Thursday, December 26, 2019

Elvis Presley Quotes That Reveal the Man

Elvis Presley broke all conventions of good performance as he rose to huge fame in the 1950s. He was a good boy turned bad. He was the master seducer whose stage performance was all about making provocative dance moves. Women swooned over his drooped glance, his hip thrusts and come-hither gestures. He was flirting with a million women at a time. And each woman felt that Elvis had eyes only for her. That was the power of his persona. And then came his music. Presleys music style was revolutionary. At a time when racial segregation and disparity among black and white Americans loomed largely, Presley taught tame, white Americans how to love black music for its upbeat rhythm, wild energy, and power. Television sets had burst onto the scene just before Presley did, and suddenly American teenagers had access to the sexually charged, rebellious music that Presley brought to the fore. This was exactly the kind of person American parents wanted their kids to stay away from because they considered him a bad influence on their kids. And what did the kids want? Well, they wanted to rebel. They wanted to step over the line, shed their decency and express their sexuality. Presley helped them with that. Naturally, they had found their king. He was known simply as The King or Elvis, such was his enormous fame. There is more to Presley than just his repertoire of songs. Known as the living legend in rock n  roll, Presley revolutionized the way the world understood and loved music. Presley died in 1977 at age 42 at his mansion,Graceland, in Memphis, Tennessee. Impersonators of The King and rock fans have continued to keep his memory alive. If Presley continues to live in your heart, you might find his voice reverberating with these quotes.   Childhood and Family My mother, she never really wanted anything. She stayed the same through it all. There are a lot of things thats happened since she passed away. I wish she could have been around to see them. It would have made her very happy and proud, but thats life, and I cant help it. I dont know why she had to go so young. But it made me think about death. I dont feel Ill live a long life. Thats why I have to get what I can from every day. I never felt poor. There were always shoes to wear and food to eat -- yet I knew there were things my parents did without just to make sure I was clothed and fed. Hollywood The only thing worse than watching a bad movie is being in one. Hollywood had lost sight of the basics. Theyre a lot of fancy talkers who like to pigeonhole you. Being a Rock Star The image is one thing and the human being is another. Its very hard to live up to an image. Im so lucky to be in the position to give. Its really a gift to give. People ask me where I got my singing style. I didnt copy my style from anybody. Country music was always an influence on my kind of music. Philosophy Then I can sit on my back porch at Graceland and remember the good ol days. You only pass through this life once; you dont come back for an encore.

Wednesday, December 18, 2019

The Human Immunodeficiency Virus ( Aids ) - 1765 Words

The Human Immunodeficiency Virus Degie Gelaw American Sentinel University The Human Immunodeficiency Virus Emerging and re-emerging infectious diseases are public health threats that require comprehensive, organized, and evidence-based control and prevention programs. The National Academies of Sciences, Engineering, and Medicine formerly known as the Institute of Medicine (IOM) appointed a 19-member multidisciplinary expert council to study the emergence of microbial threats to health and published a report in the United States about emerging infections (1992). The report cited there were six factors that influenced the emergence and re-emergence of infectious pathogens: â€Å"Technology and industry; Economic development and land use;†¦show more content†¦Further, a strain of SIV discovered in a chimpanzee in 1991 that was identical to HIV lead researchers to conclude HIV came from chimpanzees (Levy, 1993) and was determined those who died from the strange infection of pneumocystis pneumonia had HIV infection (Magnus, 2009). Pathogenesis and Occurrence of HIV HIV, a lentivirus causes AIDS through interaction of the different cells in the body mainly the cluster of differentiation 4 (CD4) molecules on cells and other cellular receptors (Levy, 1993) particularly responsible for the host’s immune system. Once HIV entry has occurred, the virus starts to destroy the host’s CD4 cells and replicates using an enzyme called reverse transcriptase and converting its ribonucleic acid (RNA) into a deoxyribonucleic acid (DNA) (Heymann, 2015). In addition, the ability for the HIV to break the long chains of protein that form the virus using an enzyme protease promote viral replication in the same manner as the body’s own immune system. â€Å"With CD4+ lymphocytes, HIV replication can cause syncytium formation and cell death; with other cells, such as macrophages, persistent infection can occur, creating reservoirs for the virus in many cells and tissues† (Levy, 1993, p. 205). Therefore, HIV-infected cells are present throughout the body in the bloodShow MoreRelatedThe Human Immunodeficiency Virus ( Aids ) Essay2117 Words   |  9 PagesIntroduction The Human Immunodeficiency Virus is coming from a subgroup of retrovirus called Lentivirus which causes HIV infection leading to Acquired Immunodeficiency Syndrome (AIDS) later on among humans. AIDS is a human condition which progresses to the failure of the immune system, causing life-threatening opportunistic infections and cancers to thrive. Treatments can be given, but without those, survival time after infection with HIV is estimated to be 9 to 11 years, depending on the HIV subtypeRead MoreThe Human Immunodeficiency Virus ( Aids ) Essay1235 Words   |  5 PagesIntroduction At the end of 2011, an estimated 1.2 million people aged 13 and older were living with the human immunodeficiency virus (HIV) in the United States, and the Centers for Disease Control and Prevention (CDC) estimated that approximately 50,000 people are newly infected with HIV each year (CDC, 2013). Fortunately, after more than 30 years of research on HIV, much progress has been made in fighting this disease. Antiretroviral therapy (ART) transformed what was once a death sentence intoRead MoreThe Human Immunodeficiency Virus ( Aids ) Essay2084 Words   |  9 PagesIntroduction The Human Immunodeficiency Virus is from a sub group from retrovirus called Lentivirus which causes HIV infection leading to Acquired Immunodeficiency Syndrome (AIDS). AIDS is a human condition which progresses to the failure of the immune system causing life-threatening opportunistic infections and cancers to thrive. Without treatment, survival time after infection with HIV is estimated to be 9 to 11 years, depending in the HIV subtype. Vital cells in the human immune system such asRead MoreHuman Immunodeficiency Virus ( Aids )1381 Words   |  6 Pagesdamaging diseases, and Ebola and HIV/Aids fall into the categories as one of the tougher diseases. Human Immunodeficiency virus (HIV) is the earlier stages of aids, it is a virus that either destroys or impairs the functions of the immune system cells. The last stage of HIV is the Acquired immunodeficiency syndrome (AIDS) which is when the immune system is defenseless to normal infections which now can be deadly. Ebola generally does the same thing as HIV/Aids, it attacks the immune system initiallyRead MoreHuman Immunodeficiency Virus ( Hiv ) / Aids1278 Words   |  6 PagesHuman immunodeficiency virus (HIV)/AIDS is a pandemic problem affecting global health. At the end of 2015, 36.7 million people were living with HIV/AIDS globally. The rate of incidence is more prevalent in Sub-Saharan Africa with almost 1 in every 24 adults living with HIV/AIDS. In the united states, HIV/AIDS is a diversified health problem affecting all sexes, ages and races and involving the transmission of multiple risk behavior. However, with the introduction of various prevention programs andRead MoreHuman Immunodeficiency Virus : Hiv And Aids1935 Words   |  8 PagesHuman Immunodeficiency Virus, better known as the acronym HIV is a virus that destroys the immune system and can evolve into an infection. HIV is known a as pandemic because the immune system can fight off the infection but can never clear the HIV out of the body. â₠¬Å"HIV is spread through contact with the blood, semen, pre-seminal fluid, rectal fluids, vaginal fluids, or breast milk of a person infected with HIV.† [AIDS] According to AIDS.info, in the United States, the virus is usually contractedRead MoreHiv / Aids : An Acronym For Human Immunodeficiency Virus971 Words   |  4 Pageswith no vaccine or cure. That disease is HIV/AIDS. A disease that is so powerful its position in our society has moved from epidemic to pandemic. In this paper we will explore HIV/AIDS and my one-day journey at one of Delaware County’s largest full service HIV/AIDS providers and how it changed my perspective on the disease and the people who carry it. What is HIV/AIDS? HIV is an acronym for Human Immunodeficiency Virus. This virus can only attack humans, hence the name, and reproduces by taking overRead MoreThe Human Immunodeficiency Virus ( Hiv ) And Acquired Immunodeficiency Disease ( Aids )1366 Words   |  6 PagesIntroduction Over the last three decades, the Human Immunodeficiency Virus (HIV) and Acquired Immunodeficiency Disease (AIDS) epidemic has been a public health concern in the United States (US) and globally. Centers for Disease Control and Prevention [CDC], (2015d) estimates that in the US, over 1.2 million people are living with HIV, of which 12.8% are unaware of their diagnosis. Due to exceptional medical advances in treatment and prevention strategies, a healthier quality of life and longevityRead MoreHiv / Aids Paper : Human Immunodeficiency Virus Essay1835 Words   |  8 PagesJanuary 2016 HIV / AIDS Paper Human Immunodeficiency Virus (HIV) is a retrovirus that attacks the human immune system, your body’s means of defense. The virus attacks specific viral defense cells, known as CD4+. As the disease spreads and attacks more CD4+ cells, your body no longer maintains its’ ability to fight of infections and diseases which leads to the death of the host. The final stage of HIV is known as AIDS (Acquired Immunodeficiency Syndrome). During this stage of the virus, the host getsRead MoreHiv / Aids ( Human Immunodeficiency Virus / Acquired Human Immune Deficiency )1249 Words   |  5 Pagesintroduction to the topic of HIV/AIDS, (Human Immunodeficiency Virus/Acquired Human Immune Deficiency) from its early appearance as a deadly communicable disease that causes a viral infection in humans. During the 1960’s the infection was largely due to unprotected sex; the victims contracted the disease mostly due to unprotected sexual contacts from others who already had the virus. It became an epidemic and even pandemic. Those infected eventually died from HIV/AIDS as it came to be known, and there

Tuesday, December 10, 2019

Integrated Anomaly Detection Cyber Security -Myassignmenthelp.Com

Question: Discuss About The Integrated Anomaly Detection Cyber Security? Answer: Introducation corporate organizations thus these are needed to be mitigated accordingly. Risk assessment should be done based on threats, vulnerabilities and consequences derived from the IT control framework. The IT control framework is consists of three different steps such as objectives, requirements and actual performance that have to be done to resolve the issues. With the help of the IT control framework the consequences of Gigantic Corporation could be resolved properly. The steps for assess the risks considering the IT control frame work include system characterizing, threat identification, control environment analysis and calculating risk rating. The entire operating and functional structure of the company is facing challenges due to lack of security approaches (Buczak Guven, 2016). In order to gain competitive advantages and more umber of consumers from the company is needed to identify the risks, assess the risks as well. However, after identifying and analyzing the risks respective control strategies are also needed to be adopted by the Corporation. Six different steps are there those are widely used by the companies to assess the identified risks of the company (Gordon et al., 2015). The Company is facing risks in their supply chain, customer relationship and existing data storage system as well. The identified risks of Gigantic Corporation are as follows: Risks in supply chain: It has been found that the physical supply chain of the company might face numerous risks. Not only this but also the supply chain also faces important role in the supply chain of the company. If any of the equipment is delivered through the supply chain then there will raise cyber security risks during the phases of cyber security (Liu et al., 2015). If any risk is identified after the delivery of any of an equipment then it is little difficult to detect the responsible person. The attacking technology such as virus inclusion in the hardware and software is currently referred to as a leading one that is highly taking place due to Trojan attack in order to serve the purpose of external hacking. Other different types of hardware attacks are also there that include the followings: The protected memory might be accessed by the unauthorized users While performing invasive operation hardware tempering might occur (Bonaci et al., 2015) With the insertion of different hidden methods, the casual authentication mechanism of the system might not support the system application For the other malware and penetrative purposes, the manufacturing backdoors might be created All of these above mentioned hardware attack or cyber threats may pertain to different devices or system also such as: The network system used by the corporation The banking or accounting system that has been used by the company The surveillance system used by the company The industrial control system used by the company The communication infrastructure of the device If the company fails to cover the cyber security basics then the common vulnerabilities and the cyber attack might become much dangerous. Due to lack of technical expertise and security alerts the cyber attackers can attack the server of the company with different cyber attacks (Hong, Liu Govindarasu, 2014). It is the responsibilities of the company to consider the most suitable risk mitigate approaches to resolve the issues easily. While identifying the system generally used by the company different threats ad risks assessment working guides are also helpful to grade the system and the two different terms based on which the assessments are widely done include severity and exposure. On the other hand, the more threats and vulnerabilities those might face by the Gigantic Corporation are elaborated below. Malware: Malware is referred to as an all encompassing term which holds various types of cyber threats including Trojan, viruses, worms etc. This is defined as a code that intents to steal confidential storage data. In addition to this it can also destroy many data stored in the computers (Carr, 2016). This might take place if the users try to download attached files and click on links send by the unknown senders. If the company lacks to use updated firewalls then also malware attack might take place. Phishing: Phishing attacks are done through emails, and links from unknown senders. In this case the attackers himself requests for data and due to lack of proper ideas those data might be misused or hijacked by the attackers (Cavelty, 2014). The phishing emails include different links those directs the users to the dummy site that would steal the users personnel data. Password attack: If the password using by the company is found to be not enough strong then, those can be easily hijacked by the users. And the data stored in the server of the company would be affected easily by the unauthenticated users. It is the responsibility of the users to secure their server with strong password to avoid external attacks. Denial of Services (DOS): DOS attack is referred to as a disruption to the services of the network used by the corporate company. This might take place while sending huge set of data from the sender side through the network channel. It requests for several connections and if any wrong request is accepted then issues or external attack might occur (Buczak Guven, 2016). There are different ways through which the attackers can achieve DOS attack but the most common DOS attack is the Distributed Denial of Service (DDOS) attack. This can also take a huge figure because in case of DDOS attack, it is difficult to detect the attack at the initial phase. Spoofing attack: The spoofing attack is referred to as an attack that is widely employed by the cyber scammers and the external hijackers even to individual, deceiving systems. Two different types of spoofing that could hamper the cyber security of the corporation are IP spoofing and ARP spoofs attack (Ben-Asher Gonzalez, 2015). These kinds of manmade attacks are initiated by the spoofers himself through unknown sources and unauthenticated users. While sending data from the sender to the receiver these kinds of attacks took place. Risk Mitigation and its Impact For the mitigation of the risk analyzed for the development of the Cybersecurity solution for Gigantic Corporation a network security plan should be developed and the vulnerability of the system should be analyzed. The network security threats are analyzed according to their level of impact on the current business process of the organization and the risk mitigation plan is prepared. For the loss of confidentiality and the integrity of the resources of the organization that have an severe impact on the growth of the organization, the servers installed in the network is required to be configured according to the business policy and proper antivirus or spyware program must be installed in the server for identification of the malicious codes that can be used by the attackers to control the network (Hall, 2016). The attacker can use the malicious codes for accessing the important information from the organizational servers such as the information of the employees, other sensitive informat ion for fooling the users and enforce distributed denial of service attacks such that the network resources are unavailable to the users connected in the network. A strong authentication mechanism should be applied for identification of the users using the system. The username and the password formation must be strong such that it cannot be easily cracked by the attackers (EugeneJennex, 2014). The password should be a combination of special character and alpha numeric such that it cannot be cracked using brute force attacks. The remote connection of the network should also be secured with the implementation of a firewall and configuring it to block the unauthorized request coming from the unknown sources. There are risk of drop of the performance of the network and increase in demand for accessing the resources of the network, in such situation it would cause delay and incur loss of data. The risks have a medium impact on the performance of the organization and can cause restriction of the users to access the core elements of the network. The risk can cause failure of the hardware and the software of the organizational network. There are risk of sabotage attacks and it can be mitigated with the configuration of the routers and the servers installed in the network (JennexDurcikova, 2013). The services that are running in the network unnecessarily such as the SNMP, TELNET and FTP should be stopped such that the hackers does not finds a way to intrude into the network. The organizational assets should be secured with password and authentication such that the remote user does not have access to the core components. The drop of the data packets in the network can cause corruption of the in formation and thus the drop of packets should be avoided for improvement of the performance of the network (Haimes, 2015). A penetration testing should be performed with the inclusion of a group of friendly system tester such that the flaws in the current information system and the organization should be identified. On proper identification of the open paths and vulnerability of the network the network should be configured to block the open ports and the unnecessary services should be stopped for eliminating the vulnerability of the network and securing the network from external agents. There are risks of link failure in the network and it can have a negative impact on the network and thus redundant link must be created such that the every part of the network can be reached using multiple paths. This increase the availability of the network resources and in case if a link between the source and the destination address is broken the redundant link can be used for transferring the data packets in the network and maintain the communication between the nodes installed in different location of the network (Bahr, 2014). The software and operating system used in the server should be updated and patched such that it is always secured. The risk of financial loss caused due to accidents and involvement of the employees working in the organization can be mitigated with the installation of an IPS and IDS system in the network and monitoring the current usage of the network resources of the network (Curran, Berry Sangsuk, 2014). The servers must be installed with a network monit oring tool such that the network administrator can monitor the flow of the data in the network and manage the network components connected in the network. The server loads can also be analyzed for balancing the loads mitigate the risk of server overload and unavailability of the data residing in the servers. For the management of the users the users needed to be grouped and their usage pattern should be identified for making the management process easy (Garca-Herrero et al., 2013). The network monitoring tool should be configured according to the usage and it should be configure to generate notification to the network administrator if any network change or abnormality in the data traffic is noted. The routers, switches, servers and the other core components of the network should be installed in a separate room and the normal users must be restricted to enter the room from mitigation of the risk from physical access. The risk of malware can be prevented by providing a training to the users to avoid installing of unknown software applications and avoiding of downloading unknown attachment from unknown sources. The routers installed in the network should also be configured with access control list such that the users cannot access the core servers (Chemweno et al., 2015). The request coming from different sources should be verified and an internal mail server should be configured for mitigation of the risk of phasing attacks and enabling the users to communicate with each other using the intranet of the organization. A data recovery and backup plan must be created for handing the emergency situation and the data should be backed up at a regular interval such that if the security of the network is compromised the backup servers can be used for retrieval of the information (EugeneJennex, 2014). The backup should be stored in remote location and cloud solution can also be deployed for remote storage and increasing the security of the network solution. Literature Review It is identified that in order to protect the website from Cybersecurity issues, it is quite important to follow some of the significant steps. According to Matthews (2017), the company needs to be keeping themselves up to date in order to avoid the issues that are associated with Cybersecurity. It is identified that if the company has proper information or knowledge about the possibility of the security risks then the website can be easily protected against the risks. The company must follow updates at various tech sites and must use that information as a fresh precaution for protecting the website. It is stated by Goud (2017) that computer users in the office generally provide an easy access route to the website servers and therefore it is very much necessary to use stronger passwords as well as providing the facility of scanning all devices for various types of malware. It is identified that it is also necessary to install proper security applications in order to secure the websit e from various types of Cybersecurity issues. It is opined by Deshpande, Nair, and Shah (2017) that installation of security applications helps in providing free plugin that generally assists in providing an additional level of protection by hiding the website CMS. By doing this, the company can become much more resilient against various types of automated hacking tools that generally scot the web. According to Wolters and Jansen (2017), the company must utilize robots txt file for discouraging the search engines in order to avoid indexing admin pages by various search engines. In addition to this, it is identified that website faces number of concerns due to file uploads. Due to numerous file uploads, bugs generally get enter and assists in allowing the hacker to get access of unlimited data from the website (Kessler, Dardick Holton, 2017). One of the best solution of avoid the problem of hacking is to prevent access to any of the files that are uploaded in the website. The files must be stored outside the root directory and proper script must be utilized in order to access the information whenever necessary. It is stated by Fowler et al. (2017) that utilization of an encrypted SSL protocol for transferring the personal information as well as data between the database as well as website is considered as one of the significant step as it generally helps in preventing the infor mation being read as well as transit without appropriate authenticity. Furthermore, proper backup system must be present so that when the hard disk drive fails then the data will be easily recovered with the help of the backup system. One of the important steps that must be taken in order to secure the website from various types of security issue is to utilize proper web application firewall. It is stated by Majhi (2015) that web application firewall is mainly sets between the servers of the website as well as data connection in order to read each of the data that is passing through it. It is identified once the application of firewall is installed within the system it assists in blocking all the hacking attempts as well as assists in filtering out different types of unwanted traffic like spammers and malicious bots. References Bahr, N. J. (2014). System safety engineering and risk assessment: a practical approach. CRC Press. Ben-Asher, N., Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection.Computers in Human Behavior,48, 51-61. Bonaci, T., Herron, J., Yusuf, T., Yan, J., Kohno, T., Chizeck, H. J. (2015). To make a robot secure: An experimental analysis of cyber security threats against teleoperated surgical robots.arXiv preprint arXiv:1504.04339. Buczak, A. L., Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection.IEEE Communications Surveys Tutorials,18(2), 1153-1176. Carr, M. (2016). Publicprivate partnerships in national cyber?security strategies.International Affairs,92(1), 43-62. Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities.Science and Engineering Ethics,20(3), 701-715. Chemweno, P., Pintelon, L., Van Horenbeek, A., Muchiri, P. (2015). Development of a risk assessment selection methodology for asset maintenance decision making: An analytic network process (ANP) approach. International Journal of Production Economics, 170, 663-676. Curran, J., Berry, K., Sangsuk, K. (2014). Organizational Network Analysis of Organizations that Serve Men Who Have Sex with Men and Transgender People in Chiang Mai, Thailand. Deshpande, V. M., Nair, D. M. K., Shah, D. (2017). Major Web Application Threats for Data Privacy SecurityDetection, Analysis and Mitigation Strategies.under review in International Journal of Scientific Research in Science and Technology PRINT ISSN, 2395-6011. Eugene Jennex, M. (2014). A proposed method for assessing knowledge loss risk with departing personnel. VINE: The journal of information and knowledge management systems, 44(2), 185-209. Fowler, S., Sweetman, C., Ravindran, S., Joiner, K. F., Sitnikova, E. (2017). Developing cyber-security policies that penetrate Australian defence acquisitions.Australian Defence Force Journal, (202), 17. Garca-Herrero, S., Mariscal, M. A., Gutirrez, J. M., Toca-Otero, A. (2013). Bayesian network analysis of safety culture and organizational culture in a nuclear power plant. Safety science, 53, 82-95. Gordon, L. A., Loeb, M. P., Lucyshyn, W., Zhou, L. (2015). Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model.Journal of Information Security,6(1), 24. Goud, N. S. (2017). Analysis of Machine Learning Algorithms to Protect from Phishing in Web Data Mining.International Journal of Computer Applications,159(1). Haimes, Y. Y. (2015). Risk modeling, assessment, and management. John Wiley Sons. Hall, J. L. (2016). Columbia and Challenger: organizational failure at NASA. Space Policy, 37, 127-133. Hong, J., Liu, C. C., Govindarasu, M. (2014). Integrated anomaly detection for cyber security of the substations.IEEE Transactions on Smart Grid,5(4), 1643-1653. Jennex, M. E., Durcikova, A. (2013, January). Assessing knowledge loss risk. In System Sciences (HICSS), 2013 46th Hawaii International Conference on (pp. 3478-3487). IEEE. Kessler, G., Dardick, G., Holton, D. (2017, January). Using Journals to Assess Non-STEM Student Learning in STEM Courses: A Case Study in Cybersecurity Education. InProceedings of the 50th Hawaii International Conference on System Sciences. Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M., Liu, M. (2015, August). Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. InUSENIX Security Symposium(pp. 1009-1024). Majhi, S. K. (2015). Cybersecurity Issues and Challenges: A view.International Journal of Global Research in Computer Science (UGC Approved Journal),6(1), 01-08. Matthews, C. (2017). Real protection for virtual borders.Public Sector,40(3), 9. Wolters, P. T. J., Jansen, C. J. H. (2017). Every business has duties of care in the field of cyber security. Cyber security guide for businesses

Monday, December 2, 2019

Should Marijuana Be Legalized In Society Today, Many People Look For

Should Marijuana Be Legalized? In society today, many people look for a feeling of freedom. Many people go on vacation and spend money. The most common gateway for people is drugs. Our American society is facing a tremendous drug problem. In order to eradicate the drug problem, a public debate is going on to find some solutions to this drug dilemma. It has become a highly controversial issue whether drugs such as marijuana should be legalized or not. Some people advocate this issue and believe that legalization is the only solution left for the nation while others oppose because it will increase the number of drug users and drug related crimes. Marijuana is a drug that is illegal in the United States. This drug as you know is bad and causes severe side effects to your brain and body. Scientists have found that smoking marijuana can cause you to loose your memory. Marijuana has many psychological and physical effects. People usually smoke marijuana in cigarettes or pipes, but it also can be mixed with food and beverages. Short-term effects of marijuana include both psychological and physical reactions. These reactions usually last for three to five hours after a person has smoked marijuana. The psychological reaction, known as a high consists of changes in the users feelings and thoughts. Such changes are caused mainly by THC. The effects of a marijuana high vary from person to person and from one time to another in the same individual. In most cases, the high consists of a dreamy, relaxed state in which users seem more aware of their senses and feel that time is moving slowly. Sometimes, however, marijuana produces a feeling of panic and dread. The different reactions result partly from the concentration of THC in the marijuana. Other factors, such as the setting in which marijuana is used and the users expectations, personality, and mood, also affect a persons reaction to the drug. Long-term effects of marijuana are not completely known, but studies have shown that some people have used marijuana regularly for several months or longer have developed serious long-term problems. Among males, marijuana use can reduce the production of sperm and of the male sex hormone testosterone. Among females, it can cause menstrual irregularity and reduced fertility. Extended use of marijuana also has a long-term psychological effect on many people. These individuals loose interest in everything. However, according to scientific experiments, marijuana is known to be beneficial in medicine. The question is should marijuana be legalized. One of the consequences of legalization will be a tremendous increase in drug users. Right now, drug users have fear of law enforcement agents, but if drugs were to be legalized, they no longer will have fear and will feel that it will be okay to use drugs. Over twenty years ago, estimates of drug use among Americans went as high as 24 million, but we now estimate that the number of Americans ho use illegal drugs is down to some 11 million. In addition, a recent study done by my office shows that Americans are spending less on illegal drugs, not more. In 1993, Americans spent $49 billion on illegal drugs, down from $64 billion in 1988 (Brown 629). This decline is due to more officers on the streets and drug awareness programs. An increase in drug use will result in an increase in drug related crimes if drugs are legalized. Supporters of drug legalization believe that crime and violence would decrease if drug use were to be legal. Statistics tell us that almost half of those arrested for committing a crime test positive for the use of drugs at the time of their arrest. Making drugs more readily available could only propel more individuals into a life of crime and violence (Brown 629). In addition, drug users turn to crime to pay for their habits because drugs stimulate them and therefore act violently. If drug is sold legally, it will become easy for users to buy it around the corner. Thus, it will i ncrease the already existing problem of crime. Church mentions that every year drug lords make over twenty billion dollars from cocaine and marijuana business, and legalizers believe that legalization