Baker 3
Student Name
Professor Kelly Jordan
ARTH 102
23 August 2013
Fra Angelico at San Marco
In person, the Annunciation (ca. 1440-45) fresco by Fra Giovanni da Fiesole, known today as Fra Angelico, looks very different than in photographs. Seeing the painting at the once Dominican monastery, allows the observer to look up at the work at the top of the stairway giving it a lofty presence. After all, the announcement to Mary that she is to conceive the Son of God is the prime step to the fulfillment of the prophecy of Christ. The scene should be exalted. Fra Angelico was commissioned by Cosimo de’ Medici to paint various works in the monastery (Davies et al. 320). The sparse setting of the two characters, Mary and the angel Gabriel, with arches imitating the convent’s own architecture seems very fitting considering that it was designed for monks who had divested themselves from earthly goods. Though the scene is serene, some may experience discomfort due to the feeling that the figures are too large for the space. Would Mary and Gabriel bump their heads on the ceiling if they stood (321)? Color for the majority of the fresco has a subtle softness about it with the exception of Gabriel’s rainbow wings. Photographs are not likely to pick up the metallic glimmer or glitter experienced in face-to-face examination. The Annunciation may not be Fra Angelico’s finest work but this and other works in the convent may have set the stage for change with its austerity and 3-D perspective (231).
Fra Angelico. Annunciation. Ca. 1440-1445. Fresco on dormitory level of the Convent of San Marco.
Janson’s Basic History of Western Art. 9th ed. By Penelope Davies et al.
Boston: Pearson Education, Inc. 321. Print.
Works Cited
Sheldon, Dyan. The Whales’ Song. New York: Penguin Books, 1991. Print.
Pinkowski, Jennifer. “A Different View of Paleo-Indians.” American Archaeology Summer 2013: 12-18. Print
Zucker, Steven and Beth Harris. “Cimabue, Santa Trinita Madonna.” Khan Academy. Web. June 2013. < https://www.khanacademy.org/humanities/art-history/art-history-1300-1400-proto-renaissance/florence/v/cimabue--maesta-of-santa-trinita--1280-900-1290?qa_expand_key=ag5zfmtoYW4tYWNhZGVteXJqCxIIVXNlckRhdGEiTHVzZXJfaWRfa2V5X2h0dHA6Ly9ub3VzZXJpZC5raGFuYWNhZGVteS5vcmcvZmI5NjJjNjYxMjg0OTM0MzI0NThjZThkM2Q4NjMwMjcMCxIIRmVlZGJhY2sYge4FDA>
Running Head: Security Assessment Repot (SAR) 1
Security Assessment Report (SAR) 3
Security Assessment Report (SAR)
CYB 610: Cyberspace and Cybersecurity Foundations
Dr. Stephanie Carter
University of Maryland University College
OS Overview
Operating System (OS)
User’s Role in OS.
Kernel and OS Applications.
OS Types.
OS Vulnerabilities
Windows Vulnerabilities
Intrusion Methods.
Linux Vulnerabilities
Intrusion Methods.
MAC Vulnerabilities
Mobile ...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
Baker 3Student NameProfessor Kelly JordanARTH 10223 Augu.docx
1. Baker 3
Student Name
Professor Kelly Jordan
ARTH 102
23 August 2013
Fra Angelico at San Marco
In person, the Annunciation (ca. 1440-45) fresco by Fra
Giovanni da Fiesole, known today as Fra Angelico, looks very
different than in photographs. Seeing the painting at the once
Dominican monastery, allows the observer to look up at the
work at the top of the stairway giving it a lofty presence. After
all, the announcement to Mary that she is to conceive the Son of
God is the prime step to the fulfillment of the prophecy of
Christ. The scene should be exalted. Fra Angelico was
commissioned by Cosimo de’ Medici to paint various works in
the monastery (Davies et al. 320). The sparse setting of the two
characters, Mary and the angel Gabriel, with arches imitating
the convent’s own architecture seems very fitting considering
that it was designed for monks who had divested themselves
from earthly goods. Though the scene is serene, some may
experience discomfort due to the feeling that the figures are too
large for the space. Would Mary and Gabriel bump their heads
on the ceiling if they stood (321)? Color for the majority of the
fresco has a subtle softness about it with the exception of
Gabriel’s rainbow wings. Photographs are not likely to pick up
the metallic glimmer or glitter experienced in face-to-face
examination. The Annunciation may not be Fra Angelico’s
finest work but this and other works in the convent may have
set the stage for change with its austerity and 3-D perspective
(231).
Fra Angelico. Annunciation. Ca. 1440-1445. Fresco on
dormitory level of the Convent of San Marco.
2. Janson’s Basic History of Western Art. 9th ed. By Penelope
Davies et al.
Boston: Pearson Education, Inc. 321. Print.
Works Cited
Sheldon, Dyan. The Whales’ Song. New York: Penguin Books,
1991. Print.
Pinkowski, Jennifer. “A Different View of Paleo-Indians.”
American Archaeology Summer 2013: 12-18. Print
Zucker, Steven and Beth Harris. “Cimabue, Santa Trinita
Madonna.” Khan Academy. Web. June 2013. <
https://www.khanacademy.org/humanities/art-history/art-
history-1300-1400-proto-renaissance/florence/v/cimabue--
maesta-of-santa-trinita--1280-900-
1290?qa_expand_key=ag5zfmtoYW4tYWNhZGVteXJqCxIIVX
NlckRhdGEiTHVzZXJfaWRfa2V5X2h0dHA6Ly9ub3VzZXJpZC
5raGFuYWNhZGVteS5vcmcvZmI5NjJjNjYxMjg0OTM0MzI0N
ThjZThkM2Q4NjMwMjcMCxIIRmVlZGJhY2sYge4FDA>
Running Head: Security Assessment Repot (SAR)
1
Security Assessment Report (SAR)
3
3. Security Assessment Report (SAR)
CYB 610: Cyberspace and Cybersecurity Foundations
Dr. Stephanie Carter
University of Maryland University College
OS Overview
Operating System (OS)
User’s Role in OS.
Kernel and OS Applications.
OS Types.
OS Vulnerabilities
Windows Vulnerabilities
Intrusion Methods.
Linux Vulnerabilities
Intrusion Methods.
MAC Vulnerabilities
Mobile Device Vulnerabilities
Risk
Accepting Risk
Transferring Risk
Mitigating Risk
Eliminating Risk
Security Tools
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
5. References
National Institute of Standards and Technology (NIST) (2014).
Assessing security and privacy
controls in federal information systems and organizations.
NIST Special Publication 800-53A Revision 4. Retrieved from
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.8
00-53Ar4.pdf
National Institute of Standards and Technology (NIST) (2010).
Guide for applying the risk
management framework to federal information systems. NIST
Special Publication 800-37 Revision 1. Retrieved from
http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-
rev1-final.pdf
.
Wireshark
Nmap
6. MBSA
OpenVAS
Project 3 Start Here
Transcript
The security posture of the information systems infrastructure
of an organization should be regularly monitored and assessed
(including software, hardware, firmware components,
governance policies, and implementation of security controls).
The monitoring and assessment of the infrastructure and its
components, policies, and processes should also account for
changes and new procurements that are sure to follow in order
to stay in step with ever-changing information system
technologies.
The data breach at the Office of Personnel Management (OPM)
is one of the largest in US government history. It provides a
series of lessons learned for other organizations in industry and
7. the public sector. Some critical security practices, such as lack
of diligence to security controls and management of changes to
the information systems infrastructure were cited as
contributors to the massive data breach in the OPM Office of
the Inspector General's (OIG) Final Audit Report, which can be
found in open source searches. Some of the findings in the
report include: weak authentication mechanisms; lack of a plan
for life-cycle management of the information systems; lack of a
configuration management and change management plan; lack
of inventory of systems, servers, databases, and network
devices; lack of mature vulnerability scanning tools; lack of
valid authorizations for many systems, and lack of plans of
action to remedy the findings of previous audits.
The breach ultimately resulted in removal of OPM's top
leadership. The impact of the breach on the livelihoods of
millions of people is ongoing and may never be fully known.
There is a critical need for security programs that can assess
vulnerabilities and provide mitigations.
There are 10 steps that will lead you through this project. You
should complete Project 3 during Weeks 2-5. After beginning
with the workplace scenario, continue to Step 1:
"Organizational Background."
When you submit your project, your work will be evaluated
using the competencies listed below. You can use the list below
to self-check your work before submission.
· 1.1: Organize document or presentation in a manner that
promotes understanding and meets the requirements of the
assignment.
· 1.2: Develop coherent paragraphs or points to be internally
unified and function as part of the whole document or
presentation.
· 1.3: Provide sufficient, correctly cited support that
substantiates the writer’s ideas.
· 1.4: Tailor communications to the audience.
· 1.5: Use sentence structure appropriate to the task, message
and audience.
8. · 1.6: Follow conventions of Standard Written English.
· 5.2 Enterprise Architecture: Knowledge of architectural
methodologies used in the design and development of
information systems, including the physical structure of a
system's internal operations and interactions with other systems
and knowledge of stan
· 5.6: Technology Awareness: Explore and address
cybersecurity concerns, promote awareness, best practice, and
emerging technology
· 7.3: Risk Management : Knowledge of methods and tools used
for risk management and mitigation of risk
· 8.1: Incident Detection: Demonstrate the abilities to detect,
identify, and resolve host and network intrusion incidents.
· 8.2: Incident Classification: Possess knowledge and skills to
categorize, characterize, and prioritize an incident as well as to
handle relevant digital evidence appropriately.
Step 1: Organizational Background
Perform quick independent research on organizational structure
in your industry sector. Describe the background of your
organization, including the purpose, organizational structure,
the network system description, and a diagram of the
organization. Include LAN, WAN, and systems in diagram
format, the intra-network, and WAN side networks, and the
internet. Identify the boundaries that separate the inner
networks from the outside networks. Take time to click on and
read about the following computing platforms available for
networks, then include a description of how these platforms are
implemented in your organization:
· common computing platforms
· cloud computing
· distributed computing
· centralized computing
· secure programming fundamentals
This information can be fictitious, or modeled from existing
organizations. Be sure to cite references. Step 2: Organizational
Threats
9. You just provided detailed background information on your
organization. Next, you’ll describe threats to your
organization’s system. Before you get started, select and
explore the contents of the following link: insider threats (also
known as internal threats). As you’re reading, take note of
which insider threats are a risk to your organization.
Now, differentiate between the external threats to the system
and the insider threats. Identify where these threats can occur in
the previously created diagrams. Define threat intelligence, and
explain what kind of threat intelligence is known about the
OPM breach. Relate the OPM threat intelligence to your
organization. How likely is it that a similar attack will occur at
your organization? Step 3: Scanning the Network
Note: You will utilize the tools in Workspace for this step. If
you need help outside the classroom to complete this project,
you must register for CLAB 699 Cyber Computing Lab
Assistance (go to the Discussions List for registration
information). Primary lab assistance is available from a team of
lab assistants. Lab assistants are professionals and are trained to
help you.
Click here to access the Project 3 Workspace Exercise
Instructions. Explore the tutorials and user guides to learn more
about the tools you will use. You will perform this lab in Step
7.
In order to validate the assets and devices on the organization's
network, run scans using security and vulnerability assessment
analysis tools such as MBSA, OpenVAS, Nmap, or NESSUS
depending on the operating systems of your organization's
networks. Live network traffic can also be sampled and scanned
using Wireshark (we do this in step 7) on either the Linux or
Windows systems. Wireshark allows you to inspect all OSI
Layers of traffic information. Click the following link to read
more about these network monitoring tools: Tools to Monitor
and Analyze Network Activities.
Provide the report as part of the SAR.
Review the information captured in these two links message and
10. protocols and Transmission Control Protocol/Internet Protocol
(TCP/IP), and identify any security communication, message
and protocols, or security data transport methods used such as
(TCP/IP), SSL, and others. Make note of this, as it should be
mentioned in your reports.Step 4: Identifying Security Issues
You have a suite of security tools, techniques, and procedures
that can be used to assess the security posture of your
organization's network in a SAR.
Now it's time to identify the security issues in your
organization's networks. You have already used password
cracking tools to crack weak and vulnerable passwords. Provide
an analysis of the strength of passwords used by the employees
in your organization. Are weak passwords a security issue for
your organization?Step 5: Firewalls and Encryption
Next, examine these resources on firewalls and auditing–
RDBMS related to the use of the Relational Database
Management System (i.e., the database system and data)
RDBMS. Also review these resources related to access control.
Determine the role of firewalls and encryption, and auditing –
RDBMS that could assist in protecting information and
monitoring the confidentiality, integrity, and availability of the
information in the information systems.
Reflect any weaknesses found in the network and information
system diagrams previously created, as well as in the
developing SAR.
Step 6: Threat Identification
You know of the weaknesses in your organization's network and
information system. Now you will determine various known
threats to the organization's network architecture and IT assets.
Get acquainted with the following types of threats and attack
techniques. Which are a risk to your organization?
· IP address spoofing/cache poisoning attacks
· denial of service attacks (DoS)
· packet analysis/sniffing
· session hijacking attacks
· distributed denial of service attacks
11. In identifying the different threats, complete the following
tasks:
1. Identify the potential hacking actors of these threat attacks
on vulnerabilities in networks and information systems and the
types of remediation and mitigation techniques available in your
industry, and for your organization.
2. Identify the purpose and function of firewalls for
organization network systems, and how they address the threats
and vulnerabilities you have identified.
3. Also discuss the value of using access control, database
transaction and firewall log files.
4. Identify the purpose and function of encryption, as it relates
to files and databases and other information assets on the
organization's networks.
Include these in the SAR. Step 7: Network Analysis
Note: You will utilize the tools in Workspace for this step.
You will now investigate network traffic, and the security of the
network and information system infrastructure overall. Past
network data has been logged and stored, as collected by a
network analyzer tool such as Wireshark.
Select the following link to enter Workspace and complete the
lab activities related to network vulnerabilities.
Perform a network analysis on the Wireshark files provided to
you in Workspace and assess the network posture and any
vulnerability or suspicious information you are able to obtain.
Include this information in the SAR. Further analyze the packet
capture for network performance, behavior, and any suspicious
source and destination addresses on the networks.
In the previously created Wireshark files, identify if any
databases had been accessed. What are the IP addresses
associated with that activity? Include this information in the
SAR. Step 8: Suspicious Activity
Note: You will utilize the tools in Workspace for this step.
Hackers frequently scan the Internet for computers or networks
to exploit. An effective firewall can prevent hackers from
detecting the existence of networks. Hackers continue to scan
12. ports, but if the hacker finds there is no response from the port
and no connection, the hacker will move on. The firewall can
block unwanted traffic and NMap can be used to self-scan to
test the responsiveness of the organization's network to would-
be hackers.
Select the following link to enter Workspace and conduct the
port scanning. Provide your findings in the SAR deliverable.
Provide analyses of the scans and any recommendation for
remediation, if needed. Identify any suspicious activity and
formulate the steps in an incidence response that could have
been, or should be, enacted. Include the responsible parties that
would provide that incidence response and any follow-up
activity. Include this in the SAR. Please note that some
scanning tools are designed to be undetectable. While running
the scan and observing network activity with Wireshark, attempt
to determine the detection of the scan in progress. If you cannot
identify the scan as it is occurring, indicate this in your
SAR.Step 9: Risk and Remediation
What is the risk and what is the remediation? What is the
security exploitation? You can use the OPM OIG Final Audit
Report findings and recommendations as a possible source for
methods to remediate vulnerabilities.
Read this risk assessment resource to get familiar with the
process, then prepare the risk assessment. Be sure to first list
the threats, then the vulnerabilities, and then pairwise
comparisons for each threat and vulnerability, and determine the
likelihood of that event occurring, and the level of impact it
would have on the organization. Use the OPM OIG Final Audit
Report findings as a possible source for potential mitigations.
Include this in the risk assessment report (RAR).
Step 10: Creating the SAR and RAR
Your research and Workspace exercise have led you to this
moment: creating your SAR and RAR. Consider what you have
learned in the previous steps as you create your reports for
leadership.
Prepare a Security Assessment Report (SAR) with the following
13. sections:
1. Purpose
2. Organization
3. Scope
4. Methodology
5. Data
6. Results
7. Findings
The final SAR does not have to stay within this framework, and
can be designed to fulfill the goal of the security assessment.
Prepare a Risk Assessment Report (RAR) with information on
the threats, vulnerabilities, likelihood of exploitation of security
weaknesses, impact assessments for exploitation of security
weaknesses, remediation, and cost/benefit analyses of
remediation. Devise a high-level plan of action with interim
milestones (POAM), in a system methodology, to remedy your
findings. Include this high-level plan in the RAR. Summarize
the results you obtained from the vulnerability assessment tools
(i.e., MBSA and OpenVas) in your report.
The deliverables for this project are as follows:
1. Security Assessment Report (SAR): This should be an 8-10
page double-spaced Word document with citations in APA
format. The page count does not include figures, diagrams,
tables, or citations.
2. Risk Assessment Report (RAR): This report should be a 5-6
page double-spaced Word document with citations in APA
format. The page count does not include figures, diagrams,
tables, or citations.
3. In a Word document, share your lab experience and provide
screen prints to demonstrate that you performed the lab.
Submit your deliverables to the assignment folder.
Before you submit your assignment, review the competencies
below, which your instructor will use to evaluate your work. A
good practice would be to use each competency as a self-check
to confirm you have incorporated all of them in your work.
14. · 1.1: Organize document or presentation in a manner that
promotes understanding and meets the requirements of the
assignment.
· 1.2: Develop coherent paragraphs or points to be internally
unified and function as part of the whole document or
presentation.
· 1.3: Provide sufficient, correctly cited support that
substantiates the writer’s ideas.
· 1.4: Tailor communications to the audience.
· 1.5: Use sentence structure appropriate to the task, message
and audience.
· 1.6: Follow conventions of Standard Written English.
· 5.2 Enterprise Architecture: Knowledge of architectural
methodologies used in the design and development of
information systems, including the physical structure of a
system's internal operations and interactions with other systems
and knowledge of stan
· 5.6: Technology Awareness: Explore and address
cybersecurity concerns, promote awareness, best practice, and
emerging technology
· 7.3: Risk Management : Knowledge of methods and tools used
for risk management and mitigation of risk
· 8.1: Incident Detection: Demonstrate the abilities to detect,
identify, and resolve host and network intrusion incidents.
· 8.2: Incident Classification: Possess knowledge and skills to
categorize, characterize, and prioritize an incident as well as to
handle relevant digital evidence appropriately.
Basically, you are going to have a network diagram that shows
the different levels of the network (backend, intranet, DMZ,
frontend applications, etc) all the way through to the internet.
Show how you are separating the logical portions (firewalls,
switches, VLANs, etc).
Student Name
15. Professor Kelly Jordan
ARTH 102
17 November 2013
Compare/Contrast Essay;
Starry Night and The Scream
During the phase from the late 19th to early 20th century, the
Post-Impressionism emerged, a unique avant-garde art with
artists’ independent personal aesthetics that sought to progress
beyond the narrow imitative style of empirical Realism and
Impressionism. This style was derived from a group of young
painters such as Paul Gauguin and Georges Seurat in order to
create more monumental and universal art (Davies et al. 528).
Furthermore, right after the rise of the Post-Impressionism, a
strange dreamlike imagery called Symbolism appeared. This
Symbolist otherworldly aesthetic of fantasy, escapism and
psychology that rejected Naturalism and Realism flourished
throughout Europe (Collins). In fact, Vincent Van Gogh, Dutch
painter, was one of the pioneers of Post-Impressionism while
Edvard Munch, Norwegian painter, was also associated with the
international development of Symbolism and recognized as a
precursor of Expressionism (Hood). In this essay, I will
compare and contrast two of their legendary masterpieces, both
of which reflect the artists’ nervousness, but depict different
atmospheres of scenery: The first is Starry Night by Vincent
Van Gogh drawn in 1889, and the second is The Scream by
Edvard Munch drawn in 1893.
Both Gogh and Munch, who are pioneers of Post-Impressionism
and Symbolism, struggled with insanity during their lifetimes,
and consequently painted ominous imageries with swirling
energy, which reflect their unstable mental states. Gogh was
such a deeply troubled and depressed man who inconsistently
yearned for universal harmony and humanitarian craving.
Consequently, majority of his paintings mirrors his intense,
uncontrollable emotions which accentuate personal symbolic
vocabulary in expressionistic ways (Davies et al. 534). This is
16. well represented in his painting, Starry Night. Compared to
other beautifully depicted objects in the background, there is
the most eye-catching and ambiguous large cypress tree
dominating the foreground. Because this was painted during a
sad period of Gogh’s life, the sinister presence of the massive
dark isolated tree would surely reflect the depressed artist.
Moreover, Munch also explored the expressive representation of
emotions and personal relationships as he extended the
obsessive personal nature of his subjects into universal symbols
of emotional states (Hood). In The Scream, he showed an honest
and ugly glimpse of his inner troubles and feeling of his
anxiety. The main figure, unappealing androgynous creature
clasping hands to a skull-like head, is gasping with expressions
of fear and anxiety. Since he struggled with insanity not only on
a personal level, but also through his family, it is clear that he
put more importance on personal meaning in his painting then
on technical skill or traditional view of beauty (Shabi).
However, Starry Night portrays peaceful and beautiful scenery
with shining stars in a nocturnal sky whereas The Scream
captures a horrifying anxiety of a grotesquely compressed
writhing figure. Also, the colors used in each painting create
totally antithetical atmospheres. Closely examining Vincent Van
Gogh’s Starry Night, this painting has strong religious
overtones since Gogh attempted to draw the utopia with the
peaceful tranquility of unpretentious people living in nature and
harmony, all of which he dreamed (Davies et al. 534). The night
sky is filled with spectacular cosmic events – joyous swirling
clouds, luminescent stars with yellow haloes. Below the sky and
rolling hills of the horizon lies a small town, snugly ensconced
in a valley. Gogh uses exaggerated and thick sweeping
brushstrokes to visualize what he wanted the world to be. In
fact, he conveys the strong feelings of hope through the bright
lights of the stars shining down the dark nocturnal landscape,
other than just insanity and isolation (Shabi). However, in The
Scream, everything is twirling and swirling with dark vivid
colors which create a threatening dismal atmosphere. This scene
17. is also believed to be prompted by the violent eruption of the
Indonesian volcano Krakatoa in 1883. Witnessing such an
apocalyptic display of colors in Oslo, Munch might have
intended to depict the ugly sounds of living beings undergoing
both physical and emotional sufferings in the modern age
through bright exaggerated colors and simplistic shapes (Shabi).
To conclude, both Gogh and Munch are representative artists of
the late 19th and early 20th century who each developed Post-
Impressionism and Symbolism. Both of the artists suffered from
craziness, but their hysteria eventually made them to create two
of the most reproduced and famous pieces of art in the world
today: Starry Night embodies an inner, subjective expression of
Gogh’s response to nature, and The Scream deals with awe-
inspiring nature and emotional life, presumably applicable to all
modern humans.
Works Cited
Collins, Neil. “Symbolism.” Art Encyclopedia. Visual-arts-
cork.com, 2008. Web. 16 Nov. 2013.
Davies, Penelope J.E., et al. Janson’s Basic History of Western
Art. 9th ed. New Jersey: Pearson, 2009. Print.
Hood, William. “Munch, Edvard.” Grove Art Online. Oxford
Art Online. Oxford University Press. Web. 16 Nov. 2013.
Shabi, K. “Meaning of The Scream (1893) painting by Edvard
Munch: Art Analysis.” Online Literary Journal and Magazine.
Legomenon, 2012. Web. 16 Nov. 2013
Shabi, K. “Starry Night: Meaning of the Vincent Van Gogh
landscape painting.” Online Literary Journal and Magazine.
Legomenon, 2012. Web. 16 Nov. 2013
Compare/Contrast Essay
In order to learn some of the basic skills necessary to research
and develop a formal analysis of a work of art, you will write 2
Compare/Contrast essays> Each essay will compare two works
18. of art found in the textbook. The selection of artworks for each
paper is up to the student, but must be selected only from
chapters covered in our course (and it is recommended that you
choose works that we have covered in our reading previous to
the due date of the assignment). You may not write about any
work of art that you have already written about in your weekly
Discussion Boards. Please read all 4 pages of this assignment
sheet before beginning your work.
Your formal analysis must be:
- minimum two FULL pages (maximum 2.5 pages)
- double-spaced in a 12-point legible font
- MLA format with a Works Cited page. (See the MLA Style
Guide found under Course
Documents)
- The title of paintings, sculptures, photographs, printmaking
works of art should ALWAYS be in
ITALICS
- Be certain of what medium of art you are referring to. Not all
works of art are “pictures”; do a
little research and refer to it as a painting, sculpture, work
of architecture, photograph, etc.
-Wikipedia is not an acceptable source. This is a user generated
with little to no fact checking
so the information cannot be considered reliable.
The first stage of your analysis is to find information about the
works and their respective artists, and to document that
information. Use the sheet provided to help you gather
important information. Be sure to include information about the
possible artist influences and reference any special subject
matter depicted in the works. After you have had a chance to
research the basic information about your particular works of
art, try to describe it using the elements of art that we have
discussed in class.
19. The second stage of the assignment will include taking the
information you have about the works (including your analysis
of the elements of art, subject matter and artistic media), and
presenting it in essay form.
The third and last stage of your analysis will be to refine your
writing and to make any changes necessary before the next
class. THIS FINAL DRAFT IS DUE, ATTACHED TO THE
SUBMISSION POINT, BY SUNDAY AT 11:59 P.M. OF THE
SESSION IN WHICH IT IS DUE. SEE COURSE CALENDAR
AND SESSION FOLDERS FOR DUE DATES.
PLEASE REMEMBER THAT:
• All sources should be cited and included in the Works Cited
page. Citations should be in MLA format. Plagiarism will result
in a zero (0) for the assignment and the responsibility for proof
regarding the originality of a paper rests with you, not the
instructor.
• If you are absent on the due date it is your responsibility to
make sure the paper or project is still turned in on time.
• Late papers and projects may be accepted with the following
late penalties:
o If it is turned in within 24 hours of the due date there will be
a 10% reduction.
o After 24 hours and up to 2 DAYS there will be a 50%
reduction.
o After 2 DAYS the paper or project will no longer be accepted
for credit.
Compare/Contrast Essay –
The Formal Analysis
Your analysis will consist of two typewritten pages about the
works that you have chosen. This analysis will be in paragraph
20. form, with an introductory paragraph, a conclusion paragraph,
and at least three body paragraphs. Your formal analysis must
be two full pages, double-spaced in a 12-point legible font
(Times New Roman preferred), and in MLA format with a
Works Cited page. Each paragraph should be composed of at
least three sentences, with no sentence more than three lines
long.
Some of the things that you may want consider in your analysis
are:
Subject matter – What is depicted in these works? Does the
subject matter include any images from ancient mythology or
Biblical stories? Is the subject matter a reflection of the time
and place in which the artists lived? Were these works done for
a famous patron? Include the name of the donor(s) sponsoring
the work, if these people are known.
Artistic media – How were these works made, and what are they
made from? Are these artists known for any special techniques
in their work? How do these works compare with other works
from this artist or other artists from the same era?
Elements of Art – Describe each one for your works; also
consider the Principles of Design in your analysis.
Be sure to provide smooth transitions between all of your
paragraphs. Examples: “Another way that the artist has shown
the relationship between colors in the work is…. The quick,
broken use of line is mirrored in the texture through…. As we
move along the face, we also see….”
Spelling and grammar are as important to your piece as any
other aspect of the work, if not more so. If your work has
spelling or grammatical errors, then it is clear that you have not
put much effort into the piece and your grade will be affected.
21. Helpful Websites for Preparing the Compare/Contrast Essay
Writing a Compare/Contrast Art History Essay, from the
Academy of Art University
http://arc.academyart.edu/writing/essay.asp
Writing the Art History Paper, from the Dartmouth University
Writing Program
http://www.dartmouth.edu/~writing/materials/student/humanitie
s/arthistory.shtml
Compare/Contrast Guide, from the ReadWriteThink Site
http://www.readwritethink.org/materials/compcontrast/
Helpful Art Links
Mark Harden's Artchive
-click on the Mona Lisa to access a listing of artists and their
work http://www.artchive.com/
Christopher Witcombe's Art History Resources on the Web
http://witcombe.sbc.edu/
Worldwide Art Resources
http://wwar.com/
Researching a Work of Art: Gathering the Basics
Use this paper as a guide in the analysis of each of your works
of art. You may want to make two copies of this sheet – one for
each work.
Artist:
_____________________________________________________
____________
Year born/year died:
____________________________________________________
Influences?
_____________________________________________________
________
Style associated with this artist:
____________________________________________
Title of work:
_____________________________________________________