SlideShare a Scribd company logo
1 of 23
Baker 3
Student Name
Professor Kelly Jordan
ARTH 102
23 August 2013
Fra Angelico at San Marco
In person, the Annunciation (ca. 1440-45) fresco by Fra
Giovanni da Fiesole, known today as Fra Angelico, looks very
different than in photographs. Seeing the painting at the once
Dominican monastery, allows the observer to look up at the
work at the top of the stairway giving it a lofty presence. After
all, the announcement to Mary that she is to conceive the Son of
God is the prime step to the fulfillment of the prophecy of
Christ. The scene should be exalted. Fra Angelico was
commissioned by Cosimo de’ Medici to paint various works in
the monastery (Davies et al. 320). The sparse setting of the two
characters, Mary and the angel Gabriel, with arches imitating
the convent’s own architecture seems very fitting considering
that it was designed for monks who had divested themselves
from earthly goods. Though the scene is serene, some may
experience discomfort due to the feeling that the figures are too
large for the space. Would Mary and Gabriel bump their heads
on the ceiling if they stood (321)? Color for the majority of the
fresco has a subtle softness about it with the exception of
Gabriel’s rainbow wings. Photographs are not likely to pick up
the metallic glimmer or glitter experienced in face-to-face
examination. The Annunciation may not be Fra Angelico’s
finest work but this and other works in the convent may have
set the stage for change with its austerity and 3-D perspective
(231).
Fra Angelico. Annunciation. Ca. 1440-1445. Fresco on
dormitory level of the Convent of San Marco.
Janson’s Basic History of Western Art. 9th ed. By Penelope
Davies et al.
Boston: Pearson Education, Inc. 321. Print.
Works Cited
Sheldon, Dyan. The Whales’ Song. New York: Penguin Books,
1991. Print.
Pinkowski, Jennifer. “A Different View of Paleo-Indians.”
American Archaeology Summer 2013: 12-18. Print
Zucker, Steven and Beth Harris. “Cimabue, Santa Trinita
Madonna.” Khan Academy. Web. June 2013. <
https://www.khanacademy.org/humanities/art-history/art-
history-1300-1400-proto-renaissance/florence/v/cimabue--
maesta-of-santa-trinita--1280-900-
1290?qa_expand_key=ag5zfmtoYW4tYWNhZGVteXJqCxIIVX
NlckRhdGEiTHVzZXJfaWRfa2V5X2h0dHA6Ly9ub3VzZXJpZC
5raGFuYWNhZGVteS5vcmcvZmI5NjJjNjYxMjg0OTM0MzI0N
ThjZThkM2Q4NjMwMjcMCxIIRmVlZGJhY2sYge4FDA>
Running Head: Security Assessment Repot (SAR)
1
Security Assessment Report (SAR)
3
Security Assessment Report (SAR)
CYB 610: Cyberspace and Cybersecurity Foundations
Dr. Stephanie Carter
University of Maryland University College
OS Overview
Operating System (OS)
User’s Role in OS.
Kernel and OS Applications.
OS Types.
OS Vulnerabilities
Windows Vulnerabilities
Intrusion Methods.
Linux Vulnerabilities
Intrusion Methods.
MAC Vulnerabilities
Mobile Device Vulnerabilities
Risk
Accepting Risk
Transferring Risk
Mitigating Risk
Eliminating Risk
Security Tools
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Vulnerability Assessment Methodology
Microsoft Baseline Security Analyzer (MBSA)
OpenVAS
Assessment Tool Comparative Analysis
Similarities.
Differences.
Recommendations
Conclusion
References
National Institute of Standards and Technology (NIST) (2014).
Assessing security and privacy
controls in federal information systems and organizations.
NIST Special Publication 800-53A Revision 4. Retrieved from
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.8
00-53Ar4.pdf
National Institute of Standards and Technology (NIST) (2010).
Guide for applying the risk
management framework to federal information systems. NIST
Special Publication 800-37 Revision 1. Retrieved from
http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-
rev1-final.pdf
.
Wireshark
Nmap
MBSA
OpenVAS
Project 3 Start Here
Transcript
The security posture of the information systems infrastructure
of an organization should be regularly monitored and assessed
(including software, hardware, firmware components,
governance policies, and implementation of security controls).
The monitoring and assessment of the infrastructure and its
components, policies, and processes should also account for
changes and new procurements that are sure to follow in order
to stay in step with ever-changing information system
technologies.
The data breach at the Office of Personnel Management (OPM)
is one of the largest in US government history. It provides a
series of lessons learned for other organizations in industry and
the public sector. Some critical security practices, such as lack
of diligence to security controls and management of changes to
the information systems infrastructure were cited as
contributors to the massive data breach in the OPM Office of
the Inspector General's (OIG) Final Audit Report, which can be
found in open source searches. Some of the findings in the
report include: weak authentication mechanisms; lack of a plan
for life-cycle management of the information systems; lack of a
configuration management and change management plan; lack
of inventory of systems, servers, databases, and network
devices; lack of mature vulnerability scanning tools; lack of
valid authorizations for many systems, and lack of plans of
action to remedy the findings of previous audits.
The breach ultimately resulted in removal of OPM's top
leadership. The impact of the breach on the livelihoods of
millions of people is ongoing and may never be fully known.
There is a critical need for security programs that can assess
vulnerabilities and provide mitigations.
There are 10 steps that will lead you through this project. You
should complete Project 3 during Weeks 2-5. After beginning
with the workplace scenario, continue to Step 1:
"Organizational Background."
When you submit your project, your work will be evaluated
using the competencies listed below. You can use the list below
to self-check your work before submission.
· 1.1: Organize document or presentation in a manner that
promotes understanding and meets the requirements of the
assignment.
· 1.2: Develop coherent paragraphs or points to be internally
unified and function as part of the whole document or
presentation.
· 1.3: Provide sufficient, correctly cited support that
substantiates the writer’s ideas.
· 1.4: Tailor communications to the audience.
· 1.5: Use sentence structure appropriate to the task, message
and audience.
· 1.6: Follow conventions of Standard Written English.
· 5.2 Enterprise Architecture: Knowledge of architectural
methodologies used in the design and development of
information systems, including the physical structure of a
system's internal operations and interactions with other systems
and knowledge of stan
· 5.6: Technology Awareness: Explore and address
cybersecurity concerns, promote awareness, best practice, and
emerging technology
· 7.3: Risk Management : Knowledge of methods and tools used
for risk management and mitigation of risk
· 8.1: Incident Detection: Demonstrate the abilities to detect,
identify, and resolve host and network intrusion incidents.
· 8.2: Incident Classification: Possess knowledge and skills to
categorize, characterize, and prioritize an incident as well as to
handle relevant digital evidence appropriately.
Step 1: Organizational Background
Perform quick independent research on organizational structure
in your industry sector. Describe the background of your
organization, including the purpose, organizational structure,
the network system description, and a diagram of the
organization. Include LAN, WAN, and systems in diagram
format, the intra-network, and WAN side networks, and the
internet. Identify the boundaries that separate the inner
networks from the outside networks. Take time to click on and
read about the following computing platforms available for
networks, then include a description of how these platforms are
implemented in your organization:
· common computing platforms
· cloud computing
· distributed computing
· centralized computing
· secure programming fundamentals
This information can be fictitious, or modeled from existing
organizations. Be sure to cite references. Step 2: Organizational
Threats
You just provided detailed background information on your
organization. Next, you’ll describe threats to your
organization’s system. Before you get started, select and
explore the contents of the following link: insider threats (also
known as internal threats). As you’re reading, take note of
which insider threats are a risk to your organization.
Now, differentiate between the external threats to the system
and the insider threats. Identify where these threats can occur in
the previously created diagrams. Define threat intelligence, and
explain what kind of threat intelligence is known about the
OPM breach. Relate the OPM threat intelligence to your
organization. How likely is it that a similar attack will occur at
your organization? Step 3: Scanning the Network
Note: You will utilize the tools in Workspace for this step. If
you need help outside the classroom to complete this project,
you must register for CLAB 699 Cyber Computing Lab
Assistance (go to the Discussions List for registration
information). Primary lab assistance is available from a team of
lab assistants. Lab assistants are professionals and are trained to
help you.
Click here to access the Project 3 Workspace Exercise
Instructions. Explore the tutorials and user guides to learn more
about the tools you will use. You will perform this lab in Step
7.
In order to validate the assets and devices on the organization's
network, run scans using security and vulnerability assessment
analysis tools such as MBSA, OpenVAS, Nmap, or NESSUS
depending on the operating systems of your organization's
networks. Live network traffic can also be sampled and scanned
using Wireshark (we do this in step 7) on either the Linux or
Windows systems. Wireshark allows you to inspect all OSI
Layers of traffic information. Click the following link to read
more about these network monitoring tools: Tools to Monitor
and Analyze Network Activities.
Provide the report as part of the SAR.
Review the information captured in these two links message and
protocols and Transmission Control Protocol/Internet Protocol
(TCP/IP), and identify any security communication, message
and protocols, or security data transport methods used such as
(TCP/IP), SSL, and others. Make note of this, as it should be
mentioned in your reports.Step 4: Identifying Security Issues
You have a suite of security tools, techniques, and procedures
that can be used to assess the security posture of your
organization's network in a SAR.
Now it's time to identify the security issues in your
organization's networks. You have already used password
cracking tools to crack weak and vulnerable passwords. Provide
an analysis of the strength of passwords used by the employees
in your organization. Are weak passwords a security issue for
your organization?Step 5: Firewalls and Encryption
Next, examine these resources on firewalls and auditing–
RDBMS related to the use of the Relational Database
Management System (i.e., the database system and data)
RDBMS. Also review these resources related to access control.
Determine the role of firewalls and encryption, and auditing –
RDBMS that could assist in protecting information and
monitoring the confidentiality, integrity, and availability of the
information in the information systems.
Reflect any weaknesses found in the network and information
system diagrams previously created, as well as in the
developing SAR.
Step 6: Threat Identification
You know of the weaknesses in your organization's network and
information system. Now you will determine various known
threats to the organization's network architecture and IT assets.
Get acquainted with the following types of threats and attack
techniques. Which are a risk to your organization?
· IP address spoofing/cache poisoning attacks
· denial of service attacks (DoS)
· packet analysis/sniffing
· session hijacking attacks
· distributed denial of service attacks
In identifying the different threats, complete the following
tasks:
1. Identify the potential hacking actors of these threat attacks
on vulnerabilities in networks and information systems and the
types of remediation and mitigation techniques available in your
industry, and for your organization.
2. Identify the purpose and function of firewalls for
organization network systems, and how they address the threats
and vulnerabilities you have identified.
3. Also discuss the value of using access control, database
transaction and firewall log files.
4. Identify the purpose and function of encryption, as it relates
to files and databases and other information assets on the
organization's networks.
Include these in the SAR. Step 7: Network Analysis
Note: You will utilize the tools in Workspace for this step.
You will now investigate network traffic, and the security of the
network and information system infrastructure overall. Past
network data has been logged and stored, as collected by a
network analyzer tool such as Wireshark.
Select the following link to enter Workspace and complete the
lab activities related to network vulnerabilities.
Perform a network analysis on the Wireshark files provided to
you in Workspace and assess the network posture and any
vulnerability or suspicious information you are able to obtain.
Include this information in the SAR. Further analyze the packet
capture for network performance, behavior, and any suspicious
source and destination addresses on the networks.
In the previously created Wireshark files, identify if any
databases had been accessed. What are the IP addresses
associated with that activity? Include this information in the
SAR. Step 8: Suspicious Activity
Note: You will utilize the tools in Workspace for this step.
Hackers frequently scan the Internet for computers or networks
to exploit. An effective firewall can prevent hackers from
detecting the existence of networks. Hackers continue to scan
ports, but if the hacker finds there is no response from the port
and no connection, the hacker will move on. The firewall can
block unwanted traffic and NMap can be used to self-scan to
test the responsiveness of the organization's network to would-
be hackers.
Select the following link to enter Workspace and conduct the
port scanning. Provide your findings in the SAR deliverable.
Provide analyses of the scans and any recommendation for
remediation, if needed. Identify any suspicious activity and
formulate the steps in an incidence response that could have
been, or should be, enacted. Include the responsible parties that
would provide that incidence response and any follow-up
activity. Include this in the SAR. Please note that some
scanning tools are designed to be undetectable. While running
the scan and observing network activity with Wireshark, attempt
to determine the detection of the scan in progress. If you cannot
identify the scan as it is occurring, indicate this in your
SAR.Step 9: Risk and Remediation
What is the risk and what is the remediation? What is the
security exploitation? You can use the OPM OIG Final Audit
Report findings and recommendations as a possible source for
methods to remediate vulnerabilities.
Read this risk assessment resource to get familiar with the
process, then prepare the risk assessment. Be sure to first list
the threats, then the vulnerabilities, and then pairwise
comparisons for each threat and vulnerability, and determine the
likelihood of that event occurring, and the level of impact it
would have on the organization. Use the OPM OIG Final Audit
Report findings as a possible source for potential mitigations.
Include this in the risk assessment report (RAR).
Step 10: Creating the SAR and RAR
Your research and Workspace exercise have led you to this
moment: creating your SAR and RAR. Consider what you have
learned in the previous steps as you create your reports for
leadership.
Prepare a Security Assessment Report (SAR) with the following
sections:
1. Purpose
2. Organization
3. Scope
4. Methodology
5. Data
6. Results
7. Findings
The final SAR does not have to stay within this framework, and
can be designed to fulfill the goal of the security assessment.
Prepare a Risk Assessment Report (RAR) with information on
the threats, vulnerabilities, likelihood of exploitation of security
weaknesses, impact assessments for exploitation of security
weaknesses, remediation, and cost/benefit analyses of
remediation. Devise a high-level plan of action with interim
milestones (POAM), in a system methodology, to remedy your
findings. Include this high-level plan in the RAR. Summarize
the results you obtained from the vulnerability assessment tools
(i.e., MBSA and OpenVas) in your report.
The deliverables for this project are as follows:
1. Security Assessment Report (SAR): This should be an 8-10
page double-spaced Word document with citations in APA
format. The page count does not include figures, diagrams,
tables, or citations.
2. Risk Assessment Report (RAR): This report should be a 5-6
page double-spaced Word document with citations in APA
format. The page count does not include figures, diagrams,
tables, or citations.
3. In a Word document, share your lab experience and provide
screen prints to demonstrate that you performed the lab.
Submit your deliverables to the assignment folder.
Before you submit your assignment, review the competencies
below, which your instructor will use to evaluate your work. A
good practice would be to use each competency as a self-check
to confirm you have incorporated all of them in your work.
· 1.1: Organize document or presentation in a manner that
promotes understanding and meets the requirements of the
assignment.
· 1.2: Develop coherent paragraphs or points to be internally
unified and function as part of the whole document or
presentation.
· 1.3: Provide sufficient, correctly cited support that
substantiates the writer’s ideas.
· 1.4: Tailor communications to the audience.
· 1.5: Use sentence structure appropriate to the task, message
and audience.
· 1.6: Follow conventions of Standard Written English.
· 5.2 Enterprise Architecture: Knowledge of architectural
methodologies used in the design and development of
information systems, including the physical structure of a
system's internal operations and interactions with other systems
and knowledge of stan
· 5.6: Technology Awareness: Explore and address
cybersecurity concerns, promote awareness, best practice, and
emerging technology
· 7.3: Risk Management : Knowledge of methods and tools used
for risk management and mitigation of risk
· 8.1: Incident Detection: Demonstrate the abilities to detect,
identify, and resolve host and network intrusion incidents.
· 8.2: Incident Classification: Possess knowledge and skills to
categorize, characterize, and prioritize an incident as well as to
handle relevant digital evidence appropriately.
Basically, you are going to have a network diagram that shows
the different levels of the network (backend, intranet, DMZ,
frontend applications, etc) all the way through to the internet.
Show how you are separating the logical portions (firewalls,
switches, VLANs, etc).
Student Name
Professor Kelly Jordan
ARTH 102
17 November 2013
Compare/Contrast Essay;
Starry Night and The Scream
During the phase from the late 19th to early 20th century, the
Post-Impressionism emerged, a unique avant-garde art with
artists’ independent personal aesthetics that sought to progress
beyond the narrow imitative style of empirical Realism and
Impressionism. This style was derived from a group of young
painters such as Paul Gauguin and Georges Seurat in order to
create more monumental and universal art (Davies et al. 528).
Furthermore, right after the rise of the Post-Impressionism, a
strange dreamlike imagery called Symbolism appeared. This
Symbolist otherworldly aesthetic of fantasy, escapism and
psychology that rejected Naturalism and Realism flourished
throughout Europe (Collins). In fact, Vincent Van Gogh, Dutch
painter, was one of the pioneers of Post-Impressionism while
Edvard Munch, Norwegian painter, was also associated with the
international development of Symbolism and recognized as a
precursor of Expressionism (Hood). In this essay, I will
compare and contrast two of their legendary masterpieces, both
of which reflect the artists’ nervousness, but depict different
atmospheres of scenery: The first is Starry Night by Vincent
Van Gogh drawn in 1889, and the second is The Scream by
Edvard Munch drawn in 1893.
Both Gogh and Munch, who are pioneers of Post-Impressionism
and Symbolism, struggled with insanity during their lifetimes,
and consequently painted ominous imageries with swirling
energy, which reflect their unstable mental states. Gogh was
such a deeply troubled and depressed man who inconsistently
yearned for universal harmony and humanitarian craving.
Consequently, majority of his paintings mirrors his intense,
uncontrollable emotions which accentuate personal symbolic
vocabulary in expressionistic ways (Davies et al. 534). This is
well represented in his painting, Starry Night. Compared to
other beautifully depicted objects in the background, there is
the most eye-catching and ambiguous large cypress tree
dominating the foreground. Because this was painted during a
sad period of Gogh’s life, the sinister presence of the massive
dark isolated tree would surely reflect the depressed artist.
Moreover, Munch also explored the expressive representation of
emotions and personal relationships as he extended the
obsessive personal nature of his subjects into universal symbols
of emotional states (Hood). In The Scream, he showed an honest
and ugly glimpse of his inner troubles and feeling of his
anxiety. The main figure, unappealing androgynous creature
clasping hands to a skull-like head, is gasping with expressions
of fear and anxiety. Since he struggled with insanity not only on
a personal level, but also through his family, it is clear that he
put more importance on personal meaning in his painting then
on technical skill or traditional view of beauty (Shabi).
However, Starry Night portrays peaceful and beautiful scenery
with shining stars in a nocturnal sky whereas The Scream
captures a horrifying anxiety of a grotesquely compressed
writhing figure. Also, the colors used in each painting create
totally antithetical atmospheres. Closely examining Vincent Van
Gogh’s Starry Night, this painting has strong religious
overtones since Gogh attempted to draw the utopia with the
peaceful tranquility of unpretentious people living in nature and
harmony, all of which he dreamed (Davies et al. 534). The night
sky is filled with spectacular cosmic events – joyous swirling
clouds, luminescent stars with yellow haloes. Below the sky and
rolling hills of the horizon lies a small town, snugly ensconced
in a valley. Gogh uses exaggerated and thick sweeping
brushstrokes to visualize what he wanted the world to be. In
fact, he conveys the strong feelings of hope through the bright
lights of the stars shining down the dark nocturnal landscape,
other than just insanity and isolation (Shabi). However, in The
Scream, everything is twirling and swirling with dark vivid
colors which create a threatening dismal atmosphere. This scene
is also believed to be prompted by the violent eruption of the
Indonesian volcano Krakatoa in 1883. Witnessing such an
apocalyptic display of colors in Oslo, Munch might have
intended to depict the ugly sounds of living beings undergoing
both physical and emotional sufferings in the modern age
through bright exaggerated colors and simplistic shapes (Shabi).
To conclude, both Gogh and Munch are representative artists of
the late 19th and early 20th century who each developed Post-
Impressionism and Symbolism. Both of the artists suffered from
craziness, but their hysteria eventually made them to create two
of the most reproduced and famous pieces of art in the world
today: Starry Night embodies an inner, subjective expression of
Gogh’s response to nature, and The Scream deals with awe-
inspiring nature and emotional life, presumably applicable to all
modern humans.
Works Cited
Collins, Neil. “Symbolism.” Art Encyclopedia. Visual-arts-
cork.com, 2008. Web. 16 Nov. 2013.
Davies, Penelope J.E., et al. Janson’s Basic History of Western
Art. 9th ed. New Jersey: Pearson, 2009. Print.
Hood, William. “Munch, Edvard.” Grove Art Online. Oxford
Art Online. Oxford University Press. Web. 16 Nov. 2013.
Shabi, K. “Meaning of The Scream (1893) painting by Edvard
Munch: Art Analysis.” Online Literary Journal and Magazine.
Legomenon, 2012. Web. 16 Nov. 2013
Shabi, K. “Starry Night: Meaning of the Vincent Van Gogh
landscape painting.” Online Literary Journal and Magazine.
Legomenon, 2012. Web. 16 Nov. 2013
Compare/Contrast Essay
In order to learn some of the basic skills necessary to research
and develop a formal analysis of a work of art, you will write 2
Compare/Contrast essays> Each essay will compare two works
of art found in the textbook. The selection of artworks for each
paper is up to the student, but must be selected only from
chapters covered in our course (and it is recommended that you
choose works that we have covered in our reading previous to
the due date of the assignment). You may not write about any
work of art that you have already written about in your weekly
Discussion Boards. Please read all 4 pages of this assignment
sheet before beginning your work.
Your formal analysis must be:
- minimum two FULL pages (maximum 2.5 pages)
- double-spaced in a 12-point legible font
- MLA format with a Works Cited page. (See the MLA Style
Guide found under Course
Documents)
- The title of paintings, sculptures, photographs, printmaking
works of art should ALWAYS be in
ITALICS
- Be certain of what medium of art you are referring to. Not all
works of art are “pictures”; do a
little research and refer to it as a painting, sculpture, work
of architecture, photograph, etc.
-Wikipedia is not an acceptable source. This is a user generated
with little to no fact checking
so the information cannot be considered reliable.
The first stage of your analysis is to find information about the
works and their respective artists, and to document that
information. Use the sheet provided to help you gather
important information. Be sure to include information about the
possible artist influences and reference any special subject
matter depicted in the works. After you have had a chance to
research the basic information about your particular works of
art, try to describe it using the elements of art that we have
discussed in class.
The second stage of the assignment will include taking the
information you have about the works (including your analysis
of the elements of art, subject matter and artistic media), and
presenting it in essay form.
The third and last stage of your analysis will be to refine your
writing and to make any changes necessary before the next
class. THIS FINAL DRAFT IS DUE, ATTACHED TO THE
SUBMISSION POINT, BY SUNDAY AT 11:59 P.M. OF THE
SESSION IN WHICH IT IS DUE. SEE COURSE CALENDAR
AND SESSION FOLDERS FOR DUE DATES.
PLEASE REMEMBER THAT:
• All sources should be cited and included in the Works Cited
page. Citations should be in MLA format. Plagiarism will result
in a zero (0) for the assignment and the responsibility for proof
regarding the originality of a paper rests with you, not the
instructor.
• If you are absent on the due date it is your responsibility to
make sure the paper or project is still turned in on time.
• Late papers and projects may be accepted with the following
late penalties:
o If it is turned in within 24 hours of the due date there will be
a 10% reduction.
o After 24 hours and up to 2 DAYS there will be a 50%
reduction.
o After 2 DAYS the paper or project will no longer be accepted
for credit.
Compare/Contrast Essay –
The Formal Analysis
Your analysis will consist of two typewritten pages about the
works that you have chosen. This analysis will be in paragraph
form, with an introductory paragraph, a conclusion paragraph,
and at least three body paragraphs. Your formal analysis must
be two full pages, double-spaced in a 12-point legible font
(Times New Roman preferred), and in MLA format with a
Works Cited page. Each paragraph should be composed of at
least three sentences, with no sentence more than three lines
long.
Some of the things that you may want consider in your analysis
are:
Subject matter – What is depicted in these works? Does the
subject matter include any images from ancient mythology or
Biblical stories? Is the subject matter a reflection of the time
and place in which the artists lived? Were these works done for
a famous patron? Include the name of the donor(s) sponsoring
the work, if these people are known.
Artistic media – How were these works made, and what are they
made from? Are these artists known for any special techniques
in their work? How do these works compare with other works
from this artist or other artists from the same era?
Elements of Art – Describe each one for your works; also
consider the Principles of Design in your analysis.
Be sure to provide smooth transitions between all of your
paragraphs. Examples: “Another way that the artist has shown
the relationship between colors in the work is…. The quick,
broken use of line is mirrored in the texture through…. As we
move along the face, we also see….”
Spelling and grammar are as important to your piece as any
other aspect of the work, if not more so. If your work has
spelling or grammatical errors, then it is clear that you have not
put much effort into the piece and your grade will be affected.
Helpful Websites for Preparing the Compare/Contrast Essay
Writing a Compare/Contrast Art History Essay, from the
Academy of Art University
http://arc.academyart.edu/writing/essay.asp
Writing the Art History Paper, from the Dartmouth University
Writing Program
http://www.dartmouth.edu/~writing/materials/student/humanitie
s/arthistory.shtml
Compare/Contrast Guide, from the ReadWriteThink Site
http://www.readwritethink.org/materials/compcontrast/
Helpful Art Links
Mark Harden's Artchive
-click on the Mona Lisa to access a listing of artists and their
work http://www.artchive.com/
Christopher Witcombe's Art History Resources on the Web
http://witcombe.sbc.edu/
Worldwide Art Resources
http://wwar.com/
Researching a Work of Art: Gathering the Basics
Use this paper as a guide in the analysis of each of your works
of art. You may want to make two copies of this sheet – one for
each work.
Artist:
_____________________________________________________
____________
Year born/year died:
____________________________________________________
Influences?
_____________________________________________________
________
Style associated with this artist:
____________________________________________
Title of work:
_____________________________________________________
______
Background info on work:
________________________________________________
_____________________________________________________
___________________
_____________________________________________________
___________________
Critical Analysis of the Work:
Line:
_____________________________________________________
_____________
_____________________________________________________
___________________
Shape/Form:
_____________________________________________________
_______
_____________________________________________________
___________________
Color:
_____________________________________________________
____________
_____________________________________________________
___________________
Value:
_____________________________________________________
____________
_____________________________________________________
___________________
Texture:
_____________________________________________________
___________
_____________________________________________________
___________________
Space:
_____________________________________________________
____________
_____________________________________________________
___________________

More Related Content

Similar to Baker 3Student NameProfessor Kelly JordanARTH 10223 Augu.docx

Attack Simulation And Threat Modeling -Olu Akindeinde
Attack Simulation And Threat Modeling -Olu AkindeindeAttack Simulation And Threat Modeling -Olu Akindeinde
Attack Simulation And Threat Modeling -Olu AkindeindeBipin Upadhyay
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report Steve Fantauzzo
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
WRIGHT_JEREMY_1000738685-1
WRIGHT_JEREMY_1000738685-1WRIGHT_JEREMY_1000738685-1
WRIGHT_JEREMY_1000738685-1Jeremy Wright
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)OllieShoresna
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportJames Gachie
 
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...FACE
 
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docxUnit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docxmarilucorr
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLexume1
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLexume1
 
Essay about kindnessChoose any three consecutive days. During th.docx
Essay about kindnessChoose any three consecutive days. During th.docxEssay about kindnessChoose any three consecutive days. During th.docx
Essay about kindnessChoose any three consecutive days. During th.docxSALU18
 
3 pages, double spacedAttached is the rubric in which I will gra.docx
3 pages, double spacedAttached is the rubric in which I will gra.docx3 pages, double spacedAttached is the rubric in which I will gra.docx
3 pages, double spacedAttached is the rubric in which I will gra.docxrhetttrevannion
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patchingphanleson
 
Njhs Application Essay. National Junior Honor Society application essay
Njhs Application Essay. National Junior Honor Society application essayNjhs Application Essay. National Junior Honor Society application essay
Njhs Application Essay. National Junior Honor Society application essayDana Burks
 

Similar to Baker 3Student NameProfessor Kelly JordanARTH 10223 Augu.docx (20)

Attack Simulation And Threat Modeling -Olu Akindeinde
Attack Simulation And Threat Modeling -Olu AkindeindeAttack Simulation And Threat Modeling -Olu Akindeinde
Attack Simulation And Threat Modeling -Olu Akindeinde
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
WRIGHT_JEREMY_1000738685-1
WRIGHT_JEREMY_1000738685-1WRIGHT_JEREMY_1000738685-1
WRIGHT_JEREMY_1000738685-1
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
 
Cisco asr-2016-160121231711
Cisco asr-2016-160121231711Cisco asr-2016-160121231711
Cisco asr-2016-160121231711
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
 
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
 
The red book
The red book  The red book
The red book
 
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docxUnit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
Lessonplan-1.docx
Lessonplan-1.docxLessonplan-1.docx
Lessonplan-1.docx
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
Essay about kindnessChoose any three consecutive days. During th.docx
Essay about kindnessChoose any three consecutive days. During th.docxEssay about kindnessChoose any three consecutive days. During th.docx
Essay about kindnessChoose any three consecutive days. During th.docx
 
3 pages, double spacedAttached is the rubric in which I will gra.docx
3 pages, double spacedAttached is the rubric in which I will gra.docx3 pages, double spacedAttached is the rubric in which I will gra.docx
3 pages, double spacedAttached is the rubric in which I will gra.docx
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patching
 
Njhs Application Essay. National Junior Honor Society application essay
Njhs Application Essay. National Junior Honor Society application essayNjhs Application Essay. National Junior Honor Society application essay
Njhs Application Essay. National Junior Honor Society application essay
 

More from rock73

In a two- to three-page paper (excluding the title and reference pag.docx
In a two- to three-page paper (excluding the title and reference pag.docxIn a two- to three-page paper (excluding the title and reference pag.docx
In a two- to three-page paper (excluding the title and reference pag.docxrock73
 
In a substantial paragraph respond to either one of the following qu.docx
In a substantial paragraph respond to either one of the following qu.docxIn a substantial paragraph respond to either one of the following qu.docx
In a substantial paragraph respond to either one of the following qu.docxrock73
 
In a study by Dr. Sandra Levitsky, she considers why the economic,.docx
In a study by Dr. Sandra Levitsky, she considers why the economic,.docxIn a study by Dr. Sandra Levitsky, she considers why the economic,.docx
In a study by Dr. Sandra Levitsky, she considers why the economic,.docxrock73
 
In a response of at least two paragraphs, provide an explanation o.docx
In a response of at least two paragraphs, provide an explanation o.docxIn a response of at least two paragraphs, provide an explanation o.docx
In a response of at least two paragraphs, provide an explanation o.docxrock73
 
in a minimum of 1000 words, describe why baseball is Americas past .docx
in a minimum of 1000 words, describe why baseball is Americas past .docxin a minimum of 1000 words, describe why baseball is Americas past .docx
in a minimum of 1000 words, describe why baseball is Americas past .docxrock73
 
In a minimum 200 word response, describe some ways how the public .docx
In a minimum 200 word response, describe some ways how the public .docxIn a minimum 200 word response, describe some ways how the public .docx
In a minimum 200 word response, describe some ways how the public .docxrock73
 
In a weekly coordination meeting, several senior investigators from .docx
In a weekly coordination meeting, several senior investigators from .docxIn a weekly coordination meeting, several senior investigators from .docx
In a weekly coordination meeting, several senior investigators from .docxrock73
 
In a memo, describe 1) the form and style of art as well as 2) the e.docx
In a memo, describe 1) the form and style of art as well as 2) the e.docxIn a memo, describe 1) the form and style of art as well as 2) the e.docx
In a memo, describe 1) the form and style of art as well as 2) the e.docxrock73
 
In a minimum 200 word response explain the problems that law enforce.docx
In a minimum 200 word response explain the problems that law enforce.docxIn a minimum 200 word response explain the problems that law enforce.docx
In a minimum 200 word response explain the problems that law enforce.docxrock73
 
In a minimum 200 word response explain some of the reasons why, in.docx
In a minimum 200 word response explain some of the reasons why, in.docxIn a minimum 200 word response explain some of the reasons why, in.docx
In a minimum 200 word response explain some of the reasons why, in.docxrock73
 
In a maximum of 750 words, you are required to1. Summarize the ar.docx
In a maximum of 750 words, you are required to1. Summarize the ar.docxIn a maximum of 750 words, you are required to1. Summarize the ar.docx
In a maximum of 750 words, you are required to1. Summarize the ar.docxrock73
 
in a two- to- three page paper (not including the title and referenc.docx
in a two- to- three page paper (not including the title and referenc.docxin a two- to- three page paper (not including the title and referenc.docx
in a two- to- three page paper (not including the title and referenc.docxrock73
 
In a two- to three-page paper (not including the title and reference.docx
In a two- to three-page paper (not including the title and reference.docxIn a two- to three-page paper (not including the title and reference.docx
In a two- to three-page paper (not including the title and reference.docxrock73
 
In a group, take a look at the two student essays included in this f.docx
In a group, take a look at the two student essays included in this f.docxIn a group, take a look at the two student essays included in this f.docx
In a group, take a look at the two student essays included in this f.docxrock73
 
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docxBASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docxrock73
 
Based on Santa Clara University Ethics DialogueEthics .docx
Based on Santa Clara University Ethics DialogueEthics .docxBased on Santa Clara University Ethics DialogueEthics .docx
Based on Santa Clara University Ethics DialogueEthics .docxrock73
 
Barbara Corcoran Learns Her Heart’s True Desires In her.docx
Barbara Corcoran Learns Her Heart’s True Desires  In her.docxBarbara Corcoran Learns Her Heart’s True Desires  In her.docx
Barbara Corcoran Learns Her Heart’s True Desires In her.docxrock73
 
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docxBapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docxrock73
 
Barriers of therapeutic relationshipThe therapeutic relations.docx
Barriers of therapeutic relationshipThe therapeutic relations.docxBarriers of therapeutic relationshipThe therapeutic relations.docx
Barriers of therapeutic relationshipThe therapeutic relations.docxrock73
 
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docxBarada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docxrock73
 

More from rock73 (20)

In a two- to three-page paper (excluding the title and reference pag.docx
In a two- to three-page paper (excluding the title and reference pag.docxIn a two- to three-page paper (excluding the title and reference pag.docx
In a two- to three-page paper (excluding the title and reference pag.docx
 
In a substantial paragraph respond to either one of the following qu.docx
In a substantial paragraph respond to either one of the following qu.docxIn a substantial paragraph respond to either one of the following qu.docx
In a substantial paragraph respond to either one of the following qu.docx
 
In a study by Dr. Sandra Levitsky, she considers why the economic,.docx
In a study by Dr. Sandra Levitsky, she considers why the economic,.docxIn a study by Dr. Sandra Levitsky, she considers why the economic,.docx
In a study by Dr. Sandra Levitsky, she considers why the economic,.docx
 
In a response of at least two paragraphs, provide an explanation o.docx
In a response of at least two paragraphs, provide an explanation o.docxIn a response of at least two paragraphs, provide an explanation o.docx
In a response of at least two paragraphs, provide an explanation o.docx
 
in a minimum of 1000 words, describe why baseball is Americas past .docx
in a minimum of 1000 words, describe why baseball is Americas past .docxin a minimum of 1000 words, describe why baseball is Americas past .docx
in a minimum of 1000 words, describe why baseball is Americas past .docx
 
In a minimum 200 word response, describe some ways how the public .docx
In a minimum 200 word response, describe some ways how the public .docxIn a minimum 200 word response, describe some ways how the public .docx
In a minimum 200 word response, describe some ways how the public .docx
 
In a weekly coordination meeting, several senior investigators from .docx
In a weekly coordination meeting, several senior investigators from .docxIn a weekly coordination meeting, several senior investigators from .docx
In a weekly coordination meeting, several senior investigators from .docx
 
In a memo, describe 1) the form and style of art as well as 2) the e.docx
In a memo, describe 1) the form and style of art as well as 2) the e.docxIn a memo, describe 1) the form and style of art as well as 2) the e.docx
In a memo, describe 1) the form and style of art as well as 2) the e.docx
 
In a minimum 200 word response explain the problems that law enforce.docx
In a minimum 200 word response explain the problems that law enforce.docxIn a minimum 200 word response explain the problems that law enforce.docx
In a minimum 200 word response explain the problems that law enforce.docx
 
In a minimum 200 word response explain some of the reasons why, in.docx
In a minimum 200 word response explain some of the reasons why, in.docxIn a minimum 200 word response explain some of the reasons why, in.docx
In a minimum 200 word response explain some of the reasons why, in.docx
 
In a maximum of 750 words, you are required to1. Summarize the ar.docx
In a maximum of 750 words, you are required to1. Summarize the ar.docxIn a maximum of 750 words, you are required to1. Summarize the ar.docx
In a maximum of 750 words, you are required to1. Summarize the ar.docx
 
in a two- to- three page paper (not including the title and referenc.docx
in a two- to- three page paper (not including the title and referenc.docxin a two- to- three page paper (not including the title and referenc.docx
in a two- to- three page paper (not including the title and referenc.docx
 
In a two- to three-page paper (not including the title and reference.docx
In a two- to three-page paper (not including the title and reference.docxIn a two- to three-page paper (not including the title and reference.docx
In a two- to three-page paper (not including the title and reference.docx
 
In a group, take a look at the two student essays included in this f.docx
In a group, take a look at the two student essays included in this f.docxIn a group, take a look at the two student essays included in this f.docx
In a group, take a look at the two student essays included in this f.docx
 
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docxBASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
 
Based on Santa Clara University Ethics DialogueEthics .docx
Based on Santa Clara University Ethics DialogueEthics .docxBased on Santa Clara University Ethics DialogueEthics .docx
Based on Santa Clara University Ethics DialogueEthics .docx
 
Barbara Corcoran Learns Her Heart’s True Desires In her.docx
Barbara Corcoran Learns Her Heart’s True Desires  In her.docxBarbara Corcoran Learns Her Heart’s True Desires  In her.docx
Barbara Corcoran Learns Her Heart’s True Desires In her.docx
 
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docxBapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
 
Barriers of therapeutic relationshipThe therapeutic relations.docx
Barriers of therapeutic relationshipThe therapeutic relations.docxBarriers of therapeutic relationshipThe therapeutic relations.docx
Barriers of therapeutic relationshipThe therapeutic relations.docx
 
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docxBarada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
 

Recently uploaded

Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfKartik Tiwari
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfElizabeth Walsh
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsPallavi Parmar
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MysoreMuleSoftMeetup
 

Recently uploaded (20)

Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 

Baker 3Student NameProfessor Kelly JordanARTH 10223 Augu.docx

  • 1. Baker 3 Student Name Professor Kelly Jordan ARTH 102 23 August 2013 Fra Angelico at San Marco In person, the Annunciation (ca. 1440-45) fresco by Fra Giovanni da Fiesole, known today as Fra Angelico, looks very different than in photographs. Seeing the painting at the once Dominican monastery, allows the observer to look up at the work at the top of the stairway giving it a lofty presence. After all, the announcement to Mary that she is to conceive the Son of God is the prime step to the fulfillment of the prophecy of Christ. The scene should be exalted. Fra Angelico was commissioned by Cosimo de’ Medici to paint various works in the monastery (Davies et al. 320). The sparse setting of the two characters, Mary and the angel Gabriel, with arches imitating the convent’s own architecture seems very fitting considering that it was designed for monks who had divested themselves from earthly goods. Though the scene is serene, some may experience discomfort due to the feeling that the figures are too large for the space. Would Mary and Gabriel bump their heads on the ceiling if they stood (321)? Color for the majority of the fresco has a subtle softness about it with the exception of Gabriel’s rainbow wings. Photographs are not likely to pick up the metallic glimmer or glitter experienced in face-to-face examination. The Annunciation may not be Fra Angelico’s finest work but this and other works in the convent may have set the stage for change with its austerity and 3-D perspective (231). Fra Angelico. Annunciation. Ca. 1440-1445. Fresco on dormitory level of the Convent of San Marco.
  • 2. Janson’s Basic History of Western Art. 9th ed. By Penelope Davies et al. Boston: Pearson Education, Inc. 321. Print. Works Cited Sheldon, Dyan. The Whales’ Song. New York: Penguin Books, 1991. Print. Pinkowski, Jennifer. “A Different View of Paleo-Indians.” American Archaeology Summer 2013: 12-18. Print Zucker, Steven and Beth Harris. “Cimabue, Santa Trinita Madonna.” Khan Academy. Web. June 2013. < https://www.khanacademy.org/humanities/art-history/art- history-1300-1400-proto-renaissance/florence/v/cimabue-- maesta-of-santa-trinita--1280-900- 1290?qa_expand_key=ag5zfmtoYW4tYWNhZGVteXJqCxIIVX NlckRhdGEiTHVzZXJfaWRfa2V5X2h0dHA6Ly9ub3VzZXJpZC 5raGFuYWNhZGVteS5vcmcvZmI5NjJjNjYxMjg0OTM0MzI0N ThjZThkM2Q4NjMwMjcMCxIIRmVlZGJhY2sYge4FDA> Running Head: Security Assessment Repot (SAR) 1 Security Assessment Report (SAR) 3
  • 3. Security Assessment Report (SAR) CYB 610: Cyberspace and Cybersecurity Foundations Dr. Stephanie Carter University of Maryland University College OS Overview Operating System (OS) User’s Role in OS. Kernel and OS Applications. OS Types. OS Vulnerabilities Windows Vulnerabilities Intrusion Methods. Linux Vulnerabilities Intrusion Methods. MAC Vulnerabilities Mobile Device Vulnerabilities Risk Accepting Risk Transferring Risk Mitigating Risk Eliminating Risk Security Tools Intrusion Detection System (IDS) Intrusion Prevention System (IPS)
  • 4. Vulnerability Assessment Methodology Microsoft Baseline Security Analyzer (MBSA) OpenVAS Assessment Tool Comparative Analysis Similarities. Differences. Recommendations Conclusion
  • 5. References National Institute of Standards and Technology (NIST) (2014). Assessing security and privacy controls in federal information systems and organizations. NIST Special Publication 800-53A Revision 4. Retrieved from http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.8 00-53Ar4.pdf National Institute of Standards and Technology (NIST) (2010). Guide for applying the risk management framework to federal information systems. NIST Special Publication 800-37 Revision 1. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37- rev1-final.pdf . Wireshark Nmap
  • 6. MBSA OpenVAS Project 3 Start Here Transcript The security posture of the information systems infrastructure of an organization should be regularly monitored and assessed (including software, hardware, firmware components, governance policies, and implementation of security controls). The monitoring and assessment of the infrastructure and its components, policies, and processes should also account for changes and new procurements that are sure to follow in order to stay in step with ever-changing information system technologies. The data breach at the Office of Personnel Management (OPM) is one of the largest in US government history. It provides a series of lessons learned for other organizations in industry and
  • 7. the public sector. Some critical security practices, such as lack of diligence to security controls and management of changes to the information systems infrastructure were cited as contributors to the massive data breach in the OPM Office of the Inspector General's (OIG) Final Audit Report, which can be found in open source searches. Some of the findings in the report include: weak authentication mechanisms; lack of a plan for life-cycle management of the information systems; lack of a configuration management and change management plan; lack of inventory of systems, servers, databases, and network devices; lack of mature vulnerability scanning tools; lack of valid authorizations for many systems, and lack of plans of action to remedy the findings of previous audits. The breach ultimately resulted in removal of OPM's top leadership. The impact of the breach on the livelihoods of millions of people is ongoing and may never be fully known. There is a critical need for security programs that can assess vulnerabilities and provide mitigations. There are 10 steps that will lead you through this project. You should complete Project 3 during Weeks 2-5. After beginning with the workplace scenario, continue to Step 1: "Organizational Background." When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission. · 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment. · 1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation. · 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas. · 1.4: Tailor communications to the audience. · 1.5: Use sentence structure appropriate to the task, message and audience.
  • 8. · 1.6: Follow conventions of Standard Written English. · 5.2 Enterprise Architecture: Knowledge of architectural methodologies used in the design and development of information systems, including the physical structure of a system's internal operations and interactions with other systems and knowledge of stan · 5.6: Technology Awareness: Explore and address cybersecurity concerns, promote awareness, best practice, and emerging technology · 7.3: Risk Management : Knowledge of methods and tools used for risk management and mitigation of risk · 8.1: Incident Detection: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents. · 8.2: Incident Classification: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence appropriately. Step 1: Organizational Background Perform quick independent research on organizational structure in your industry sector. Describe the background of your organization, including the purpose, organizational structure, the network system description, and a diagram of the organization. Include LAN, WAN, and systems in diagram format, the intra-network, and WAN side networks, and the internet. Identify the boundaries that separate the inner networks from the outside networks. Take time to click on and read about the following computing platforms available for networks, then include a description of how these platforms are implemented in your organization: · common computing platforms · cloud computing · distributed computing · centralized computing · secure programming fundamentals This information can be fictitious, or modeled from existing organizations. Be sure to cite references. Step 2: Organizational Threats
  • 9. You just provided detailed background information on your organization. Next, you’ll describe threats to your organization’s system. Before you get started, select and explore the contents of the following link: insider threats (also known as internal threats). As you’re reading, take note of which insider threats are a risk to your organization. Now, differentiate between the external threats to the system and the insider threats. Identify where these threats can occur in the previously created diagrams. Define threat intelligence, and explain what kind of threat intelligence is known about the OPM breach. Relate the OPM threat intelligence to your organization. How likely is it that a similar attack will occur at your organization? Step 3: Scanning the Network Note: You will utilize the tools in Workspace for this step. If you need help outside the classroom to complete this project, you must register for CLAB 699 Cyber Computing Lab Assistance (go to the Discussions List for registration information). Primary lab assistance is available from a team of lab assistants. Lab assistants are professionals and are trained to help you. Click here to access the Project 3 Workspace Exercise Instructions. Explore the tutorials and user guides to learn more about the tools you will use. You will perform this lab in Step 7. In order to validate the assets and devices on the organization's network, run scans using security and vulnerability assessment analysis tools such as MBSA, OpenVAS, Nmap, or NESSUS depending on the operating systems of your organization's networks. Live network traffic can also be sampled and scanned using Wireshark (we do this in step 7) on either the Linux or Windows systems. Wireshark allows you to inspect all OSI Layers of traffic information. Click the following link to read more about these network monitoring tools: Tools to Monitor and Analyze Network Activities. Provide the report as part of the SAR. Review the information captured in these two links message and
  • 10. protocols and Transmission Control Protocol/Internet Protocol (TCP/IP), and identify any security communication, message and protocols, or security data transport methods used such as (TCP/IP), SSL, and others. Make note of this, as it should be mentioned in your reports.Step 4: Identifying Security Issues You have a suite of security tools, techniques, and procedures that can be used to assess the security posture of your organization's network in a SAR. Now it's time to identify the security issues in your organization's networks. You have already used password cracking tools to crack weak and vulnerable passwords. Provide an analysis of the strength of passwords used by the employees in your organization. Are weak passwords a security issue for your organization?Step 5: Firewalls and Encryption Next, examine these resources on firewalls and auditing– RDBMS related to the use of the Relational Database Management System (i.e., the database system and data) RDBMS. Also review these resources related to access control. Determine the role of firewalls and encryption, and auditing – RDBMS that could assist in protecting information and monitoring the confidentiality, integrity, and availability of the information in the information systems. Reflect any weaknesses found in the network and information system diagrams previously created, as well as in the developing SAR. Step 6: Threat Identification You know of the weaknesses in your organization's network and information system. Now you will determine various known threats to the organization's network architecture and IT assets. Get acquainted with the following types of threats and attack techniques. Which are a risk to your organization? · IP address spoofing/cache poisoning attacks · denial of service attacks (DoS) · packet analysis/sniffing · session hijacking attacks · distributed denial of service attacks
  • 11. In identifying the different threats, complete the following tasks: 1. Identify the potential hacking actors of these threat attacks on vulnerabilities in networks and information systems and the types of remediation and mitigation techniques available in your industry, and for your organization. 2. Identify the purpose and function of firewalls for organization network systems, and how they address the threats and vulnerabilities you have identified. 3. Also discuss the value of using access control, database transaction and firewall log files. 4. Identify the purpose and function of encryption, as it relates to files and databases and other information assets on the organization's networks. Include these in the SAR. Step 7: Network Analysis Note: You will utilize the tools in Workspace for this step. You will now investigate network traffic, and the security of the network and information system infrastructure overall. Past network data has been logged and stored, as collected by a network analyzer tool such as Wireshark. Select the following link to enter Workspace and complete the lab activities related to network vulnerabilities. Perform a network analysis on the Wireshark files provided to you in Workspace and assess the network posture and any vulnerability or suspicious information you are able to obtain. Include this information in the SAR. Further analyze the packet capture for network performance, behavior, and any suspicious source and destination addresses on the networks. In the previously created Wireshark files, identify if any databases had been accessed. What are the IP addresses associated with that activity? Include this information in the SAR. Step 8: Suspicious Activity Note: You will utilize the tools in Workspace for this step. Hackers frequently scan the Internet for computers or networks to exploit. An effective firewall can prevent hackers from detecting the existence of networks. Hackers continue to scan
  • 12. ports, but if the hacker finds there is no response from the port and no connection, the hacker will move on. The firewall can block unwanted traffic and NMap can be used to self-scan to test the responsiveness of the organization's network to would- be hackers. Select the following link to enter Workspace and conduct the port scanning. Provide your findings in the SAR deliverable. Provide analyses of the scans and any recommendation for remediation, if needed. Identify any suspicious activity and formulate the steps in an incidence response that could have been, or should be, enacted. Include the responsible parties that would provide that incidence response and any follow-up activity. Include this in the SAR. Please note that some scanning tools are designed to be undetectable. While running the scan and observing network activity with Wireshark, attempt to determine the detection of the scan in progress. If you cannot identify the scan as it is occurring, indicate this in your SAR.Step 9: Risk and Remediation What is the risk and what is the remediation? What is the security exploitation? You can use the OPM OIG Final Audit Report findings and recommendations as a possible source for methods to remediate vulnerabilities. Read this risk assessment resource to get familiar with the process, then prepare the risk assessment. Be sure to first list the threats, then the vulnerabilities, and then pairwise comparisons for each threat and vulnerability, and determine the likelihood of that event occurring, and the level of impact it would have on the organization. Use the OPM OIG Final Audit Report findings as a possible source for potential mitigations. Include this in the risk assessment report (RAR). Step 10: Creating the SAR and RAR Your research and Workspace exercise have led you to this moment: creating your SAR and RAR. Consider what you have learned in the previous steps as you create your reports for leadership. Prepare a Security Assessment Report (SAR) with the following
  • 13. sections: 1. Purpose 2. Organization 3. Scope 4. Methodology 5. Data 6. Results 7. Findings The final SAR does not have to stay within this framework, and can be designed to fulfill the goal of the security assessment. Prepare a Risk Assessment Report (RAR) with information on the threats, vulnerabilities, likelihood of exploitation of security weaknesses, impact assessments for exploitation of security weaknesses, remediation, and cost/benefit analyses of remediation. Devise a high-level plan of action with interim milestones (POAM), in a system methodology, to remedy your findings. Include this high-level plan in the RAR. Summarize the results you obtained from the vulnerability assessment tools (i.e., MBSA and OpenVas) in your report. The deliverables for this project are as follows: 1. Security Assessment Report (SAR): This should be an 8-10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. 2. Risk Assessment Report (RAR): This report should be a 5-6 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. 3. In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab. Submit your deliverables to the assignment folder. Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.
  • 14. · 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment. · 1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation. · 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas. · 1.4: Tailor communications to the audience. · 1.5: Use sentence structure appropriate to the task, message and audience. · 1.6: Follow conventions of Standard Written English. · 5.2 Enterprise Architecture: Knowledge of architectural methodologies used in the design and development of information systems, including the physical structure of a system's internal operations and interactions with other systems and knowledge of stan · 5.6: Technology Awareness: Explore and address cybersecurity concerns, promote awareness, best practice, and emerging technology · 7.3: Risk Management : Knowledge of methods and tools used for risk management and mitigation of risk · 8.1: Incident Detection: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents. · 8.2: Incident Classification: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence appropriately. Basically, you are going to have a network diagram that shows the different levels of the network (backend, intranet, DMZ, frontend applications, etc) all the way through to the internet. Show how you are separating the logical portions (firewalls, switches, VLANs, etc). Student Name
  • 15. Professor Kelly Jordan ARTH 102 17 November 2013 Compare/Contrast Essay; Starry Night and The Scream During the phase from the late 19th to early 20th century, the Post-Impressionism emerged, a unique avant-garde art with artists’ independent personal aesthetics that sought to progress beyond the narrow imitative style of empirical Realism and Impressionism. This style was derived from a group of young painters such as Paul Gauguin and Georges Seurat in order to create more monumental and universal art (Davies et al. 528). Furthermore, right after the rise of the Post-Impressionism, a strange dreamlike imagery called Symbolism appeared. This Symbolist otherworldly aesthetic of fantasy, escapism and psychology that rejected Naturalism and Realism flourished throughout Europe (Collins). In fact, Vincent Van Gogh, Dutch painter, was one of the pioneers of Post-Impressionism while Edvard Munch, Norwegian painter, was also associated with the international development of Symbolism and recognized as a precursor of Expressionism (Hood). In this essay, I will compare and contrast two of their legendary masterpieces, both of which reflect the artists’ nervousness, but depict different atmospheres of scenery: The first is Starry Night by Vincent Van Gogh drawn in 1889, and the second is The Scream by Edvard Munch drawn in 1893. Both Gogh and Munch, who are pioneers of Post-Impressionism and Symbolism, struggled with insanity during their lifetimes, and consequently painted ominous imageries with swirling energy, which reflect their unstable mental states. Gogh was such a deeply troubled and depressed man who inconsistently yearned for universal harmony and humanitarian craving. Consequently, majority of his paintings mirrors his intense, uncontrollable emotions which accentuate personal symbolic vocabulary in expressionistic ways (Davies et al. 534). This is
  • 16. well represented in his painting, Starry Night. Compared to other beautifully depicted objects in the background, there is the most eye-catching and ambiguous large cypress tree dominating the foreground. Because this was painted during a sad period of Gogh’s life, the sinister presence of the massive dark isolated tree would surely reflect the depressed artist. Moreover, Munch also explored the expressive representation of emotions and personal relationships as he extended the obsessive personal nature of his subjects into universal symbols of emotional states (Hood). In The Scream, he showed an honest and ugly glimpse of his inner troubles and feeling of his anxiety. The main figure, unappealing androgynous creature clasping hands to a skull-like head, is gasping with expressions of fear and anxiety. Since he struggled with insanity not only on a personal level, but also through his family, it is clear that he put more importance on personal meaning in his painting then on technical skill or traditional view of beauty (Shabi). However, Starry Night portrays peaceful and beautiful scenery with shining stars in a nocturnal sky whereas The Scream captures a horrifying anxiety of a grotesquely compressed writhing figure. Also, the colors used in each painting create totally antithetical atmospheres. Closely examining Vincent Van Gogh’s Starry Night, this painting has strong religious overtones since Gogh attempted to draw the utopia with the peaceful tranquility of unpretentious people living in nature and harmony, all of which he dreamed (Davies et al. 534). The night sky is filled with spectacular cosmic events – joyous swirling clouds, luminescent stars with yellow haloes. Below the sky and rolling hills of the horizon lies a small town, snugly ensconced in a valley. Gogh uses exaggerated and thick sweeping brushstrokes to visualize what he wanted the world to be. In fact, he conveys the strong feelings of hope through the bright lights of the stars shining down the dark nocturnal landscape, other than just insanity and isolation (Shabi). However, in The Scream, everything is twirling and swirling with dark vivid colors which create a threatening dismal atmosphere. This scene
  • 17. is also believed to be prompted by the violent eruption of the Indonesian volcano Krakatoa in 1883. Witnessing such an apocalyptic display of colors in Oslo, Munch might have intended to depict the ugly sounds of living beings undergoing both physical and emotional sufferings in the modern age through bright exaggerated colors and simplistic shapes (Shabi). To conclude, both Gogh and Munch are representative artists of the late 19th and early 20th century who each developed Post- Impressionism and Symbolism. Both of the artists suffered from craziness, but their hysteria eventually made them to create two of the most reproduced and famous pieces of art in the world today: Starry Night embodies an inner, subjective expression of Gogh’s response to nature, and The Scream deals with awe- inspiring nature and emotional life, presumably applicable to all modern humans. Works Cited Collins, Neil. “Symbolism.” Art Encyclopedia. Visual-arts- cork.com, 2008. Web. 16 Nov. 2013. Davies, Penelope J.E., et al. Janson’s Basic History of Western Art. 9th ed. New Jersey: Pearson, 2009. Print. Hood, William. “Munch, Edvard.” Grove Art Online. Oxford Art Online. Oxford University Press. Web. 16 Nov. 2013. Shabi, K. “Meaning of The Scream (1893) painting by Edvard Munch: Art Analysis.” Online Literary Journal and Magazine. Legomenon, 2012. Web. 16 Nov. 2013 Shabi, K. “Starry Night: Meaning of the Vincent Van Gogh landscape painting.” Online Literary Journal and Magazine. Legomenon, 2012. Web. 16 Nov. 2013 Compare/Contrast Essay In order to learn some of the basic skills necessary to research and develop a formal analysis of a work of art, you will write 2 Compare/Contrast essays> Each essay will compare two works
  • 18. of art found in the textbook. The selection of artworks for each paper is up to the student, but must be selected only from chapters covered in our course (and it is recommended that you choose works that we have covered in our reading previous to the due date of the assignment). You may not write about any work of art that you have already written about in your weekly Discussion Boards. Please read all 4 pages of this assignment sheet before beginning your work. Your formal analysis must be: - minimum two FULL pages (maximum 2.5 pages) - double-spaced in a 12-point legible font - MLA format with a Works Cited page. (See the MLA Style Guide found under Course Documents) - The title of paintings, sculptures, photographs, printmaking works of art should ALWAYS be in ITALICS - Be certain of what medium of art you are referring to. Not all works of art are “pictures”; do a little research and refer to it as a painting, sculpture, work of architecture, photograph, etc. -Wikipedia is not an acceptable source. This is a user generated with little to no fact checking so the information cannot be considered reliable. The first stage of your analysis is to find information about the works and their respective artists, and to document that information. Use the sheet provided to help you gather important information. Be sure to include information about the possible artist influences and reference any special subject matter depicted in the works. After you have had a chance to research the basic information about your particular works of art, try to describe it using the elements of art that we have discussed in class.
  • 19. The second stage of the assignment will include taking the information you have about the works (including your analysis of the elements of art, subject matter and artistic media), and presenting it in essay form. The third and last stage of your analysis will be to refine your writing and to make any changes necessary before the next class. THIS FINAL DRAFT IS DUE, ATTACHED TO THE SUBMISSION POINT, BY SUNDAY AT 11:59 P.M. OF THE SESSION IN WHICH IT IS DUE. SEE COURSE CALENDAR AND SESSION FOLDERS FOR DUE DATES. PLEASE REMEMBER THAT: • All sources should be cited and included in the Works Cited page. Citations should be in MLA format. Plagiarism will result in a zero (0) for the assignment and the responsibility for proof regarding the originality of a paper rests with you, not the instructor. • If you are absent on the due date it is your responsibility to make sure the paper or project is still turned in on time. • Late papers and projects may be accepted with the following late penalties: o If it is turned in within 24 hours of the due date there will be a 10% reduction. o After 24 hours and up to 2 DAYS there will be a 50% reduction. o After 2 DAYS the paper or project will no longer be accepted for credit. Compare/Contrast Essay – The Formal Analysis Your analysis will consist of two typewritten pages about the works that you have chosen. This analysis will be in paragraph
  • 20. form, with an introductory paragraph, a conclusion paragraph, and at least three body paragraphs. Your formal analysis must be two full pages, double-spaced in a 12-point legible font (Times New Roman preferred), and in MLA format with a Works Cited page. Each paragraph should be composed of at least three sentences, with no sentence more than three lines long. Some of the things that you may want consider in your analysis are: Subject matter – What is depicted in these works? Does the subject matter include any images from ancient mythology or Biblical stories? Is the subject matter a reflection of the time and place in which the artists lived? Were these works done for a famous patron? Include the name of the donor(s) sponsoring the work, if these people are known. Artistic media – How were these works made, and what are they made from? Are these artists known for any special techniques in their work? How do these works compare with other works from this artist or other artists from the same era? Elements of Art – Describe each one for your works; also consider the Principles of Design in your analysis. Be sure to provide smooth transitions between all of your paragraphs. Examples: “Another way that the artist has shown the relationship between colors in the work is…. The quick, broken use of line is mirrored in the texture through…. As we move along the face, we also see….” Spelling and grammar are as important to your piece as any other aspect of the work, if not more so. If your work has spelling or grammatical errors, then it is clear that you have not put much effort into the piece and your grade will be affected.
  • 21. Helpful Websites for Preparing the Compare/Contrast Essay Writing a Compare/Contrast Art History Essay, from the Academy of Art University http://arc.academyart.edu/writing/essay.asp Writing the Art History Paper, from the Dartmouth University Writing Program http://www.dartmouth.edu/~writing/materials/student/humanitie s/arthistory.shtml Compare/Contrast Guide, from the ReadWriteThink Site http://www.readwritethink.org/materials/compcontrast/ Helpful Art Links Mark Harden's Artchive -click on the Mona Lisa to access a listing of artists and their work http://www.artchive.com/ Christopher Witcombe's Art History Resources on the Web http://witcombe.sbc.edu/ Worldwide Art Resources http://wwar.com/ Researching a Work of Art: Gathering the Basics Use this paper as a guide in the analysis of each of your works of art. You may want to make two copies of this sheet – one for each work. Artist: _____________________________________________________ ____________ Year born/year died: ____________________________________________________ Influences? _____________________________________________________ ________ Style associated with this artist: ____________________________________________ Title of work: _____________________________________________________
  • 22. ______ Background info on work: ________________________________________________ _____________________________________________________ ___________________ _____________________________________________________ ___________________ Critical Analysis of the Work: Line: _____________________________________________________ _____________ _____________________________________________________ ___________________ Shape/Form: _____________________________________________________ _______ _____________________________________________________ ___________________ Color: _____________________________________________________ ____________ _____________________________________________________ ___________________ Value: _____________________________________________________ ____________ _____________________________________________________ ___________________ Texture: _____________________________________________________ ___________ _____________________________________________________ ___________________ Space: _____________________________________________________ ____________