everyone in her life, ultimately. There were also cases of women who were injured and deceived by members of their own community. People who had been their well-wishers and whom they trusted implicitly, took advantage of their vulnerability and preyed on their bodies. Ayesha’s12 story is the ultimate tragedy of such a ‘lady’13. In guise of protecting her and reuniting Ayesha with her daughter, Nurul takes her with him to Pakistan but betrays her trust by prostituting her instead. She is cursed to a life of assault, on her body and her mind. Her saviour turns out to her destructor. She dies a life of desolation, her own brethren refusing to come to her aid and never seeing her child again. Afroz too in â€Å"I Am Game†14 falls weak due to her instincts of providing and caring for daughter. Seeing no option left for herself and her child, she agrees to prostitution. This depicts to us the sad state of affairs during Partition, when uncertainty and insecurity reigned supreme. Man, woman or children, all had to protect themselves on their own and women for the sake of their families were forced into professions of exploitation to earn their keep. Besides these atrocities, women were also subjected to particularly vulgar sexual attacks. Writers like Ashis Nandy, Veena Das, and Mushirul Hasan describe the bizarre and horrific nature of sexual violence afflicted on women. It was pornographic in its varied forms. Their bodies were mutilated, disfigured, slogans15 branded on them like they were animals, their wombs sliced open and their foetuses savagely butchered. Women were reduced to spoils of war who were never allowed to unburden themselves or be free. They were reduced to a part of the multitude, just one of many. Many victims had been traumatised to an extent that they lost themselves to insanity. They could not cope with their reality. Many underwent derealisation16 wherein after the superficial wounds had mended, they started to deny that anything had ever happened to them. It became something of a nightmare, horrific but fantastical. Literature becomes a cathartic medium for many such women, a chance to narrate their tale. Such memoirs also provided a base for Partition scholars to analyse the feminine subject in social and historical contexts of that time period. Partition has often been termed as the dark underbelly17 of Independence but what it really exposed was the base attitudes of patriarchal Indian society, be it any religion. It revealed how women were equated with the community they belonged to. Though the violence was inter-religious in nature, the modes of inflicting violence were one and the same. All ethics were forgotten in the frenzy of religious vendetta. Revenge was used as an excuse to inflict wounds. They were the contested sites between two opposing factions and were devoid of any agency. One example may be an incident in â€Å"The City Of Sorrow†18 , where a man is forced to strip his sister naked by someone of the other religion. When given a chance to retaliate, he forces his tormentor to strip his own wife naked. Hence, the revenge is complete but ironically, in both cases, the women were the innocent parties who became the medium of exacting justice. They were expected to uphold familial and communal honour and were sacrificed at the altar of â€Å"izzat†19 if they were in danger of being captured by the enemy. The concept of honour was internalised20 hence any stain on it was beyond tolerance by patriarchal society. Therefore, to insult and hurt communal sentiments, it was natural that in order to debase the enemy and shed him of his honour, women of his community were targeted systematically. There were also women who had been indoctrinated to such an extent by religious propaganda that they committed suicide, misled into thinking that they were fulfilling their duty as women. This tradition dates back to the time of ancient Rajputs whose women committed Johar21 to sustain their honour. Hence, it has been a concept propagated throughout the history of religions, Hinduism especially. Bhishma Sahni in â€Å"Tamas† and Jyotirmoyee in â€Å"The River Churning† present such incidents where women of Hindu and Sikh communities drown themselves in wells in order to â€Å"save†22 themselves. Women of the family were the most precious possessions and were to be protected at all costs. However, when they presented an obstacle in the escape of their family, they were brutally â€Å"martyred†23 without compunctions by the family itself. The men of the family did it all in order to save themselves first and to prevent dealing with the hassle of looking after these women. Such people had no conscience in them. This is demonstrated in Shauna Singh Baldwin’s novel â€Å"What The Body Remembers† where the daughter-in-law of a Sikh family, Kusum is mercilessly killed by her father-in-law and furthermore chopped into pieces to prevent her from being â€Å"contaminated†24 by Muslims. Her womb is also removed as a symbolic gesture to signify her being pure25. We can therefore read into the implied fear and repulsion of a child born of an inter-religious union. Hence, Kusum is a victim of her own family’s moral code. Such incidents are not hyperbolic in nature but rather fictionalized accounts of reality. Women who were misfortunate enough to fall into the hands of the â€Å"other†26 and raped by them could never again return to their roots. They were dirtied and treated as untouchable because they had lost their chastity to the enemy. In â€Å"The River Churning†, the protagonist, Sutara is treated as a lower caste untouchable would be27. Though never raped, even staying in a Muslim household had damned her. She had become polluted like Sita. Like Sita, she became a victim of â€Å"social morality†.28 If women had become pregnant somehow, it was even worse for them. They were miscarried forcibly and if the child was born somehow, he or she was never accepted as a part of the family. Women themselves had to come to terms with their reality. They had to learn to let go of their self-loathing which often took root in their minds. They had to live with a child who was a constant reminder of their suffering. Yet, women learned to let go and forgive but their families could not move past this situation. The woman was given the choice of either abandoning her children or her family. Therefore, she was kept trapped in overlapping identities of woman, mother and daughter. There was no time to consider the interests of the self. The children of such women were often physically, mentally and verbally abused all throughout their lives. They were the victims of religious hatred. It left deep scars on their psyche that could never be repaired. They were often castigated for having lived and their mothers looked at with contempt for not having died in order to preserve themselves. Women often started hating their own selves when faced with a constant stream of disgust and repulsion. It is said that â€Å"Rape is the only crime where the victim is held guilty† and these women were the prime examples of this adage. They were made to feel guilty, demeaned and dehumanized to such an extent that they often felt that dying would perhaps have been a better option. Women were at the highest risk of being abducted during migration across borders. These women stranded on the wrong side were forcibly converted and married off to their abductors. They were raped repeatedly or sold off as entertainment. Women were objectified as commodities and their bodies became alien to their own selves. They were not their own persons but mere belongings. Anis Kidwai in her novel, â€Å"Azaadi Ki Chaon Mein† writes starkly about these girls who were nothing but stuff to be shared among the men who were, but slaves of their lust. In his short story, Open It!, Saadat Hasan Manto further elaborates upon the savagery doled out to these women. The main protagonist, Sakina had been ravaged to such an extent that she had lost her personality and her sanity. She was alive only physically, but emotionally and mentally dead. She knew nothing but what she had been forced to go through again and again. Her senses had been so wrecked that she only expects men to want one thing from her i.e. her body. This story presents a horrifying picture to the reader who is compelled to question if Sakina will ever recover from her trauma. Other women were forcibly married off to their abductors and underwent alienation of the self. They were conflicted as to their identities. On one hand, they felt abhorrence for their abductors. On the other hand, such marriages often bore children which caused these women to war with their motherly instincts. Ultimately losing all hope of rescue or restoration, these women had resigned to their life but, again, they were expected to return at the behest of the respective governments of the two countries. Women had become mere tools of diplomatic manoeuvring between the hostile governments who were under immense political pressure to retrieve the population of women that had been left behind or abducted during Partition. One such woman’s tale is narrated in â€Å"Exile†29 where the woman narrator is forcibly married to her abductor, Gurpal, a man who regards her as nothing more than a maid that he brought to serve his mother (Badi Ma). What is even more poignant is the fact that Badi Ma, a woman herself is not able to empathise with her Bahu30 or show kindness towards her. She is merely there to serve their needs, like a tool. Ironically, Gurpal who is clearly devoted towards his mother evidently has no guilt about ill-treating a woman of another community. We can see here the oppressive influence of patriarchal society that does not allow for women to exercise an opinion of their own. The narrator has never been able to accept Gurpal as her husband. In nine years she has never able to understand why her brother, whom she dearly loves has not come to rescue her. She feels lonely and abandoned by her loved ones. She longs for her home and wants her life to end at last so she can be at peace. When the soldiers arrive to rescue her, she knows that she cannot return since she will not be accepted back as a ‘mother’. And she cannot leave her children. Hence she hides from the soldiers. Her apprehension of the other option can be justified by reading â€Å"Lajwanti†31 whose tragedy is shrouded by complete silence. She was treated abominably by her husband, Sunderlal who asserts his domination over her body and mind by beating her like an animal. She bore it all as part of her wifely duties clearly adhering to traditional norms of domesticity. But when she is abducted during Partition chaos, her husband, perhaps, feeling remorse for how he had treated her, became a campaigner for the rights of abductee women. He advocates their rehabilitation and reacceptance into society but when his wife, Lajo is restored to him, he distances himself from her and sets her on the pedestal of a goddess. She feels alienated, lonely and longs for her old life where she could at least interact with her husband. In the present, her husband wants her to forget her sufferings and not to speak of them. But can the past really be forgotten as easily as he wanted it to be? Many women who had built new lives for themselves post-Partition often came face to face with their pasts when their lost loved ones returned back to them. In this situation, what was the woman to do? Should she abandon her present life to return to her past happiness? This is obviously a problem to which there is no clear-cut solution. But it was often expected of women to move on from their pasts and not look back but even they are living, breathing human beings with feelings and emotions. These may be unwanted but cannot be so easily banished from the mind. Women end up feeling conflicted all throughout their lives. One text that accurately depicts one such situation is â€Å"A Visitor From Pakistan†32 where the protagonist Saraswati is trapped between her first husband, Baldev whom she had thought dead; and her husband at present, Sunderdas who had saved her and her parents during the riots. Her own mother chastises her for even talking to Baldev so then who will understand her predicament? She is blamed for something that she is not even responsible for. Partition left a long-lasting impact on the women who witnessed and suffered through it. They passed on the lessons they learned to their daughters hoping for a better future for them. It is an important part of women’s history and it should be analysed carefully to change the conservative thought processes of Indian society to avoid women from becoming subjects of patriarchal oppression and break the repetitive patterns of history. END NOTES : 1. India and Pakistan were divided along the Radcliffe Line with Muslim majority areas seceded to Pakistan and Hindu-Sikh majority areas to India. 2. Mahatma Gandhi was deemed the â€Å"Father Of The Nation† and hence affectionately called Bapu by the general populace. 3. J.L. Nehru and M.A. Jinnah were leaders of the Congress party and Muslim League respectively. They were not agreeable to sharing power in the united govt. of sovereign India and hence the only option was to divide the country with both parties ruling over their majority vote areas. 4. The metaphor of madness was used by many Partition writers like Saadat Hasan Manto in â€Å"Toba Tek Singh† to describe the religious hatred that changed normal people into rioters, rapists and murderers. 5. J.L. Nehru stated this in The International Women’s Conference in 1947 alluding to the extreme violence perpetrated upon women in North India. 6. Ideas postulated by Carl Jung and supported by Freudian theories. 7. Women were kept under purdah and not allowed to meet with people outside the family. Women lived in separate quarters of the house called the ‘antahpur’ which was solely in their control. 8. written by Krishan Chander 9. written by Bhishma Sahni 10. written by Gurmukh Singh Musafir 11. Ironic since Munni’s saviour is herself a victim of circumstances and Munni is just a way to earn more money. 12. â€Å"A Grave Turned Inside Out† by Ibrahim Jalees 13. Ayesha was the lady of a noble family but debased to the level of a common prostitute. Shows that societal hierarchies were suspended during Partition. 14. written by Sultan Jamil Nasim 15. The slogans Hindustan Zindabad and Pakistan Zindabad were carved onto their bodies as validating gestures of the victimiser’s own national identity. 16. Derealisation is a psychological condition where the subject deludes himself/herself into thinking that their present reality is illusory and unreal and that reality is different. 17. Independence was achieved after a long struggle, so there was jubilation among the people but at the same time, this happiness was marred by the grief of Partition and its aftermath. 18. written by Intizar Hussain 19. Izzat is one of the basic concepts of Hindu womanhood where a woman’s honour is defined by her chastity and any outrage of her modesty stains her honour as well as her family’s. The family’s honour is an extension of the woman’s honour. 20. Internalisation is the process of integration of certain values as part of the self-identification. It becomes a part of one’s self-image. 21. Johar is the ancient Rajput tradition of women jumping into huge fire-pits to save their honour from the enemy’s army if defeat seemed imminent. 22. Women jumped into wells to protect themselves from rape and mutilation. Dying chaste was preferred to living a life of humiliation. Hence, they were saved in the eyes of society. 23. Women who committed suicide were venerated because they were believed to have died for a noble cause. Hence, their deaths received social sanction and appreciation. 24. If women were raped, their bodies no longer remained solely of their religion. And, hence, inter-religious taboos were applied to such women. Hence chopping of the bodies signified that no one of the other side had had sex with her or would be able to. 25. The womb was removed to signify that it did not carry a Muslim bastard child and her ability to do so is removed from her. 26. During conflict, the opposing faction is alienated and presented as someone strange and unfamiliar to the minds of the mob. This requires dehumanization of the people from the other side so that they do not evoke emotions of sympathy. 27. The taboos associated with untouchability are not allowing them to eat and drink from the same vessels and prevent from touching them. 28. Sita was banished from Ayodhya because even though she was pure, the people of Ram’s kingdom did not believe her. Doubts were cast on her character since she had lived in Ravana’s Lanka for a long time. 29. Written by Jamila Hashmi 30. When a bahu arrives in her marital household, she is bedecked with jewels, dressed in finery and serenaded by shehnai. She is full of happiness and hope. Here, the narrator is exactly opposed to this situation and yet, ironically she has become the bahu of a family. 31. written by Rajinder Singh Bedi 32. written by Ramlal BIBLIOGRAPHY: 1. â€Å"Partition In Fiction: Gendered Perspectives†, Isabella Bruschi, New Delhi, Atlantic Publishers & Distributors (P) Ltd.,2010 2. In The Heat Of Fratricide: The Literature Of India’s Partition Burning Freshly (A Review Article)†,Jason Francisco 3. â€Å"Stories About The Partition Of India†, Vol. 1.,Ed. By Alok Bhalla, Delhi,Harper Collins, 1994 4. Re-Membering Woman: Partition,Gender And Reorientations, â€Å"Narrating Partition:Texts, Interpretations And Ideas†, Sukrita Paul Kumar, Indialog Publications,2004

Thursday, January 2, 2020

Holocaust A Diabolical Plan - 1148 Words

Eve Atkins Dr. Cooperman November 17, 2015 Holocaust: Nazi Germany and Jews A Diabolical Plan In the movie, The Pianist, a group of SS officers throw an elderly man in a wheelchair off a balcony when he does not follow orders to rise. Later, they yell, â€Å"all out into the yard† as they escort throngs of Jews into a line. A woman cries, â€Å"where are you taking us?† and is immediately shot. Another woman sits moaning and whimpering because she was forced to smother her baby in order to prevent the police from hearing the cry. Men and women steal food from their own people out of utter desperation and starvation. The Pianist is not an over-dramatized production of the Holocaust but a realistic depiction of life for Polish Jews in the years from 1939 to 1942. During this period, over 400,000 Jews were confined to the Warsaw ghetto alone. The Nazis used the ghettos in Poland as a means of segregating and confining the Jews. They focused on economically, physically and emotionally draining and destroying their victims. With the underlying aim of extinguishing an â€Å"inferior race†, the Nazis implemented a ghetto system that ultimately served as a round up center for mass extermination. Jews lived in unimaginable unsanitary conditions, facing starvation and epidemics. Although from the Jewish perspective - at least at first - the ghettos were to serve only as a short time situation until Hitler’s regime fell, for the Nazis the ghettos were the first step in â€Å"the FinalShow MoreRelatedThe Hbo Movie : Conspiracy1431 Words   |  6 Pagesguarantees that extermination of the Je ws was not being considered. Soon it became apparent that the meeting was less of a conference to negotiate and plan, than to establish new laws and clear lines of authority with the SS in control. After only two hours of strictly controlled debate the meeting adjourned with a basic plan of operation and a new diabolical means for implementation. Gas chambers would be the tool to help them reach their ultimate goal; the total eradication of every Jewish person inRead MoreAdolf Hitler And The World War II Essay1653 Words   |  7 Pageswould take more alive and kill more capture and correctness around the orb than any foregone forces. Among the estimated 45-60 million community assassinate were 6 million Jews murdered in Nazi major tent as part of Hitler’s diabolical â€Å"Final Solution,† now assumed as the Holocaust. At the same opportunity, Japan s increase in China was still not much, although the nationalist and communist Chinese commence fighting each other again. Japan was scheme to take over European colonies in Asia while theyRead MoreThe Jewish Holocaust Essay1872 Words   |  8 PagesThe Jewish Holocaust could be, and is, widely accepted as one of the most brutal and damaging atrocities ever to occur in the history of humanity. The level of brutality brought on by this atrocity is to such a degree that whenever the word â€Å"Holocaust† is mentioned it is not the Greek origins of â€Å"offer burning† that comes to mind; but, instead, the thought that resonates is the death of approximately 6 million Jews and other minorities brought on by racial hatred, radical ideology, and establishedRead MoreThe Effectiveness Of Nazi Propaganda3046 Words   |  13 Pageson race and race alone.†1 This propaganda was centered upon any race that provided a threat towards Hitler s master race, the Aryan race. Specifically, it displayed a strong dislike for the Jews and the Slavs. Hitler portrayed them to be diabolical, having a plan to destroy Germans and infiltrating his master race. Hitler knew the value of propaganda early on in his political career and his goal was to make the people understand the idea of the totalitarian system. This proved key to the success ofRead MoreEssay on Adolf Hitler: Evil Personified3870 Words   |  16 Pageswithout question, an infamous one. He was a historically significant figure who, as national leader of Germany, staged the perpetration of arguably the most despicable acts of genocide in recorded history. Hitler’s role as the architect of the Holocaust places him at the top of the list of history’s villains. By committing atrocities that most of us find beyond comprehension, Hitler has for many people become the definition of evil, an example of absolute malevolence even to those who normally