Current scenario in Engineering education

Engineering prepare the world to meet theever changing challenges in technology. This program enables future leaders to show the path of better world. It is like training processes which have specific course and pedagogy. Keeping the significance of engineering in view many Engineering colleges were established all over India. There are n numbers of Engineering Colleges in Odisha providing all courses related to engineering. In our society the knowledge and skills of engineering are in high demand in every sector. The engineering college in community ensures that we are having enough numbers of skilled people to fulfill our future demand.

Innovation and development is the sole of this course. Converting enthusiasticyoung mass to professional engineers is the regular work of these education houses. The vast range of exciting career of Engineering attracts many scholars from cities and country sides,currently this field exploring like anything and it gives hues career growth which catches eyes of every individual. Due to heavy opportunity in MNCs it inspires students in ample amount. There is ever growing space to build latest technology. Engineering not confined to a particular field but it is expanding and exploringday by day.

There is big role of schools and colleges to build the foundation of future leaders. The leading companies have high demand of engineers with advance skills in their organization. Considering that need of companiescolleges preparing their students as companyready from every angle. Workshops, labs, practical classes, industrial visit,etc. are now part of study in many colleges. Our Government has been taken many activities in hand to enhance that interest and gill power of students to explore in this field.

The outcome of this planning now in front of us that plenty of students is now interested to serve the society as engineers. That’s the reason there are large number of engineering colleges in every state. The Engineering Colleges in Odisha will change the face of this state with the help of talented students in it.

Bhubaneswar being the capital of Odisha all facilities like transport, construction Education, etc. is easily available comparative to other cities of this state. Many colleges constructed in Bhubaneswar due to availability of better infrastructures. These colleges attract students from remote areas and tribes to make their carrier better. More than 70 Engineering Colleges in Bhubaneswar are equipped with modern technology to introduce students with updated world of engineering. The students of these colleges will explore new definition of Engineering and technology.

Analysis of the global risks and threats to today’s businesses

Introduction
The present business world has many underlying risks and threats that require practical risk management strategies to handle. Businesses have a major role in ensuring that their operations are not under threat from the increasing risks. The hackers, cyber criminals, and other fraudsters are persistently looking for ways of stealing the corporate data for ulterior motives. Corporate organizations have the different genre of information including personal data for their clients and customers, their health care data, financial records, and other sensitive information. As such, the increased data breaches, cyber security risks, and vulnerability make business have determination in developing countermeasures to protect their valuable assets. The business has an objective of minimizing the impact of both the known and the unknown threats. The paper provides an analysis of the risks and threats faced by businesses today and also the effective strategies for handling them.

Common Risks and Threats
A Risk is a likelihood of an attack being successful due to exposure to a given threat. Risk analysis focuses on determining the most important potential security breaches and addressing them. Risk analysis for business helps to establish the appropriate security budgeting to address the issues.

Threats are the source and means of attack. An assessment of the threats helps to determine the best approaches to securing a system from attack. The major focus of threat analysis is to assess the attacker’s resources. It is different to risk assessment in which it focuses on analyzing the potential of an organization’s resources falling prey to attacks.

The span of the period between 2013 and 2014 saw a rise in data breaches targeting global companies. IT security is no longer a mere concern but a global news story. There are numerous data leaks, corporate espionage, and cyber crimes that negatively impact the face of IT security in the organizations. The cyber risks are evolving rapidly and in many areas. The targets of the cyber-criminals continue to increase with the latest being governments and big companies. The main focus of targeting the governments is to undermine the national security and infrastructure. Many businesses have challenges in maintaining their reputation online following the many data breaches. The impact of risks and threats facing organizations and governments lies in the economy in which there is a likelihood of digital disintegration. Cyberspace has immense potential if well utilized, but the strengthening of the attacks will undermine the underlying potential.

Most of the risks and threats target the security of the information stored in the databases. It calls for new regulatory requirements in changing how to handle the security functions. The confidentiality, integrity, and reliability of data are an important aspect that every business should uphold. The exposure of data and sensitive information to fraudsters renders the organization vulnerable to data breaches. It is necessary to comply with the emerging regulations on data privacy and other controls that ensure that organizations maintain data security. Threats are difficult to control, but businesses can minimize their impact by working on particular effective strategies. On the contrary, businesses can manage the risks to reduce their vulnerability and the overall impact (Viney, 2011).

The common high-risk security threats to businesses are network norms that attack through phishing emails and some downloads. The business can be liable to data sniffing from its network if it’s open. The internet hackers and other cyber criminals attack the networks that lack proper security measures (Jahankhani, Fernando & Nkhoma, 2009).

Businesses face increased risks to data security due to the proliferation of their networks by widespread use of mobile devices in handling business operations. At present, many organizations have the BYOD policy. The policy allows the staff to carry their devices to work and access the company data on them. As such, the security of the data remains at stake since the company cannot control the device. Many fraudsters and hackers understand the potential that the devices have in cyberspace and thus device dubious ways of attacking them. The risks and threats that face businesses require practical risk management strategies to handle (Axelrod, Bayuk & Schutzer, 2009).

Strategies to deal with the evolving business threats
The presence of disgruntled employees in the IT department is likely to cause internal attacks to the data and the system. Most of the rogue employees can have access to the network, data centers, and the administrator accounts and cause serious damage. The mitigation to the issue is identifying all the liable accounts and credentials that are under threat and terminate them. Internal attacks from employees are the major threats that affect organizations since the employees have access to sensitive details about the organization. Thus, the termination of their privileged credentials of the internal staff helps to prevent attacks (Cole & Ring, 2006).

Data thefts is a high vulnerability issue when employees use their mobile devices to share data, access the company information, and fail to change their passwords. Many companies that allow BYOD face the risk of exposure on the corporate network if a malware application or software installs on the devices. The solution to the problem has policies that address the BYOD issue. The BYOD policy allows the employees to acquire knowledge on the proper management of their devices and also the company expectations (Partow-Navid & Slusky, 2008). The policy also allows monitoring of the emails and documents downloaded to the company through the devices. The monitoring measures in place provide the companies with visibility in mobile related data loss risks (Axelrod, Bayuk & Schutzer, 2009).

The other strategy is patching applications. Most of the applications used on the core operating system have unique patching methods and requirements. It is essential to have them on a single process. Many cyber intrusions occur through applications. However, many organizations do not patch the common applications in use rendering them liable to attack (Viney, 2011). The scenario increases the attack surface of the system and other systems sharing the network due to un-patching the applications. The malicious network attackers often take advantage of the vulnerabilities in the applications for them to gain easy access to the network. The organizations should use updated software that has increased protection against the malicious attacks.

Another strategy involves securing a network and accounts with strong and encrypted passwords that are difficult to encode by an attacker. The method ensures that any malicious activities on a network do not lead to a successful attack. The passwords should also have a review and update within scheduled periods. Encryption is a safe way of minimizing the effects of a risk and threat since the hackers do not have access to the vital data and information.

Conclusion
Businesses are under threat and also face many risks in conducting their operations effectively. They face threats in data security that renders them vulnerable to attack by fraudsters, hackers, and cybercriminals. The hackers and cyber criminals devise different methods of ensuring that they have access to the vital corporate information. However, a business with proper strategies in handling the risks and threats reduces the underlying negative impacts. The effective and practical strategies discussed include encryption, use of patch management on the applications, and avoiding internal attacks by rogue employees

Literature review and proposal as PL/SQL Developer

Literature review
It is vital to choose the right programming language that helps the programmer carry out transaction processing and the one that supports procedural constructs, and robust error handling (Wichmann, 1995). That programming language also needs to incorporated variable declarations and general high performance. The PL/SQL programming language has database basis, and it is also an application development language that supplements the SQL programming language with standard programming feature. It is the superset of SQL programming language. The features that this programming language adds to SQL include block structure, flow control statements and loops, customized error handling, structured data and variables and constant types (Feuerstein & Pribyl, 2014). It makes it possible for the one programming to store the compiled code into the database directly. With that possibility, the any number of users and applications can share the same functions and procedures. As a matter of fact, once the loading of the code takes place onto the memory, multiple users can use the same code simultaneously.

The users can also define triggers to enable the database execute them automatically in response to the specified events (Sharma et al., 2011). Pl/SQL is an exclusive product from Oracle Corporation and not an industry standard. The language helps in bringing efficiency to programming because if the user compiles it prior to runtime, there is high efficiency ensured in that code or program. It groups its statements into some units that we can refer to as block just like any other programming languages groups the statements into some units (Gupta, 2012). Those blocks can be anonymous or named as subprograms of procedures. There is the usage of a function in an expression, and it returns a valued top the expression before the invoking of a standalone statement. It then passes the value to the calling program using parameters only. It is also possible to nest those subprograms into one another and then into larger units known as packages. The daily responsibilities of a PL/SQL programming entail writing programs, queries, and functions so as to manipulate the structure and data of a database.

There is also a responsibility of querying databases and then generating reports that is vital to the decision-making process of an organizations or any business (Parker & Ottawa, 2006). PL/SQL ensures that those tasks take place in the required manner so as to deliver a high-quality code that lead to the delivery of high-quality reports or queries. Pl/SQL development takes place on the Oracle database, and the developers may also work with MySQL and the Microsoft SQL Servers, or any other database system (Hellstrom, 2015). It requires the SQL developer to have a thorough knowledge of SQL programming analytics ability and a strong logic. The software development arena requires that the developers report to the managers and the software development team leads. Because of that, it is a requirement that a PL/SQL developer handles the successful delivery of the development projects for software as well as support the production development. Those are the responsibilities that I will ensure that they take place while working in the i5 Tech Company as highlighted in my introduction and methodology.

The PL/SQL developer requires having active participation in software design and solutions while ensuring that he/she develops the company systems forward to deliver a high quality managed solution. PL/SQL language offers to the developer elements that are imperative to the software or application development task (Gupta, 2012). One of the elements includes organized code management packages that serve the purpose of making the locating of the code easy as well as its understanding and reuse. There is also the easy of top-down application design. That is because a separation between the public interface and the implementation if a crucial feature required for any package. That ensures that the programmer can code and compile a package with the absence of the body. When there is such vital separation of the public interface and the body, there is the possibility of developing an application in a modular fashion and not face bottlenecks. The bottlenecks arise due to incomplete implementation details in the code or application.

Both the bottom-up and the top-down development approaches are strategies that are useful for the processing of information and knowledge ordering (Dell Corporation, 2006). These tasks are vital in many areas such as software, scientific theories, humanistic, management, and organization. The top-down approach to PL/SQL development also known as decomposition, it is vital in breaking a system down to gain more understanding of the same regarding its compositional structure. In this approach, there is formulating of a system, making specifications although there is no detailing of any first-level subsystems. There is then the refining of the system into greater detail, and sometimes this may take place in many additional levels until the developers reduce the system into its base elements (Wile, 2002). It mean than the PL/SQL language helps in the reduction of the complexity of the task of development as in the case of bottom-up approach. The latter approach is where there is the piercing together of systems to form a more complex system meant for making g the original system be a subsystem of the emergent one.

The other powerful element of the PL/SQL is what the programmers call painless implementation changes because the language helps to eliminate the havoc or making changes to the subprograms. In many of the programming languages, making changes to a subprogram creates havoc with the other programs that might be referring it. With PL/SQL, there are no changes required in the dependent objects if only the there is the changing of the code in the package body (Tutorialspoint.com, n.d). It is also possible to ensure security and maintainability in the code when using this application language. It makes it possible to specify which of the items, types and subprograms that is private or public. Also, the ability to have in a package some private portions makes it impossible to access them publically. That is essential as it helps in protecting the integrity of that package as well as simplifying the maintenance.

PL/SQL also incorporates session-wide persistence of the public variables. That means the package public cursors, as well as the variables only, persist as long as the session is not over. They let the programmer to maintain the data across many transactions without the need for storing it in the database. They help in the storage of the values that have session-wide relevance like the debug/trace options. Better performance in PL/SQL language is possible through the loading of the package into the memory after the invocation of the packaged subprogram for the first time (Urman et al., 2004). There no disk I/O operations required for later calls to the subprograms that are in the package. All this translates to better performance than the SQL itself and other application programming languages.

Proposal
In the i5 Tech Company where I will be carrying out my research as an intern, I will have involvement in many tasks as highlighted in my introduction and methodology. Those tasks will relate to the PL/SQL development as I will be working as a PL/SQL developer in this company. I will have involvement in vital projects development with this language in question and in all those tasks I will be interacting with various teams of experts so as to understand what is in the requirement of me. Other tasks I will be in the requirement to carry them out alone while others I will be working with other teams or groups of professional for the purpose of quality and accountability. All those tasks have a division into five iterations including orientation, training, gathering and understanding the user requirements, coding, and testing and implementation. Those iterations have an explanation in the following paragraphs.

Orientation
The orientation session is where I will have the explanation of how the organization works, its structure, models of operation, management, working procedures and guidelines among others. I will have to know the limits of my duties and conduct so as not to have trouble in failing to adhere to the company rules and regulations regarding conduct and internship responsibilities. There will also be the issuance of the intern card that I will be using to identify myself as a legally taking my internship in the company.

Training
In the training phase where will be the task of helping me to know the areas that I will be handling during my internship in the company wherein, I will be taking my internship. There will be through training on the PL/ASQL coding principles and the rules that I ought to follow to ensure that I am in line with the international standards of coding in this language. There will be an assessment at the end of the training to test my understanding of the basics in taught during the training session as this will determine the project that company will assign to me.

Gathering and understanding user requirement
During the session of gathering and understanding the user requirements, I will have involvement in meeting and interacting with various end users of the application to have development. That will be helpful to me as I will understand the requirements clearly so as to code in light of those requirements. The development team will have to verify the data after analysis before giving me a go-ahead with the development. The company will assign to me one of the PL/SQL developers and one of the project development team members to help with the consultation services.

Coding
In the coding phase, I will begin the process of developing the required application that is the actual project development. It is the phase where I will have much work. It will require me to have regular contact with my supervisors so that I will carry it out in the required way and deliver unit within the specified time and quality.

Testing and implementation
In the testing and implementation phase, there will be the testing of the developed application for errors. The task will have performance in collaboration with the project development team and after the testing there will be the implementation of the developed application. It will be the last iteration in the company.