Blog post

  

For this blog post, summarize one of the articles below. Be sure that you provide the APA reference for the article you located. Your post may take the form of an annotate bibliography. You must write at least 50 words. 

21———. (2016). Number of foreigners employed in China. Statista. Available at: www.statista.com/statistics/251166/number-of-foreigners-employed-in-china; Yang, G. (2016). Hiring foreign employees in China. Available at: www.chinalawblog.com/2016/08/hiring-foreign-employees-in-china.html (accessed October 8, 2016); ———. (2004). 2002 worldwide survey of international assignment policies and practices. ORC Worldwide, January 4. Available at: www.orcinc.com/surveys/wws2002.html; Feng, S. (2009). Expatriate localization: A Chinese solution. Available at: www.mercer.com.

23Martins, A., & Lengre, J. (2007). Expat networking: Helping you improve the success of expat assignments. Available at: www.expatwomen.com/tips/expat_networking_helping_improve_success.php; Wederspahn, G. M. (1992). Costing failures in expatriate human resources management. Human Resource Planning, 15, 27–35. Note that there is evidence that failure rates might not be nearly as high as originally claimed [see Harzing, A. (1995). The persistent myth of high expatriate failure rates. Human Resource Management, 6, 457–475; Christensen, C., & Harzing, A. (2004). Expatriate failure: Time to abandon the concept? Career Development Journal, 9, 616–626—but, this article also cautions practitioners not to conclude that expatriate failure rate is not an important issue, despite the original claim rate]. See also: Kraimer, M., Bolino, M., & Mead, B. (2016). Themes in expatriate and repatriate research over four decades: What do we know and still need to learn? Annual Review of Organizational Psychology & Organizational Behavior, 3, 83–109; Bhaskar-Shrinivas, P., Harrison, D. A., Shaffer, M. A., & Luk, D. M. (2005). Input-based and time-based models of international adjustment. Academy of Management Journal, 48, 257–281.

50Schuler, R. S., Jackson, S. E., & Tarique, I. R. (2011). Framework for global talent management: HR actions for dealing with global talent challenges. In H. Scullion & D. G. Collings (eds), Global Talent Management. New York, NY: Routledge, pp. 17–36; see www.colgate.com/app/Colgate/US/Corp/WorkWithUs/Careers/HomePage.cvsp.

db4

 

From the Research Paper in Lesson 4 share the types of countermeasures you discovered.

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber attack from occurring.

Start a discussion thread and discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.

You must do this following:

1) Create a new thread. As indicated above,  discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.

2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread. 

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

  • What did you learn from your classmate’s posting? 
  • What additional questions do you have after reading the posting? 
  • What clarification do you need regarding the posting? 
  • What differences or similarities do you see between your posting and other classmates’ postings?

Discussion 2-3 paragraphs

Determining Jurisdiction

John Miller is the information security and privacy officer of a local county-owned teaching hospital. He is new to his position and began his work by evaluating the existing security and privacy controls that are in place in the institution. He is also new to information security, having only recently graduated with a BS in information security with professional experience as an active-directory administrator for two years. This work with active directory created his interest in pursuing a position in the field of security. Because he has most experience in the area of account management, user creation and management, groups, roles and group policy, these are the areas where he began his work. He found literally hundreds of idle accounts indicating that users are created but are not properly discontinued when medical students, nursing students, and other employees move on and no longer need access to the data collected and stored by the hospital. This discovery inspired him to begin digging into other aspects of the security controls, and he found evidence of malware on the servers that house the data collected and stored for use by the hospitals clinical systems. His next discovery was the most alarming. The objective of the malware that had deeply infested the hospital systems was to package and transmit all available data to a remote host located in North Korea. John is clearly in over his head at this point and needs to act quickly to resolve this situation and stop the flow of personally identifiable health information to an unauthorized third party.

Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:

  • What primary laws, regulations, or statutes have been violated by this lack of attention to controls, leading to this serious breach of security?
  • What channels of communication should John enlist to assist him in resolving this matter, and in what order should those communication sources be contacted?
  • What tools and any supporting resources are available to John to determine the breadth of the breach and the mitigations available to secure those assets?

Response 1 reply

The SLA management system mechanism speaks to a scope of financially accessible cloud administration items that give highlights relating to the organization, collection, storage, reporting and runtime notification of SLA data.

A SLA administration framework sending will for the most part incorporate a storehouse used to store and recover collected SLA information in light of pre-characterized measurements and revealing parameters. It will additionally depend on at least one SLA screen systems to gather the SLA information that would then be able to be made accessible in close realtime to use and organization gateways to give continuous input in regards to dynamic cloud administrations.

Why it is important in cloud infrastructure management?

An SLA serves as both the blueprint and warranty for cloud computing. The SLA monitor mechanism is used to specifically observing the runtime performance of cloud service to ensure that they are fulfilling the contractual Quality of service(QoS) requirements that are published in SLA. The data collected by SLA monitor is processed by SLA management system to be aggregated into SLA reporting metrics.

Convert SLAz to help overall business outcome : Even though the cloud computing market in world is growing considerably, very few Small Medium Business(SMB) companies have the IT maturity to take an infrastructure-based SLA and map it to business outcomes. Organizations should opt for SLAs that best suit the business requirements, instead of going in for strigent. If the organization decides on a stricter SLA infrastructure level, then the cost will have to borne by the company itself. Clod SLA monitoring becomes logical and partical when focus is on a prudent business-transaction-level SLA(Number if hits on the website, database  transaction etc) and not just the infrastructure level SLA( response time, latency and availability).

                                                                        Reference

Mandar, K. (2011). 6 cloud SLA monitoring tips for better service delivery. Computer weekly. Retrieved from https://www.computerweekly.com/tip/6-cloud-SLA-monitoring-tips-for-better-service-delivery

Thomas, T. (2011). Service Level Agreements in the cloud : who care? . wired. Retrieved from https://www.wired.com/insights/2011/12/service-level-agreements-in-the-cloud-who-cares

A-plus writer

Response Paper 1: Confucius

Book Response Papers Assignment

 

This should be a one-half page (approximately 250 word) response. It should not be a summary, but an essay on your intellectual and emotional reactions to the book. This essay should be submitted before you continue on in the course in order to receive feedback that will help improve your future essays. For more detailed instructions on this assignment, see the Book Response Papers section in the Course Organizationsection of the syllabus.

Topic: Confucius

 

 

The Religious Thought of Confucius

By now I hope it’s clear that Confucius was above all a philosopher. He knew about but did not dwell on the paradoxical and perplexing questions of our existence. He thought and spoke little about death, the afterlife, or the gods and our relationships with them. For him, this life had enough problems of its own for us to worry about the afterlife or the gods. A famous line in the Analects sums this up: “Pay your respects to the spirits and gods, but keep them at a distance.” Depending on the translation, you can also have this: “By paying your respects to the spirits and gods, you can keep them at a distance.” Regardless of how you translate, one thing is clear: the gods and spirits were not supremely important to Confucius. He had more important and urgent matters to attend to in the here and now than to worry about the realm of the dead and the supernatural. Here is another famous line in the Analects: “Never having understood life, how is it possible to understand death?” (I had this line thrown at me in Taiwan as a missionary.) The question for Confucius is not whether the spirits and gods existed—he probably thought they did; the question for him was what to do with this belief. “Not much,” he seemingly answers.

Confucius was a very practical man with little patience for mysticism. He might have heard of the Upanishads in India and the emphasis there on meditation to fuse your individual self with the Great Self of the universe. He tried it, but he didn’t like it. He said, “I have at times spent a whole day without taking food and a whole night without sleep, occupied with thinking [meditation]. It was of no use. I have found it better to study.”

Confucius would have rather read a good book, especially if it were on the history of the early Western Chou, when all was well in society. Confucius did have a great reverence for Heaven. He saw Heaven more or less as nature, or the way the universe ran itself. For him, Heaven was trying to speak to us. It had something to teach us. Heaven, or the natural universe, was an inspiring model of well-ordered constancy. The seasons came and went according to their pattern, the birds came and went, and crops grew in accordance with their seasons. Human beings should be inspired by this, he believed, and order their society after the pattern indicated to them by nature. Heaven was to be analyzed and then duplicated in the world of man. On one occasion, Confucius seems to have been frustrated with his pupils, who were learning imperfectly. He announced to them he would rather not speak at all. He said:

“I would rather not speak at all.”

“But if you do not speak, sir,” asked Tzu-kung, “what shall we, your disciples, learn from you to be taught to others?”

“Look at the Heaven there,” answered Confucius. “Does it speak? And yet the seasons run their appointed courses and all things in nature grow up in their time. Look at the Heaven there: does it speak?”

Research project

  INFORMATION GOVERNANCE SEMESTER PROJECT – PHASE I Introduction to the Company: Security Transport Professionals Incorporated (STP), has its home office located in Lexington, Kentucky and in addition has more than 3,000 employees located in each of its branch offices located in Houston, Texas and San Diego, California. STP is primarily a nationwide freight hauler. Its customer are comprised of major market retailers particularly in the medical and pharmaceutical industry, the federal government, and several state governments. STP operates a fleet of trucks and private cargo planes that it uses to move “goods” belonging to its customers from one destination to another across the continental United States. Its fleet of truck carriers are located in Lexington, Kentucky with it planes located in Louisville, Kentucky. STP carries and transports highly controlled, narcotics and scheduled prescription drugs, toxic, radioactive, nuclear, and top secret materials from one facility belonging to its customer to another. The method of transport depends on the type of cargo being hauled. In addition to hauling/forwarding its customers products/goods, STP is required from time to time to store its customer goods for brief periods of time. Two years ago STP began contracting with a number of subcontractors hereafter referred to as either “limited joint partners (LJPs)” or “independent subcontractor alliances (ISAs)” for the purpose of expanding its freight forwarding, storage, and delivery service. Due to the confidential nature of the freight that it transports, STP vets its employees, as well as any subcontractors (LJPs and ISAs) that it engages. STP’s business objectives and goals include the confidential, safe and secure movement of its customer goods, from the customer/distributor to its client, or from one of its customer’s locations to another of the customer’s locations in a timely and efficient manner using costeffective methods. Alternatively, STP may transfer this responsibility to one of its limited joint partners (LJPs) or independent subcontractor alliances (ISAs), if it is more cost-effective and the income differential is within acceptable limits. There are 3 LJPs with which STP had entered into contracts.  LJPs are corporate organizations in the same industry that offer essentially the same services as STP, and who are generally competitors of STP. However, when the job requires resources that exceed those of STP or its competitor, the two will enter into an agreement to jointly undertake the contract together, and will together provide the same full range of services, with both entering into the same contract or joint venture with the customer. Independent subcontractor alliances (ISAs) differ from Limited Joint Partners (LJPs) in that a ISA is not a direct competitor of STP. Rather, the ISA is a company that offers a subset of services to STP, or contracts with STP to provide it with necessary resources to perform the particular job at hand. For example, an ISA may be a warehousing company that provides only storage facilities for STP. Alternatively, an ISA may be a company that is engaged in service and repairs for STP’s trucks and planes, and/or provide sterilization and cleaning services for STP’s trucks and planes upon completion of a job, where STP had transported hazardous or toxic materials, requiring specific types of sterilization or cleaning services for its transport vehicles. There are other types of ISA that STP engages and contracts with. With regard to ISAs, STP is the only organization that will contract with its customer or who will be identified to the customer. It will then enter into its own separate subcontractor contract with its ISA, and the ISA is not identified to STP’s customer. There is no definitive number of ISAs that contract with STP. The specific ISAs used (if any) will vary depending on the geographic location or area of the country involved and the availability and cost of the ISA available to service the area. STP is also under pressure from several of its competitors in the industry. The competitive market is driving STP to improve its routes, delivery methods, fleet vehicles, and other facets of its business to increase profits (a strategic goal) and to reduce costs. The company realizes that its information technology infrastructure has been neglected for some time and that many operating locations are running on outdated hardware and software. On several occasions last year, STP suffered no less than four network compromises through one of its LJP Internet sites that led to the disclosure of sensitive and strategic information on contracts and mergers. The chief information officer (CIO) made a strategic presentation to the board of directors and executive management to first assess the aging infrastructure and then, develop a multi-year  phased approach to have all sites (except for LJP and ISA) on the same hardware and software platforms. Information about the assessment indicates that the current state core infrastructure (switches, routers, firewalls, servers, and so on) must be capable of withstanding 10-15% growth every year for the next seven years with a three-to-four-year phased technology refresh cycle. There is a hodgepodge of servers, switches, routers, and internal hardware firewalls. Nearly all of the infrastructure is woefully out-of-date in terms of patches and upgrades. This operational neglect has unduly increased the risk to the network, in terms of confidentiality, integrity, and availability. Since this will be a multi-year technology upgrade project, something must be done to reduce STP’s exposure to vulnerabilities to increase the overall security profile and reduce the risk profile. Now that the funding has been approved for the infrastructure assessment, the CIO has decided that it might be a good idea to implement an Information Governance Program into the organization, assuming he can sell the corporation on its benefits. To that end, the CIO has hired you as IG Project Manager to assist in initial preparatory stages. STP Job Roles: In addition to the CIO, below is a list of individuals at STP to whom you have been introduced. The CIO has informed you that you can call upon any or all of the individuals who hold these job roles/titles for assistance and may name any of them to be on your project team. You may also call upon any of the heads of the various business units for assistance, as well as a designated contact person for each of STP’s LJPs and ISAs. ▪ Chief Executive Officer (CEO)* ▪ Chief Information Officer (CIO)* ▪ Chief Financial Officer (CFO)* ▪ Executive VP of Marketing* ▪ VP of Human Resources ▪ In-house Counsel ▪ In-house Financial Analyst and Risk Manager ▪ Senior Records Manager ▪ Senior IT Manager ▪ IT Security Expert ▪ Overland Transport Manager  ▪ Airway Transport Manager ▪ Overland Transport Manager ▪ Airway Transport Manager ▪ Southern Region General Manager (Houston, Florida) ▪ Western Region General Manager (San Diego, California) ▪ Information Security Specialist * This individual is also a member of STP’s Board of Directors INSTRUCTIONS: While it should go without stating, information related to each of STP’s customers and the products that you are transporting for them is highly sensitive, and in some cases top secret. You want to make sure that any IG Program that STP ultimately implements will allow STP to retain all of the information about its customers, the product transported, and the particular haul that it is required to keep pursuant to federal and state law. You want to insure STP that the proper information will be retained that it might need for purposes of litigation and e-discovery. At the same time, you don’t want STP to keep unnecessary information for extended periods of time, thereby increasing the cost and time involved with processing and retention. 1. First, select and list 10 individuals to serve on your IG project team. Explain why you selected the team members that you did. 2. Conduct the necessary research for each of STP’s state of home office (Kentucky), and for the state of each of its primary hubs (Texas and California), that will allow you to (a) educate yourself and your team members on the mandatory information retention requirements and privacy consideration for each of the three states, and (b) be able to intelligently discuss the legal and regulatory requirements with in-house counsel. You will want to conduct internet research on this and may also want to review Appendix B in your text book. Do not ignore this area of the project. 3. Ultimately, your team will be required to create a “risk profile” and risk analysis, that will describe the set of risks facing STP in achieving its business objectives while protecting its information and that of its customers, LJPs and ISAs, and which will allow STP to assess the likelihood these risks hold and their potential impact, if materialized, and in addition will permit STP to identify risk mitigating factors to be implemented. You need to brainstorm in order to present the information to your team members that will facilitate the creation of a risk profile and analysis. To that end, create a top-10 list of the greatest risks to information that STP will face, ranking your list in order from highest or greatest risk to lowest, for each risk identified, state whether you believe the risk could be assumed, transferred or mitigated in full or in part. Also, for each risk identified identify the individual, title or business unit that the team member will want to contact in order to obtain additional information about the fundamental activity that will assist your team in fully completing the risk profile and analysis.  

reply dr 4

The essential specialized abilities required by the staff of a CSIRT group have been isolated into two classes whether low maintenance or full time:

1. Specialized Foundation Skills

2. Occurrence Handling abilities

Thought the low maintenance staff would be brought in just when required they should at present have every one of the aptitudes excepting the week after week working or timing definitions that a full clock would have. Specialized establishment abilities require a fundamental comprehension of the basic advancements utilized by the CSIRT and the voting demographic, just as comprehension of issues that influence that group or voting public. Such issues may include:

• The sort of episode action that is being accounted for or seen by the network

• The manner by which CSIRT administrations are being given (the dimension and profundity of specialized help gave to the body electorate)

• The reactions that are fitting for the group (e.g., what strategies and systems or other regulations must be considered or pursued while undertaking the reaction)

• The dimension of power the CSIRT has in taking particular activities while applying specialized solutions to an occurrence answered to the CSIRT

The specialized abilities would incorporate knowing about the accompanying:

§  Security Principles

§  Security Vulnerabilities/Weaknesses

§  The Internet

§  Dangers including PC security chance examination

§  The different system conventions set up

§  CSIRT staff individuals need a fundamental comprehension of the basic system applications and administrations that the group and the voting public use (DNS, NFS, SSH, and so on.)

§  Ideas of system security and have the capacity to perceive defenseless focuses in system arrangements.

§  Comprehend security issues at a host level for the different sorts of working frameworks (UNIX, Windows, or some other operation e rating frameworks utilized by the group or body electorate).

§  Malevolent Code (Viruses, Worms, Trojan Horse programs)

§  Some colleagues would need PC programming skills (Java, C#, Python, and so on)

The elements that would impact their choices are:

1. How adaptable would the functioning hours be as they have another activity close by to do.

2. What amount would they be paid for

3. Employer stability being a section clock

500-3

  

List Outcomes from Your 16 -Week Course – List the outcomes (objectives) as written in the course syllabus from the 16 – week hybrid course.

Ø Identify recent technological changes which have broadened the scope and applicability of legal transactions

Ø Using freely available internet sources, search for and download state and federal statutes and case law pertaining to a Cyberlaw subject and cite that law using standard legal notation.

Ø Describe the legislative process and Court interpretation of statutes by case law with respect to cyber events.

Ø Identify the constitutional and statutory criteria which are designed to protect rights to intellectual property for copyrights, trademarks, and patents and show how those rights have been protected by Court action in internet transactions.

Ø Identify and describe statutory and case laws which the government uses to influence commerce on the internet.

Ø Describe the transition of traditional tort litigation to its use in internet transactions.

Ø Using freely available internet sources, search for and download state federal statutes and case law pertaining to an internet crime and cite that law using standard legal notation.

Ø Identify and discuss methods which are used to violate either private or public interest by malicious use of the internet.

Ø Describe the limitations of venue-based litigation in internet procedures and propose methods of resolution of disputes by new or different technology and procedures.

Work Experience: 

· Responsible in delivering the complete Project Plan with total supporting data which included the status Reports, Issues Log, Performance Testing Matrix, detailed Testing Reports, Fine tuning Recommendation reports to both Executive Management & Senior Management

· Responsible to provide Technical and Functional Support to the users, tester and Business System Analysts

· Managing and Preparation of the Test Plan and Test strategy for the various projects

· Liaison with the onsite and offshore teams for testing status and issue resolution

· Tested the data mapping, fixing errors

· Tested staging table for EDI 210 Invoice, Balance Due Invoice, EDI 810 Invoice inbound, 850 Inbound Purchase order

· Tested Web service using SoapUI

· Involved in User acceptance testing (UAT)

· Written standard test scripts for Oracle Financial, Procure to Pay, SOA, web services

· Involved in standard Functionality testing in Phase I Phase II for 3 Instance

· Documented and communicated test results to the test Management and Business Management Team

· Worked closely with Developers team for different issues

· Experience with test automation tools like JIRA

· Worked on the testing of SaaS, Web services, XML and web application.

Read and response to it, and i need quality respond. (Due on monday morning)

 

As an Information Assurance and Security Specialist the job role would be making sure that the organization is secured with all the correct standards and protocols. Some best practices would be to implement a formal IS Governance Approach, stop data loss, detect insider threat, back up all data, and being aware of social engineering, along with many other things to consider. Implementing a formal IS governance approach allows a company to establish and maintain an information security framework. The framework is design to align the assurance strategies and support the business. It extremely vital to have a security mechanism in place to stop or prevent data lost. Losing data can cause a company’s failure and trust of a consumer. A recent survey found that data stolen or misused from vendors and contractors as well as employees. With data being exposed to employees and outside vendors, there needs to be some line of defense to monitor user activity to detect any insider threat. Looking for unauthorized behaviors and making sure no one is violating the security policy. Back up of data can be crucial too, especially when there is a major disaster and/or breach of a system. Social engineering is becoming more and more popular as technology continues to increase. Having the correct training and knowledge keeps all employees aware of what social engineering is and how to mitigate anyone from trying to gain any sensitive information. (Donovan, 2017)

As an information security analysts the expectations are to plan and carry out security measures to protect the organization’s computer network and systems. While working on a project the most important requirements are confidentiality, integrity and availability. Confidentiality in my role is where I would help control who gets to read any information. Integrity, I will help assure that information and programs are change in a specified and authorize manner. Availability would be assuring that authorized users have access to the information and resources.

While working on the current project, I believe we will be successful as long as protocols and standards are followed and done correctly. Implementing a security policy will allow the organization to be profitable and grow. It takes a team for a business to strive and grow. Making sure that all employees are well trained and is aware of expectations of the company we have no choice but to strive for greatness.

Working with a team to complete a project is critical for success. Some best practices that a team member or an effective team should have are:

  • Being confident, not arrogant: Being confident is speaking up when something comes to mind, so that your opinion could be heard and possibly used.
  • Good Communicator: Communication is the key! Without it someone could be left out, not know what is expected, and possibly be slower. Everyone on the team should be well aware of the expectations, a timeline and how the team is progressing. This will help make sure things are done effectively and efficient for sure.
  • Responsibility and loyalty: Being accountable for your own actions, mistakes and successes helps lessen confusion and keeps the ball rolling. Loyalty is hand and hand, I would say. Because being loyal to me is being responsible and willing to go to the end weather its good or bad. There may be times when the project becomes to stressful or you just feel like you can’t do. Staying loyal and strong will help get you to the end. (Clarizen, 2017)

References

Clarizen, T. (2017). 10 Practices of Highly Effective Team Members. Retrieved from https://www.clarizen.com/10-practices-highly-effective-team-members/

Donovan, K. (2017). 10 Cybersecurity Best Practices for IT, IS, Network & Data Security. Retrieved from https://www.observeit.com/blog/10-best-practices-cyber-security-2017/

History of Art throught the Middle Ages

  

HUM1001 

Art History: Prehistory to the Middle Ages

W2 Project 

Exploring the Art and Architecture of the Ancient Near East (Mesopotamia) and the Art from the Ancient Aegean.

Part 1- The Art of the Ancient Near East (Mesopotamia)

Example 1

[Insert image 1]

Title:

Date:

Place of origin:

Detailed Description:

Historical Value:

How does this image prove or disprove the statement about the nature of art from this region, “It has been suggested that the art from the ancient Near East often contains elements that can be seen as fearsome, militant, and/or political in nature”?

Example 2

[Insert image 2]

Title:

Date:

Place of origin:

Detailed Description:

Historical Value:

How does this image prove or disprove the statement about the nature of art from this region, “It has been suggested that the art from the ancient Near East often contains elements that can be seen as fearsome, militant, and/or political in nature”?

Example 3

[Insert image 3]

Title:

Date:

Place of origin:

Detailed Description:

Historical Value:

How does this image prove or disprove the statement about the nature of art from this region, “It has been suggested that the art from the ancient Near East often contains elements that can be seen as fearsome, militant, and/or political in nature”?

  

Part 2- The Art of the Ancient Aegean

Example 1

[Insert image 1]

Title:

Date:

Place of origin:

Detailed Description:

Historical Value:

How does this image prove or disprove the statement about the nature of art from this region, “It has been suggested that the art from the ancient Aegean often contains elements that can be seen as harmonious, exuberant, and non-threatening”?

Example 2

[Insert image 2]

Title:

Date:

Place of origin:

Detailed Description:

Historical Value:

How does this image prove or disprove the statement about the nature of art from this region, “It has been suggested that the art from the ancient Aegean often contains elements that can be seen as harmonious, exuberant, and non-threatening”?

Example 3

[Insert image 3]

Title:

Date:

Place of origin:

Detailed Description:

Historical Value:

How does this image prove or disprove the statement about the nature of art from this region, “It has been suggested that the art from the ancient Aegean often contains elements that can be seen as harmonious, exuberant, and non-threatening”?