Sunday, January 26, 2020
Information Security Using Cryptography Information Technology Essay
Information Security Using Cryptography Information Technology Essay This paper aims to provide a total review of Information security and cryptography, Information security means protecting information and information systems from unauthorized access (PROXY SERVERS), use, disclosure, disruption, modification, or destruction. Governments, military, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement. SECURITY in this contemporary scenarios has become a more sensible issue either it may be in the REAL WORLD or in the CYBER WORLD. In the real world as opposed to the cyber world an attack is often preceded by information gathering. This is also true in the cyber world. Here the bad guys are referred to as intruders, hackers, hijackers, etc. The intruders would first have a panoramic view of the victims network and then start digging the holes. One of the method for protecting information from hackers is Cryptography Cryptography defined as the science and study of secret writing, concerns the ways in which communications and data can be encoded to prevent disclosure of their contents through message interception, using codes ciphers and other methods, so that only certain people can see the real message. Encryption transforms original information, called plaintext, into transformed information, called cipher text, code text or simply cipher, which usually has the appearance of random, unintelligible data. Encryption provides confidentiality, integrity and authenticity of the information transferred from A to B. INTRODUCTION: The objective of this paper is to provide the reader with an insight into recent developments in the field of cryptography. Cryptography was used as a tool to protect national secrets and strategies. The proliferation of computers and communications systems in the 1960s brought with it a demand from the private sector for means to protect information in digital form and to provide security services. DES, the Data Encryption Standard, is the most well-known cryptographic mechanism. It remains the standard means for securing electronic commerce for many financial institutions around the world. The most striking development in the history of cryptography came in 1976 when Diffie and Hellmann published New Directions in Cryptography. The word cryptography comes from a Greek word which means hidden or secret. It is considered as a miraculous boon that will solve all the computer security problems. It is also referred to as science of secret writing. The objective is to provide security to the appropriate layer among the seven layers of networking infrastructure. This topic can be dealt mathematically also. But our focus is on cyber applications and its vitality. While cryptographers work on inventing clever secret codes, cryptanalysts attempt to break these codes. Cryptology encompasses both the subjects. Symantec is launching Norton 360 in India, an online digital security solutions service that could be paid for on basis of actual usage. The company which has various products to provide information security and retrieval of secured information, is also now into providing a regulatory compliances services. This is a sentence published in the famous newspaper The HINDU .This is an excellent evidence to support the sentence Network security is extremely essential. Two entities A and B wish to work over a secure network .but an intruder interrupts and shares their secrets without their knowledge. Now cryptography has the ability to send information between entities in a way that prevents others from reading it. For instance: If the original message was GIVE TWO MILLION he would have encoded the message with SHIFT BY 3 and so the message would now be JLYHWZRPLOORQ which is obviously in an unreadable format unless you know the method of deciphering. BASIC PRINCIPLES: Key concepts For over twenty years information security has held that confidentiality, integrity and availability (known as the CIA Triad) are the core principles of information security. CIA TRAID Confidentiality Confidentiality is a requisite for maintaining the privacy of the people whose personal information the organization holds. Information that is considered to be confidential in nature must only be accessed, used, copied, or disclosed by persons who have been authorized to access, use, copy, or disclose the information, and then only when there is a genuine need to access, use, copy or disclose the information. A breach of confidentiality occurs when information that is considered to be confidential in nature has been, or may have been, accessed, used, copied, or disclosed to, or by, someone who was not authorized to have access to the information. Integrity In information security, integrity means that data can not be created, changed, or deleted without authorization. A loss of integrity occurs when an employee accidentally, or with malicious intent, deletes important data files. A loss of integrity can occur if a computer virus is released onto the computer. A loss of integrity can occur when an on-line shopper is able to change the price of the product they are purchasing. Availability The concept of availability means that the information, the computing systems used to process the information, and the security controls used to protect the information are all available and functioning correctly when the information is needed. Defense in depth During its life time, information may pass through many different parts of information processing systems. There are many different ways the information and information systems can be threatened. To fully protect the information during its lifetime, each component of the information processing system must have its own protection mechanisms. The building up, layering on and overlapping of security measures is called defense in depth. Additional insight into defense in depth can be gained by thinking of it as forming the layers of an onion, with data at the core of the onion, people as the outer layer of the onion, and network security, host-based security and applications security forming the inner layers of the onion CRYPTOGRAPHY: OVERVIEW: Security Concerns Security Attacks: Interruption Interception Modification Fabrication Methods of defense: Encryption Software Controls Hardware Controls Physical Controls Encryption Cryptography Cryptanalysis Encryption algorithm types: Asymmetric Symmetric Cryptographic Algorithms: Secret key Public key Hash functions History-Caesar cipher A simple substitution cipher Polyalphabetic substitution example Uses of encryption Applications of cryptography Security Concerns: Unauthorized access to resources. Masquerade as authorized user or end system. E-mail forgery. Malicious attacks. Monitoring and capture of network traffic. Exploitation of software bugs Contributing Factors: Increased Internet use: Home broadband, Greater coverage (wired and wireless): More ubiquitous on-line use: Education, Business, Games, Shoppingà ¢Ã¢â ¬Ã ¦ Lack of awareness of threats and risks. Wide-open network policies. Unencrypted network traffic. Complexity of security measurements and administration. Software bugs. Availability of cracking tools. Security Attacks: Interruption: This is an attack on Availability. Interception: This is an attack on confidentiality. Modification: This is an attack on integrity. Fabrication: This is an attack on authenticity. Methods of defense: Encryption: Encryption is key enabling technology to implement computer security. Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called encryption. Information that has been encrypted (rendered unusable) can be transformed back into its original usable form by an authorized user, who possesses the cryptographic key, through the process of decryption. Cryptography is used in information security to protect information from unauthorized or accidental discloser while the information is in transit (either electronically or physically) and while information is in storage Cryptography can introduce security problems when it is not implemented correctly. The length and strength of the encryption key is also an important consideration. A key that is weak or too short will produce weak encryption. The keys used for encryption and decryption must be protected with the same degree of rigor as any other confidential information. What is cryptography? Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Cryptology embraces both cryptography and cryptanalysis. Strong cryptography: There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. Cryptographic strength is measured in the time and resources it would require to recover the plaintext. The result of strong cryptography is cipher text that is very difficult to decipher without possession of the appropriate decoding tool. How does cryptography work? A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and decryption process. A cryptographic algorithm works in combination with a key-a word, number, or phrase-to encrypt the plaintext. The same plaintext encrypts to different cipher text with different keys. The security of encrypted data is entirely dependent on two things: the strength of the cryptographic algorithm and the secrecy of the key. A cryptographic algorithm, plus all possible keys and all the protocols that make it work comprise a cryptosystem. Conventional cryptography: In conventional cryptography, also called secret-key or symmetric-key encryption, one key is used both for encryption and decryption. Encryption and decryption: Data that can be read and understood without any special measures is called plaintext or clear text. The method of disguising plaintext in such a way as to hide its substance is called encryption. Encrypting plaintext results in unreadable gibberish called cipher text. You use encryption to ensure that information is hidden from anyone for whom it is not intended, even those who can see the encrypted data. The process of reverting cipher text to its original plaintext is called decryption. This could be illustrated using the following diagram: 001010010111001 100101001011001 001011100100101 Encryption and decryption Why Cryptography? Concerned with developing algorithms which may be used to: Conceal the context of some message from all except the sender and recipient (privacy or secrecy), and/or Verify the correctness of a message to the recipient (authentication) Forms the basis of many technological solutions to computer and communications security problems Elements of cryptography: In cryptographic terminology, the message is called plaintext or clear text. Encoding the contents of the message in such a way that hides its contents from outsiders is called encryption. A method of encryption and decryption is called a cipher The name cipher originates from the Hebrew word Saphar, meaning to number. The encrypted message is called the cipher text. The process of retrieving the plaintext from the cipher text is called decryption. Encryption and decryption usually make use of a key, and the coding method is such that decryption can be performed only by knowing the proper key. Cryptanalysis: The study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key is called Cryptanalysis. Also called code breaking sometimes. Whereas people who do cryptography are cryptographers and practitioners of cryptanalysis are cryptanalysts. Cryptology Cryptology is the branch of mathematics that studies the mathematical foundations of cryptographic methods. Cryptology comes from the Greek words Krypton, meaning hidden, and Graphen, meaning to write. Cryptology is actually the study of codes and ciphers. Cryptology = both cryptography and cryptanalysis. The Key: All modern algorithms use a key to control encryption and decryption; a message can be decrypted only if the key matches the encryption key. The key used for decryption can be different from the encryption key, but for most algorithms they are the same. Encryption Algorithm Types: There are two classes of key-based algorithms: Symmetric (or secret-key) Asymmetric (or public-key) algorithms The difference is that symmetric algorithms use the same key for encryption and decryption (or the decryption key is easily derived from the encryption key), whereas asymmetric algorithms use a different key for encryption and decryption, and the decryption key cannot be derived from the encryption key. Asymmetric Algorithms: public key Public key cryptography is an asymmetric scheme that uses a pair of keys for encryption: a public key, which encrypts data, and a corresponding private, or secret key for decryption. You publish your public key to the world while keeping your private key secret. Anyone with a copy of your public key can then encrypt information that only you can read. Even people you have never met. It is computationally infeasible to deduce the private key from the public key. Any one who has a public key can encrypt the information but cannot decrypt it. Only the person who has the corresponding private key can decrypt the information. The primary benefit of public key cryptography is that it allows people who have no preexisting security arrangement to exchange messages securely. The need for sender and receiver to share secret keys via some secure channel is eliminated; all communications involve only public keys, and no private key is ever transmitted or shared. Public key algorithm: Symmetric Algorithms Symmetric algorithms can be divided into two categories: (1) stream ciphers and (2) block ciphers. Stream ciphers can encrypt a single bit/byte of plaintext at a time, whereas à ¢Ã¢â ¬Ã ¦ Block ciphers take a number of bits (typically 64 bits in modern ciphers), and encrypt them as a single unit. Secret key and Public key: Hash functions: An improvement on the above scheme is the addition of a one-way hash function in the process. A one-way hash function takes variable-length input-in this case, a message of any length, even thousands or millions of bits-and produces a fixed-length output; say, 160-bits. The hash function ensures that, if the information is changed in any way-even by just one bit-an entirely different output value is produced. As long as a secure hash function is used, there is no way to take someones signature from one document and attach it to another, or to alter a signed message in any way. The slightest change in a signed document will cause the digital signature verification process to fail. Hash Functions History Caesar Cipher: Julius Caesar used a simple alphabet (letter) substitution, offset by 3 letters. Taking the word cipher you would move ahead in the alphabet 3 letters to get FLSKHU. c =3 à ® 3+3 = 6 à ® F i =9 à ® 9+3 = 12 à ® L p =16 à ® 16+3 = 19 à ® S h =8 à ® 8+3 = 11 à ® K e =5 à ® 5+3 = 8 à ® H r =18 à ® 18+3 = 21 à ® U This worked for a while, until more people learned to read and studied his secret cipher. A Simple Substitution Cipher Plaintext: abcdefghijklmnopqrstuvwxyz QIAYMWFUBKPDGJZSOCVLXNETRH Cipher text: Polyalphabetic Substitution Example: Suppose that a polyalphabetic cipher of period 3 is being used, with the three monoalphabetic ciphers M1, M2, M3 as defined below. To encrypt a message, the first 3 letters of the plaintext are enciphered according to ciphers M1, M2, M3 respectively, with the process being repeated for each subsequent block of 3 plaintext letters. a b c d e f g h i j k l m n o p q r s t u v w x y z M1: K D N H P A W X C Z I M Q J B Y E T U G V R F O S L M2: P A G U K H J B Y D S O E M Q N W F Z I T C V L X R M3: J M F Z R N L D O W G I A K E S U C Q V H Y X T P B Plaintext Now is the time for every good man Ciphertext JCQ CZ VXK VCER AQC PCRTX LBQZ QPK Note: The two os in good have been enciphered as different letters. Also the three letters X in the cipher text represent different letters in the plaintext Uses of Encryption: Protecting data from prying eyes is not the only security issue in networking. One can imagine at least four security services: Protecting data from being read by unauthorized persons Verifying the sender of each message (authentication) Preventing unauthorized persons from inserting or deleting messages Making it possible for users to send signed documents electronically Applications of cryptography: Digital signatures have many applications in information security, including authentication, data integrity, and non-repudiation. One of the most significant applications of digital signatures is the certification of public keys in large networks. Certification is a means for a trusted third party (TTP) to bind the identity of a user to a public key, so that at some later time, other entities can authenticate a public key without assistance from a trusted third party There is a lot of information that we dont want other people to see. This can be achieved by cryptography such as Credit card information Private correspondence Social security numbers Personal details Sensitive company information CONCLUSION: Thus Information security measures are needed to protect data from hackers, when it is transmitted between terminal user and computer and between computer and computer and it is also necessary to protect the computer system when there is an attack of virus. The capability of security enabled components still lags behind the claims. Everyone has a different idea of what security is, and what levels of risk are acceptable. Its important to build systems and networks in such a way that the user is not constantly reminded of the security system around him. As and when new security methods are developed, breaking of these methods has increased. So measures have to be taken to fill the loopholes, of which cryptography has and is playing a major role. Cryptography is evergreen and developments in this area are a better option. Basic security challenges in the corporate realm are not yet completely addressed. Nevertheless the cumbersome combats devised against each of the security fissures, yet the cyber MAVERICKS all around the world are succeeding in their ways of perdition. This was quite evident from the E-attacks on BARC server post-September11th cyber attacks on FBI sites where even sophisticated surveillance systems couldnt come to their rescue. A case in point is that, E-ATTACKS are becoming notoriously peerless as compared with the traditional nuke-wars. Consequently, in the quench of thirst for more and more secured systems BIOMETRICS SYSTEM, QUANTUM CRYPTOGRAPHY and many more are innovatively being implemented at a cumulative pace.
Friday, January 17, 2020
Divine command theory
The most basic difference in divine command theory and Immanuel Kantââ¬â¢s moral theory is where the founding principle comes from. Kant argues that as rational creatures with the ability for autonomous thought and action, we can rationally determine the morality of any situation. Divine command theory requires that humans ascertain the will of God to know the difference between right and wrong. In large part the two theories overlap and many who promote divine command theory would argue that Kant simply did not take his explanation far enough.They would argue that had he determined the source of rationality, i.e. the theory that God endowed His creation will freewill and autonomy, then he would see that even the rational choice theory of morality leads back to divine intervention. However, Kant argued that it is impossible using rational arguments to determine if God exists or not. We can, however, argue rationally that humans are rational beings and capable of autonomous action. Therefore, we can argue that autonomous beings have the rational capability of determining a guiding moral principle.Kantââ¬â¢s theory argues that the moral principle which guides life should be determined in a vacuum, absent of the facts. This was his way of arguing against situational ethics. A guiding principle, the basics of morality, should be determined based solely on rational thought and then, once the principle is established, the facts of the situation may be applied to the moral principle and the appropriate action, the answer to the question, â⬠What ought I to do?â⬠,à can be determined. Kantââ¬â¢s theory requires the identification of the categorical imperative that is essential to living a moral life. Morality is determined by the one rationally determined categorical imperative.If then an action seems within the situation as though it will not be compatible with the categorical imperative, then it is morally wrong and there is no justifying it or ch anging things around to make it okay.à For example, if the rationally determined categorical imperative is that murder is wrong, then it is wrong. This is actually a form of the argument many people use in opposing the death penalty. They argue that it cannot be morally justified to kill someone even if it is being done because he killed someone else. Their categorical imperative is that it is irrational to kill another person. This person should also then be a conscientious objector as there is no circumstance under which killing is not morally wrong.Under diving command theory, the order of God that ââ¬Å"thou shalt not killâ⬠would be an equally definitive moral compass, except that the Godââ¬â¢s commands are rarely that direct. One of the biggest criticisms of divine command theory is that it does not indicate how one is to determine what Godââ¬â¢s command is. Many point to the scriptures, but those vary, sometimes greatly among translations and faiths. In centuri es past, many believed in the divine rule of kings as Godââ¬â¢s voice on earth.Therefore, if the King commanded it, it was the word of God as well and since many of these kings sent men into battle in direct opposition to the commandment against killing, the theory of divine command is weakened by the need to identify God or His commands. Even extending into the modern day, the Pope is considered by Catholics to be the voice of God. Is the word of the Pope then the moral guide for the divine command theory? And, the seemingly contradictory messages of the Bible (or other scriptures) become a much greater problem. If we are basing our morality on Godââ¬â¢s command, but His words are unclear, how can morality become clear?Ultimately, the difference between right and wrong in the two theories is potentially huge. Under the divine command theory, anything that God commands can be considered right and anything contrary to Godââ¬â¢s command is wrong.à With Kantââ¬â¢s theory , wrong is defined as being immoral and immorality is irrational. Therefore, any act which is irrational could be considered morally wrong.à Thus the two theories can lead to very different conclusions in the exact same case.Essentially, the difference between the two is that though Kant argued that moral theory should be determined in the absence of facts, it is not hard and fast and allows for some circumstantial ethics. The simple problem with divine command theory is that if it relies on scriptures as Godââ¬â¢s command, it is clear cut with no room for interpretation. Why then would man be capable of rational thought if there were no rationality needed? With divine command theory any creature that can understand simple commands could be taught to obey the law and the creation of a species capable of rational thought would be unnecessary.Likewise, the problem with moral theory is that it does not have clear cut right and wrong. By arguing that the requisite is rational acti on, Kant has made it possible for anything to be rationally justified even perhaps the greatest of moral wrongs including murder or even genocide, if the reasoning were sound. Because of the difference in their application, the two theories can be applied with completely different outcomes.For instance, assume that a man is walking through the woods late in the evening and sees a man attacking a woman whom he knows to be virtuous (just to make it clear she is the victim here). Because the attacker is in such a rage, the only manner that the observer has to prevent him from killing the innocent is to kill the attacker. If we use the divine command theory to determine our course of action, harkening back to the Ten Commandments and ââ¬Å"Thou Shalt Not Killâ⬠, the observer is left with no action that he can take to prevent the death of an innocent woman.Under Kantââ¬â¢s moral theory, it is completely irrational for the observer to allow an innocent to be killed simply because a Divine Being ordained that killing is wrong. Therefore, under the Kant theory, the observer would be wholly justified in killing the attacker. He would be doing the right thing. While clearly not all moral obligations and decisions would ever be this clear cut, this example illustrates where the two theories diverge drastically.It is precisely this type of scenario which leads me to support Kantââ¬â¢s moral theory over the theory of divine command. The theory of divine command relies on the existence of a Supreme Being and the knowledge of His will in personal action. Like Kant, I am not certain that we can determine if God exists, much less what His divine command would be. In a different age, divine command theory as method of determining morality made perfect sense.The king, ruling with diving right, could ordain the divine commands of his nation and the law would therefore be good, but as we have entered the age of reason and science, the theory of divine command falls sho rt. It does not offer any guidance on issues that were not conceived of when the Bible or other scriptures were written. Unless one accepts that the Pope is the direct conduit to Godââ¬â¢s will left on earth, how could on determine what the divine command theory would be on an issue like cloning and therefore what the morality might be.Some religious people might say that cloning is wrong because it attempts to subvert Godââ¬â¢s role in creation, but where in the Scripture does it say ââ¬Ëthou shalt not cloneââ¬â¢?à And, if we accept the argument that God did not intend for man to interfere in the creation process, should we not then find in vitro fertilization and even breeding controls on animals to be contrary to Godââ¬â¢s law?à The simple failing of the divine command theory is that it does not reach into the modern age and allow moral decisions appropriate to the times in which we live.Kantââ¬â¢s theory on the other hand is perfect for the age of reason, probably based on the time frame in which it was being developed.à When the means test of rationality is applied, virtually any decision can be made, often in the style of Kantââ¬â¢s writings about common sense.For example, the rational mind can identify the moral ambiguity of cloning, especially cloning of a rational being. With all consciousness of thought, we can determine that creating that which we do not understand may be wrong. We can also rationally determine that choosing to mate specific animals in hopes of getting a particular set of genetic traits or implanting an embryo into a uterus is not an evil act simply because it involves creation. Even those who believe in the existence of a Supreme Being cannot argue why a God that is ââ¬Å"goodâ⬠and benevolent would object to the use of scientific advances to prolong life and to assist the natural process of procreation.As a further example of this, consider the use of nuclear weapons. Though we can default to th e idea that thou shalt not kill as divine command argument against the use of the weapon, the argument falls short when we realize that man has been commanded to kill hundreds of times throughout history in Godââ¬â¢s name. However, when we consider the discussion of nuclear weapons using Kantââ¬â¢s theory, we can determine that the use of nuclear weapons on any widespread basis is irrational and therefore immoral and therefore wrong.The rational arguments against the weapons are plentiful: they destroy every living creature for miles, they destroy the land making it uninhabitable for years, and the radiation spread cannot be controlled, leading to countless additional injuries, illnesses and deaths. Ultimately, both theories come to the same conclusion, but Kantââ¬â¢s theory provides a better argument supporting the cause.Objectors will say that the problem with Kantââ¬â¢s theory is that humans have the capacity to act irrationally and therefore immorally. That irrationa lity negates the concept of a rational test of morality. This argument is flawed in that it is based on a premise which we call mental illness. In American society at least, when a person has lost the ability to tell the difference between right and wrong, we determine that they are mentally ill. This means even our system of psychology is based loosely on Kantââ¬â¢s premise that we are rational creatures, capable of autonomous action.Furthermore, nothing in theory would ever preclude a person from acting in a manner contrary to their moral theory. It is completely possible for a person to know an action is morally wrong and do it anyway. Sometimes, they will make attempts to justify the actions in their own minds or to others, but even the great majority of criminals can acknowledge that there is a significant difference between right and wrong even while they are choosing the wrong option. This is the reason that the American legal system recognizes mitigating factors, those ex cuses for why it was okay to do the wrong thing. We understand that the rational mind can also try to reason out doing what it desires.Critics of Kantââ¬â¢s theory would also argue that there are no simple clear cut definitions of right and wrong. That is correct. There arenââ¬â¢t. Ethics and morality are situational, no matter what people want to say or believe. It can be as simple as believing that a little white lie is occasionally okay (Do you really want to tell your mother her new dress looks hideous?) or as extreme as a blatant attempt to manipulate society and yourself that murder is justifiable. Regardless, Kant would argue that the theory holds true. Rational beings know that these actions are wrong and society, which is not a rational being, has dictated that we are allowed to act otherwise.
Thursday, January 9, 2020
Pros And Cons Of The Electoral College - 1165 Words
The Electoral College what can I say to be honest, I know nothing about the Electoral College, but I will do my best to explain it to people who might know and to help them know so when they re seventeen they know like I should. So the Google definition of the Electoral College is a body of people representing the states of the US, who cast votes in the election of the President and Vice President. I would have not given that explanation, it would have told you it is a College. So helping you and myself, I will first explain how it works, then how Electors are selected, and the qualifications to be one and their restriction on who the Electors can vote for. Then the Election 1800 and the 12th Amendment. Then I will explain times whereâ⬠¦show more contentâ⬠¦The Certificate declares the winner and shows which elector will show your state at a meeting held in December. The meeting takes place on the first Monday after the second Wednesday in December after the election. Each st ateââ¬â¢s electoral votes are counted in a joint session of Congress on January 6th. Then the members of the House and Senate meet in the House chamber to plan the official tally of electoral votes. The President and the Vice President determine the count and announce the results and the winner. Then the President-Elect takes the oath of office and is sworn in as the new President of the United States. Now this is how the Electors get selected. The first part of the process is controlled by the political parties in each state. Political parties often choose Electors for the slate to recognize their service and dedication to the political party. Slate is a magazine that cover politics and culture in the United States. The parties nominate them by a vote of the party central committee. This process happens in each state for each party. The second part of the process happens on the day of the election. When the state cast their votes for the Presidential candidate of their choice. The winning Presidential candidate slate of potential electors is chosen as the state s electors except for Nebraska and Maine, which have proportionalShow MoreRelatedPros And Cons Of The Electoral College1308 Words à |à 6 Pagesvote by 2.7 Million votes. Donald Trump won because of the Electoral College. The Electoral College gives each state a number of electors that can range from three to fifty-five d epending on the size of the state. The number of electors is decided by combining the number of senators and representatives that state has. To win the presidential election, a candidate would have to get 270 electoral votes, if neither candidate gets 270 electoral votes then the senate and the House of Representatives getRead MorePros And Cons Of The Electoral College738 Words à |à 3 Pagesââ¬Å"Iââ¬â¢m sorry we ever invented the electoral collegeâ⬠Al Gore. Many think the electoral college is a great thing, others? Not so much. If youââ¬â¢re unaware of what the electoral college is, itââ¬â¢s a process, not a place. The founding fathers established it in the Constitution as a compromise between election of the President by a vote in Congress and election of the President by a popular vote of qualified citizens. Thereââ¬â¢s pros and cons of the electoral college, and by the end of this essay you may decideRead MoreElectoral College Pros And Cons1169 Words à | à 5 PagesElectoral College Pros and Cons The 2016 presidential election was an example of the discrepancy between the Electoral College votes and the national popular votes. If the last presidential election had been decided by a national popular vote, then Hillary Clinton would have won the presidency because she had the majority of votes. However, due to the design of the Electoral College, Donald Trump won the election for president in 2016; although, he lost the national popular vote. Just as some peopleRead MorePros And Cons Of Electoral College1791 Words à |à 8 PagesThe Electoral College was established, by the Constitution to elect the President, in order to avoid an unfair balance of powers. The framers chose the complicated system of the Electoral College as the most equitable option. One option to elect the President was to hold a popular vote, however, the framers argued that the people might not have enough wisdom or information. The State Legislators were a promising option, but the framers worried that the Legislators would carry too much bias againstRead MoreThe Pros And Cons Of The Electoral College1290 Words à |à 6 PagesStates Electoral College had been a contradicting system due to the diversification of America throughout the years. The major issue with this system, however, relies on Americaââ¬â¢s own national popular vote that contradicts the Electoral College. Many citizens would rather rely on alternatives such as the national popular vote in order to make presidential elections more bearable. All systems conclude of disadvantages and advantages. Ultimately I as well as many people disagree with the Electoral CollegeRead MoreThe Pros And Cons Of The Electoral College1625 Words à |à 7 PagesIn the United States, the Electoral College determines the victor of a national election. Each state has its own number of electoral votes, which is determined by state population. This system is a ââ¬Å"winner takes allâ⬠system. Which means the candidate with 50 percent o r more of the votes in an individual state gets all of that states electoral votes. The 2016 presidential election will have 538 electoral votes, this means that the election will be decided who is the first candidate to 270 votes. SomeRead MoreThe Pros And Cons Of The Electoral College1167 Words à |à 5 Pagesthe Electoral College system should be amended because it poorly illustrates democracy, is outdated and Electoral College Reform The voting process in America appears straightforward, but it is a very complex, complicated system. The Electoral College is Americaââ¬â¢s current voting system. The Electoral College still serves its intended purpose, but with increasing political activity among Americans it has caused a need to reform this process. Research suggests that the Electoral College systemRead MoreThe Pros And Cons Of The Electoral College780 Words à |à 4 Pagesprevious years. While many argue that the Electoral College defeats the purpose of voting, and diminishes the majorityââ¬â¢s voice, this is certainly not the case. Without the Electoral College, elections would quickly become, and encourage, radical and corrupt ways in their voting systems, that could possibly result in a detrimental nationwide political crisis of voter fraud, and a rise to direct democracy. Majority of those who strive to abolish the Electoral College, are in simple terms; angry becauseRead MoreFinal Exam1541 Words à |à 7 Pages POS/110 Democracy in America Democracy in America is something that has been the topic of the news for many years. It has caused many debates among several different individuals. Democracy, like anything, has its pros and its cons as well. In the following paragraphs will be the tip of the iceberg of some things that are debatable about democracy in America. One topic in particular that has been debated is the Constitution. The Constitution was written in 1787. The ConstitutionRead MoreThe Electoral College Is The Best Interests Of All The People1223 Words à |à 5 PagesThe Electoral College, a hot topic these days, is subject to both criticism and defense. To understand why either side is valid we must look at its values and its weaknesses, its pros and cons. In defense of the Electoral College we can see that it in its roots the Electoral College was devised to dole out the power of selecting our executives geographically, and to give otherwise marginalized portions of the U.S. population a voice. Adversely the Electoral College can be seen as an obstruction to
Wednesday, January 1, 2020
Subscribe to:
Comments (Atom)