Saturday, December 28, 2019

VoIP Security Internet - Free Essay Example

Sample details Pages: 21 Words: 6159 Downloads: 4 Date added: 2017/06/26 Category Statistics Essay Did you like this example? End to end VoIP security Introduction Don’t waste time! Our writers will create an original "VoIP Security Internet" essay for you Create order User communications applications are in high demand in the Internet user community. Two classes of such applications are of great importance and attract interest by many Internet users: collaboration systems and VoIP communication systems. In the first category reside systems like ICQ , MSN Messenger and Yahoo! Messenger while in the latter, systems like Skype and VoipBuster are dominating among the public VoIP clients. In the architecture plane, collaboration systems form a distributed network where the participants communicate with each other and exchange information. The data are either routed from the source through a central server to the recipient or the two clients communicate directly. The participants in such networks are both content providers and content requestors . On the other hand, the data communication path in the VoIP systems is direct between the peers, without any involvement of the service network in the data exchange path with some exceptions like Skypes superno de communications. Data are carried over public Internet infrastructures like Ethernets, WiFi hotspots or wireless ad hoc networks. Security in these networks is a critical issue addressed in several different perspectives in the past. In this assignment I focus on cryptographic security implementation in VoIP. Security is implemented dynamically in cooperation by the two (or more) peers with no prior arrangements and requirements, like out of band exchanged keys, shared secrets etc. Ease of use (simplicity), user friendliness (no special knowledge from the user side) and effectiveness (ensuring confidentiality and integrity of the applications) combined with minimal requirements on end user devices are the goals achieved by our approach. We leverage security of user communications, meeting all the above requirements, by enhancing the applications architecture with VoIPSec security elements. Over the past few years, Voice over IP (VoIP) has become an attractive alternative to more traditional forms of telephony. Naturally, with its in-creasing popularity in daily communications, re-searchers are continually exploring ways to improve both the efficiency and security of this new communication technology. Unfortunately, while it is well understood that VoIP packets must be encrypted to ensure confidentiality, it has been shown that simply encrypting packets may not be sufficient from a privacy standpoint. For instance, we recently showed that when VoIP packets are first compressed with variable bit rate (VBR) encoding schemes to save bandwidth, and then encrypted with a length preserving stream cipher to ensure confidentiality, it is possible to determine the language spoken in the encrypted conversation. As surprising as these findings may be, one might argue that learning the language of the speaker (e.g., Arabic) only affects privacy in a marginal way. If both endpoints of a VoIP call are known (for example, Mexico City and Madrid), then one might correctly conclude that the language of the conversation is Spanish, without performing any analysis of the traffic. In this work we show that the information leaked from the combination of using VBR and length preserving encryption is indeed far worse than previously thought. VOIP This assignment is about security, more specifically, about protecting one of your most precious assets, your privacy. We guard nothing more closely than our words. One of the most important decisions we make every day is what we will say and what we wont. But even then its not only what we say, but also what someone else hears, and who that person is. Voice over IP- the transmission of voice over traditional packet-switched IP networksis one of the hottest trends in telecommunications. Although most computers can provide VoIP and many offer VoIP applications, the term voice over IP is typically associated with equipment that lets users dial telephone numbers and communicate with parties on the other end who have a VoIP system or a traditional analog telephone. (The sidebar, Current voice-over-IP products, de-scribes some of the products on the market today.) As with any new technology, VoIP introduces both opportunities and problems. It offers lower cost and greater flexibility for an enterprise but presents significant security challenges. Security administrators might assume that because digitized voice travels in packets, they can simply plug VoIP components into their already se-cured networks and get a stable and secure voice net-work. Unfortunately, many of the tools used to safeguard todays computer networksfirewalls, network address translation (NAT), and encryptiondont work as is in a VoIP network. Although most VoIP components have counterparts in data networks, VoIPs performance demands mean you must supplement ordinary network software and hardware with special VoIP components. Integrating a VoIP system into an already congested or overburdened network can be disastrous for a companys technology infra-structure. Anyone at- tempting to construct a VoIP network should therefore first study the procedure in great detail. To this end, weve outlined some of the challenges of introducing appropriate security measures for VoIP in an enterprise. End-to-End Security IN this assignment I am going to describe the end-to-end security and its design principle that one should not place mechanisms in the network if they can be placed in end nodes; thus, networks should provide general services rather than services that are designed to support specific applications. The design and implementation of the Internet followed this design principle well. The Internet was designed to be an application-agnostic datagram de-livery service. The Internet of today isnt as pure an implementation of the end-to-end design principle as it once was, but its enough of one that the collateral effects of the network not knowing whats running over it are becoming major problems, at least in the minds of some observers. Before I get to those perceived problems, Id like to talk about what the end-to-end design principle has meant to the Internet, technical evolution, and society. The Internet doesnt care what you doits job is just to deliver the bits, stupid (in the words of David Isenberg in his 1997 paper, Rise of the Stupid Network2). The bits could be part of an email message, a data file, a photograph, or a video, or they could be part of a denial-of-service attack, a malicious worm, a break-in attempt, or an illegally shared song. The Net doesnt care, and that is both its power and its threat. The Internet (and by this, I mean the Arpanet, the NSFNet, and the networks of their successor commercial ISPs) wasnt designed to run the World Wide Web. The Internet wasnt designed to run Google Earth. It was designed to support them even though they did not exist at the time the foundations of the Net were designed. It was designed to support them by being designed to transport data without caring what it was that data represented. At the very first, the design of TCP/IP wasnt so flexible. The initial design had TCP and IP within a single protocol, one that would only deliver data reliably to a destination. But it was realized that not all applications were best served by a protocol that could only deliver reliable data streams. In particular, timely delivery of information is more important than reliable delivery when trying to support interactive voice over a network if adding reliability would, as it does, increase delay. TCP was split from IP so that the application running in an end node could determine for itself the level of reliability it needed. This split created the flexibility that is currently being used to deliver Skypes interactive voice service over the same network that CNN uses to deliver up-to-the-minute news headlines and the US Patent and Trademark office uses to deliver copies of US patents. Thus the Internet design, based as it was on the end-to-end principle, became a generative facility. Unlike the traditional phone system, in which most new applications must be installed in the phone switches deep in the phone net-work, anyone could create new applications and run them over the Internet without getting permission from the organizations that run the parts of the Net. This ability was exploited with irrational exuberance4 during the late 1990s Internet boom. But, in spite of the hundreds of billions of dollars lost by investors when the boom busted, the number of Internet users and Web sites, the amount of Internet traffic, and the value of Internet commerce have continued to rise, and the rate of new ideas for Internet-based services hasnt no- ticeably diminished. Security and privacy in an end-to-end world The end to end arguments paper used se-cure transmission of data as one reason that an end-to-end design was required. The paper points out that network-level or per-link encryption doesnt actually provide assurance that a file that arrives at a destination is the same as the file that was sent or that the data went unobserved along the path from the source to the destination. The only way to ensure end-to-end data integrity and confidentiality is to use end-to-end encryption. Thus, security and privacy are the responsibilities of the end nodes. If you want to ensure that a file will be transferred without any corruption, your data-transfer application had better include an integrity check, and if you didnt want to allow anyone along the way to see the data itself, your application had better encrypt it before transmitting it. There are more aspects to security on a network than just data encryption. For example, to ensure that communication over the net-work is reliable, the network itself needs to be secure against attemptspurposeful or accidentalto disrupt its operation or redirect traffic away from its intended path. But the original Internet design didnt include protections against such attacks. Even if the network is working perfectly, you need to actually be talking to the server or person you think you are. But the Internet doesnt pro-vide a way, at the network level, to assure the identities of its users or nodes. You also need to be sure that the message your computer re receives isnt designed to exploit weaknesses in its software (such as worms or viruses) or in the ways that you use the Net. Protection against such things is the end systems responsibility. Note that there is little that can be done in the Net or in your end system to protect your privacy from threats such as the government demanding the records of your use of Net-based services such as Google, which collect information about your network usage. Many of todays observers assume that the lack of built-in protections against attacks and the lack of a se-cure way to identify users or nodes was a result of an environment of trust that prevailed when the original Internet design and protocols were developed. If you trusted the people on the Net, there was no need for special defensive functions. But a few people who were at the scene have told me that such protections were actively discouraged by the primary sponsor of the early Internetthat is to say, the US military wasnt all that interested in having good nonmilitary security, maybe because it might make its job harder in the future. Whatever the reason, the Internet wasnt designed to provide a secure environment that included protection against the malicious actions of those who would disrupt it or attack nodes or services provided over it. End-to-end security is not dead yet, but it is seriously threatened, at least at the network layer. NATs and firewalls interfere with some types of end-to-end encryption technology. ISPs could soon be required by regulations to, by default, filter the Web sites and perhaps the protocols that their customers can access. Other ISPs want to be able to limit the protocols that their customers can access so that the ISP can give service providers an incentive to pay for the customers use of their linesthey dont see a way to pay for the net-work without this ability. The FBI has asked that it be able to review all new Internet services for tapability before theyre deployed, and the FCC has hinted that it will support the request If this were to happen, applications such as Skype that use end-to-end encryption could be outlawed as inconsistent with law enforcement needs. Today, its still easy to use end-to-end encryption as long as its HTTPS, but that might be short-lived. It could soon reach the point that the use of end-to-end encryption, without which end-to-end security cant exist, will be seen as an antisocial act (as a US justice department official once told me). If that comes to be the case, end-toend security will be truly dead, and we will all have to trust functions in the network that we have no way of knowing are on our side. What is VoIP end to end security? Achieving end-to-end security in a voice-over-IP (VoIP) session is a challenging task. VoIP session establishment involves a jumble of different protocols, all of which must inter-operate correctly and securely. Our objective in this paper is to present a structured analysis of protocol inter-operation in the VoIP stack, and to demonstrate how even a subtle mismatch between the assumptions made by a protocol at one layer about the protocol at another layer can lead to catastrophic security breaches, including complete removal of transport-layer encryption. The VoIP protocol stack is shown in figure 1. For the purposes of our analysis, we will divide it into four layers: signaling, session description, key exchange and secure media (data) transport. This division is quite natural, since each layer is typically implemented by a separate protocol. Signaling is an application-layer (from the viewpoint of the underlying communication network) control mechanism used for creating, modifying and terminating VoIP sessions with one or more participants. Signaling protocols include Session Initiation Protocol (SIP) [27], H.323 and MGCP. Session description protocols such as SDP [20] are used for initiating multimedia and other sessions, and often include key exchange as a sub-protocol. Key exchange protocols are intended to provide a cryptographically secure way of establishing secret session keys between two or more participants in an untrusted environment. This is the fundamental building block in se-cure session establishment. Security of the media transport layerthe layer in which the actual voice datagrams are transmitteddepends on the secrecy of session keys and authentication of session participants. Since the established key is typically used in a symmetric encryption scheme, key secrecy requires that nobody other than the legitimate session participants be able to distinguish it from a random bit-string. Authentication requires that, after the key exchange protocol successfully completes, the participants respective views of sent and received messages must match (e.g., see the notion of matching conversations in [8]). Key ex-change protocols for VoIP sessions include SDPs Security DEscriptions for Media Streams (SDES) , Multimedia Internet KEYing (MIKEY) a nd ZRTP [31]. We will analyze all three in this paper. Secure media transport aims to provide confidentiality, message authentication and integrity, and replay protection to the media (data) stream. In the case of VoIP, this stream typically carries voice datagrams. Confidentiality means that the data under encryption is indistinguishable from random for anyone who does not have the key. Message authentication implies that if Alice receives a datagram apparently sent by Bob, then it was indeed sent by Bob. Data integrity implies that any modification of the data in transit We show how to cause the transport-layer SRTP protocol to repeat the keystream used for datagram encryption. This enables the attacker to obtain the xor of plaintext datagrams or even to completely decrypt them. The SRTP keystream is generated by using AES in a stream cipher-like mode. The AES key is generated by applying a pseudo-random function (PRF) to the session key. SRTP, however, does not add any session-specific randomness to the PRF seed. Instead, SRTP assumes that the key exchange protocol, executed as part of RTP session establishment, will en-sure that session keys never repeat. Unfortunately, S/MIME-protected SDES, which is one of the key ex-change protocols that may be executed prior to SRTP, does not provide any replay protection. As we show, a network-based attacker can replay an old SDES key establishment message, which will cause SRTP to re-peat the keystream that it used before, with devastating consequences. This attack is confirmed by our analysis of the libsrtp implementation. We show an attack on the ZRTP key exchange protocol that allows the attacker to convince ZRTP session participants that they have lost their shared secret. ZID values, which are used by ZRTP participants to retrieve previously established shared secrets, are not authenticated as part of ZRTP. Therefore, an attacker can initiate a session with some party A under the guise of another party B, with whom A previously established a shared secret. As part of session establishment, A is supposed to verify that B knows their shared secret. If the attacker deliberately chooses values that cause verification to fail, A will decidefollowing ZRTP specificationthat B has forgotten the shared secret. The ZRTP specification explicitly says that the protocol may proceed even if the set of shared secrets is empty, in which case the attacker ends up sharing a key with A who thinks she shares this key with B. Even if the participants stop the protocol after losing their shared secrets, but are using VoIP devices without displays, they cannot confirm the computed key by voice and must stop communicating. In this case, the attack becomes a simple and effective denial of service. Our analysis of ZRTP is supported by the AVISPA formal analysis tool . We show several minor weaknesses and potential vulnerabilities to denial of service in other protocols. We also observe that the key derived as the result of MIKEY key exchange cannot be used in a standard cryptographic proof of key exchange security (e.g., ). Key secrecy requires that the key be in-distinguishable from a random bitstring. In MIKEY, however, the joint Diffie-Hellman value derived as the result of the protocol is used directly as the key. Membership in many Diffie-Hellman groups is easily checkable, thus this value can be distinguished from a random bitstring. Moreover, even hashing the Diffie-Hellman value does not allow the formal proof of security to go through in this case, since the hash function does not take any random inputs apart from the Diffie-Hellman value and cannot be viewed as a randomness extractor in the proof. (This observation does not immediately lead to any attacks.) While we demonstrate several real, exploitable vulnerabilities in VoIP security protocols, our main contribution is to highlight the importance of analyzing protocols in con-text rather than in isolation. Specifications of VoIP protocols tend to be a mixture of informal prose and pseudocode, with some assumptionsespecially those about the protocols operating at the other layers of the VoIP stackare left implicit and vague. Therefore, our study has important lessons for the design and analysis of security protocols in general. The rest of the paper is organized as follows. In section 2, we describe the protocols, focusing on SIP (signaling), SDES, ZRTP and MIKEY (key exchange), and SRTP (transport). In section 3, we describe the attacks and vulnerabilities that we discovered. Related work is in section 4, conclusions are in section 5. VoIP security different from normal data network security To understand why security for VoIP differs from data network security, we need to look at the unique constraints of transmitting voice over a packet network, as well as the characteristics shared by VoIP and data networks. Packet networks depend on many configurable parameters: IP and MAC (physical) addresses of voice terminals and addresses of routers and firewalls. VoIP networks add specialized software, such as call managers, to place and route calls. Many network parameters are established dynamically each time a network component is restarted or when a VoIP telephone is restarted or added to the net-work. Because so many nodes in a VoIP network have dynamically configurable parameters, intruders have as wide an array of potentially vulnerable points to attack as they have with data networks. But VoIP systems have much stricter performance constraints than data networks, with significant implications for security. Threats for VoIP VoIP security threats contain Eavesdropping, Denial of Service, Session Hijacking, VoIP Spam, etc. For preventing these threats, there are several VoIP standard protocols. And we discuss this in Section 3. Eavesdropping VoIP service using internet technology is faced with an eavesdropping threat, in which is gathering call setting information and audio/voice communication contents illegally. Eavesdropping can be categorized largely by eavesdropping in a LAN(Local Area Network) environment, one in a WAN( Wide Area Network) environment, one through a PC(Personal Computer) hacking, etc. Denial of Service Denial of Service is an attack, which makes it difficult for legitimate users to take telecommunication service regularly. Also it is one of threats, which are not easy to solve the most. Since VoIP service is based on internet technology, it also is exposed to Denial of Service. Denial of Service in VoIP service can be largely divided into system resource exhaustion, circuit This work was supported by the IT RD program of MIC/IITA resourceexhaustion,VoIP communication interruption/blocking, etc. Session Hijacking Session Hijacking is an attack, which is gathering the communication session control between users through spoofing legitimate users, and is interfering in their communication, as a kind of man-in-the-middle attack. Session Hijacking in VoIP communication can be categorized largely by INVITE session hijacking, SIP Registration hijacking, etc. VoIP Spam VoIP Spam is an attack, which is interrupting, and violating user privacy through sending voice advertisement messages, and also makes VMS(Voice Mailing System) powerless. It can be categorized by Call Spam, IM(Instant Messaging) Spam, Presence Spam, etc. Security trade-offs Trade-offs between convenience and security are routine in software, and VoIP is no exception. Most, if not all, VoIP components use integrated Web servers for configuration. Web interfaces can be attractive, easy to use, and inexpensive to produce because of the wide availability of good development tools. Unfortunately, most Web development tools focus on features and ease of use, with less attention paid to the security of the applications they help produce. Some VoIP device Web applications have weak or no access control, script vulnerabilities, and inadequate parameter validation, resulting in privacy and DoS vulnerabilities. Some VoIP phone Web servers use only HTTP basic authentication, meaning servers send authentication information without encryption, letting anyone with network access obtain valid user IDs and passwords. As VoIP gains popularity, well inevitably see more administrative Web applications with exploitable errors. The encryption process can be unfavorable to QoS Unfortunately, several factors, including packet size expansion, ciphering latency, and a lack of QoS urgency in the cryptographic engine can cause an excessive amount of latency in VoIP packet delivery, leading to degraded voice quality. The encryption process can be detrimental to QoS, making cryptodevices severe bottlenecks in a VoIP net-work. Encryption latency is introduced at two points. First, encryption and decryption take a nontrivial amount of time. VoIPs multitude of small packets exacerbates the encryption slowdown because most of the time consumed comes as overhead for each packet. One way to avoid this slowdown is to apply algorithms to the computationally simple encryption voice data before packetization. Although this improves throughput, the proprietary encryption algorithms used (fast Fourier-based encryption, chaos-bit encryption, and so on) arent considered as secure as the Advanced Encryption Standard,16 which is included in many IPsec implementations. AESs combination of speed and security should handle the demanding needs of VoIP at both ends. following general guidelines, recognizing that practical considerations might require adjusting them: Put voice and data on logically separate networks. You should use different subnets with separate RFC 1918 address blocks for voice and data traffic and separate DHCP servers to ease the incorporation of intrusion-detection and VoIP firewall protection. At the voice gateway, which interfaces with the PSTN, disallow H.323, SIP, or Media Gateway Control Protocol (MGCP) connections from the data network. As with any other critical network management component, use strong authentication and access control on the voice gateway system. Choose a mechanism to allow VoIP traffic through firewalls. Various protocol dependent and independent solutions exist, including ALGs for VoIP protocols and session border controllers. Stateful packet filters can track a connections state, denying packets that arent part of a properly originated call. Use IPsec or Secure Socket Shell (SSH) for all remote management and auditing access. If practical, avoid using remote management at all and do IP PBX access from a physically secure system. Use IPsec tunneling when available instead of IPsec transport because tunneling masks the source and destination IP addresses, securing communications against rudimentary traffic analysis (that is, determining whos making the calls). If performance is a problem, use encryption at the router or other gateway to allow IPsec tunneling. Be-cause some VoIP end points arent computationally powerful enough to perform encryption, placing this Recent studies indicate that the greatest contributor to the encryption bottleneck occurs at the cryptoengine scheduler, which often delays VoIP packets as it processes larger data packets.17 This problem stems from the fact that cryptoschedulers are usually first-in first-out (FIFO) queues, inadequate for supporting QoS requirements. If VoIP packets arrive at the encryption point when the queue already contains data packets, theres no way they can usurp the less time-urgent traffic. Some hardware manufacturers have proposed (and at least one has implemented) solutions for this, including QoS reordering of traffic just before it reaches the cryptoengine.18 But this solution assumes that the cryptoengines output is fast enough to avoid saturating the queue. Ideally, youd want the cryptoengine to dynamically sort incoming traffic and force data traffic to wait for it to finish processing the VoIP packets, even if these packets arrive later. However, this solution adds considerable over head to a process most implementers like to keep as light as possible. Another option is to use hardware-implemented AES encryption, which can improve throughput significantly. Past the cryptoengine stage, the system can perform further QoS scheduling on the encrypted packets, provided they were encrypted using ToS preservation, which copies the original ToS bits into the new IPsec header. Virtual private network (VPN) tunneling of VoIP has also become popular recently, but the congestion and bottlenecks associated with encryption suggest that it might not always be scalable. Although researchers are making great strides in this area, the hardware and soft-ware necessary to ensure call quality for encrypted voice traffic might not be economically or architecturally vi-able for all enterprises considering the move to VoIP. Thus far, weve painted a fairly bleak picture of VoIP security. We have no easy one size fits all solution to the issues weve discussed in this article. Decisions to use VPNs instead of ALG-like solutions or SIP instead of H.323 must depend on the specific nature of both the current network and the VoIP network to be. The technical problems are solvable, however, and establishing a secure VoIP implementation is well worth the difficulty. To implement VoIP securely today, start with the following general guidelines, recognizing that practical considerations might require adjusting them: Put voice and data on logically separate networks. You should use different subnets with separate RFC 1918 address blocks for voice and data traffic and separate DHCP servers to ease the incorporation of intrusion-detection and VoIP firewall protection. At the voice gateway, which interfaces with the PSTN, disallow H.323, SIP, or Media Gateway Control Protocol (MGCP) connections from the data network. As with any other critical network management component, use strong authentication and access control on the voice gateway system. Choose a mechanism to allow VoIP traffic through firewalls. Various protocol dependent and independent solutions exist, including ALGs for VoIP protocols and session border controllers. Stateful packet filters can track a connections state, denying packets that arent part of a properly originated call. Use IPsec or Secure Socket Shell (SSH) for all remote management and auditing access. If practical, avoid using remote management at all and do IP PBX access from a physically secure system. Use IPsec tunneling when available instead of IPsec transport because tunneling masks the source and destination IP addresses, securing communications against rudimentary traffic analysis (that is, determining whos making the calls). If performance is a problem, use encryption at the router or other gateway to allow IPsec tunneling. Be-cause some VoIP end points arent computationally powerful enough to perform burden at a central point ensures the encryption of all VoIP traffic emanating from the enterprise network. Newer IP phones provide AES encryption at reason-able cost. Look for IP phones that can load digitally (cryptographically) signed images to guarantee the integrity of the software loaded onto the IP phone. Avoid softphone systems (see the sidebar) when security or privacy is a concern. In addition to violating the separation of voice and data, PC-based VoIP applications are vulnerable to the worms and viruses that are all too common on PCs. Consider methods to harden VoIP platforms based on common operating systems such as Windows or Linux. Try, for example, disabling unnecessary services or using host-based intrusion detection methods. Be especially diligent about maintaining patches and current versions of VoIP software. Evaluate costs for additional power backup systems that might be required to ensure continued operation during power outages. Give special consideration to E-91 1 emergency services communications, because E-911 automatic location service is not always available with VoIP. VoIP can be done securely, but the path isnt smooth. It will likely be several years before standards issues are settled and VoIP systems become mainstream. Until then, organizations must proceed cautiously and not assume that VoIP components are just more peripherals for the local network. Above all, its important to keep in mind VoIPs unique requirements, acquiring the right hardware and software to meet the challenges of VoIP security. Methods for VoIP end to end security Voice over IP (VoIP) security where security design patterns may prove exceedingly useful. Internet telephony or VoIP has grown in importance and has now passed the tipping point in 2005 U.S. companies bought more VoIP phones than ordered new POTS lines. However, with the powerful convergence of software-based VoIP to enable new functionality to store, copy, combine with other data, and distribute over the Internet also comes security problems that need to be solved in standard ways in order to ensure interoperability. This is further complicated by the fact that various vendors competing for market share currently drive VoIP security. Given the importance of VoIP security, we are only aware of only two other efforts for VoIP security design patterns, a chapter within and an unpublished M.S. thesis supervised by Eduardo Fernandez of Florida Atlantic University. Figure 1. VoIP Infrastructure Vulnerabilities NIST released a report on VoIP security in January 2005 . This report elaborates on various aspects of securing VoIP and the impact of such measures on call performance. The report argues that VoIP performance and security are not seamlessly compatible; in certain areas they are orthogonal. We briefly review this report and group VoIP infrastructure threats into three categories as depicted in Figure 1: (1) Protocol (2) Implementation and (3) Management Quality of Service (QoS) Issues A VoIP call is susceptible to latency, jitter, and packet loss. ITU-T recommendation G.114 has established 150 ms as the upper limit on one-way latency for domestic calls. If Goodes latency budget is considered, very little time ( 29 ms) is left for encryption/decryption of voice traffic. QoS-unaware network elements such as routers, firewalls, and Network Address Translators (NAT) all contribute to jitter (no uniform packet delays). Use of IPsec both contributes to jitter and reduces the effective bandwidth. VoIP is sensitive to packet loss with tolerable loss rates of 1-3%; however, forward error correction schemes can reduce loss rates. Signaling and Media Protocol Security SIP (Session Initiation Protocol) (RFC 3261) and H.323 are the two competing protocols for VoIP signaling. H.323 is an ITU-T umbrella of protocols that supports secure RTP (SRTP) (RFC 3711) for securing media traffic, and Multimedia Internet Keying (MIKEY) (RFC 3830) for key exchange. SIP supports TLS and S/MIME for signaling message confidentiality and SRTP for media confidentiality. Firewalls and NATs RTP is assigned a dynamic port number that presents a problem for firewall port management. A firewall has to be made aware of the ports on which the media will flow. Thus a stateful and application-aware firewall is necessary. However, if a client is behind a NAT, call establishment signaling messages transmit the IP address and RTP port number that is not globally reachable. NAT traversal protocols like STUN (RFC 3489), TURN (RFC 2026), and ICE (14) are necessary to establish a globally routable address for media traffic. For protocols that send call setup messages via UDP, the intermediate signaling entity must send to the same address and port from which the request arrived. Encryption and IPsec IPsec is preferred for VoIP tunneling across the Internet, however, it is not without substantial overhead. When IPsec is used in tunnel mode, the VoIP payload to packet size ratio for a payload of 40 bytes and RTP/UDP headers drops to ~30%. The NIST solution to avoid queuing bottlenecks at routers due to encryption is to perform encryption/decryption solely at endpoints. SRTP and MIKEY are specified for encrypting media traffic and establishing session keys respectively. Categorizing VoIP Threats The threats faced by a VoIP are similar to other applications including: unwanted communication (spam), privacy violations (unlawful intercept), impersonation (masquerading), theft-of-service, and denial-of-service. Table 1 groups these threats into protocol, implementation, and management categories. Protocol Signaling, MediaConfidentiality, Integrity end-to-end protection as well as hop-by- hop (Proxies might be malicious) Configuration, Confidentiality, Integrity most VoIP devices are managed remotely Identity Assertion Users concerned about whether they are talking to the real entity as opposed to a phished entity Reputation Management Implementation Buffer Overflow, Insecure Bootstrapping. Management Access Control protection against unauthorized access to VoIP servers and gateways Power Failures Table 1. Categorizing VoIP Threats Secure VoIP call The Secure VoIP call pattern hides the meaning of messages by performing encryption of calls in a VoIP environment. Context Two or more subscribers are participating in a voice call over a VoIP channel. In public IP networks such as the Internet, it is easy to capture the packets meant for another user. Problem When making or receiving a call, the transported voice packets between the VoIP network nodes are exposed to interception. How to prevent attackers from listening to a voice call conversation when voice packets are intercepted on public IP networks? The solution will be affected by the following forces: Packets sent in a public network are easy to intercept and read or change. We need a way to hide their contents. The protection method must be transparent to the users and easy to apply. The protection method should not significantly affect the quality of the call. Solution To achieve confidentiality we use encryption and decryption of VoIP calls. Implementation In cases where performance is an important issue, symmetric algorithms are preferred. Such algorithms require the same cryptographic key (a shared secret key) on both sides of the channel. If the IPSec standard is used, it is necessary for participants in a call (i.e. Caller and Callee) to agree previously on a data encryption algorithm (e.g. DES, 3DES, AES) and on a shared secret key. The Internet Key Exchange (IKE) protocol is used for setting up the IPSEC connections between terminal devices. The caller encrypts the voice call with the secret key and sends it to the remote user. The callee decrypts the voice call and recovers the original voice packets. Additionally, the Secure Real Time Protocol (SRTP) can be used for encrypting media traffic and the Multimedia Internet KEYing (MIKEY) for exchanging keying materials in VoIP. If public key cryptography is used, the callee must obtain the callers public key before establishing a connection. The caller encrypts the voice call with the callees public key and sends it to her. The callee decrypts the voice call and recovers the original voice packets. The class diagram of Figure 4 shows a Secure-channel communication in VoIP (adapted from the Cryptographic Metapattern in).This model uses the Strategy pattern to indicate choice of encryption algorithems. Both the Caller and Callee roles use the same set of algorithms although they are shown only in the caller side. Consequences The advantages of this pattern include: Symmetric encryption approaches provide good confidentiality. Encryption is performed transparently to the users activities. The need to provide separate VLANs for VoIP security could possibly be removed. It may no longer be necessary to use IPSec tunneling that was previously required in the MAN/WAN. Figure 4 Class Diagram for a VoIP Secure Channel Possible disadvantages include: The quality of the call can be affected if encryption is not performed very carefully [Wal05]. It is hard to scale because of the need for shared keys.

Friday, December 20, 2019

War in Iraq Essay - 1159 Words

For the past eight or nine years, the United States has continually sent troops overseas to the Middle East, but why? The government has said that it is to fight terrorism or to bring democracy to the Middle Eastern nations. There happens to be a barrier that stands in the way of both those goals and that would be Islamic Fundamentalism. Islamic Fundamentalism is the term used to describe the religious ideologies of advocating a return to the â€Å"fundamentals† of Islam. Through this return to the Islamic fundamentals, the rights of women have been violated while acts of terrorism and suicides increase. Also, there has been an increase in resistance to the United States occupation. With this increase of resistance the death toll of United†¦show more content†¦The reason for such an effective resistance against the occupation is credited to mainly to suicide bombing. These bombings claim countless lives and make it difficult for the United States troops to forefend th e American idea of freedom. This belief of protecting freedom happens to also be the driving force and motivation behind Osama Bin Laden and his supporters. Another factor that Bin Laden leads this fight happens to be the fact that countries with a democracy often create terrorism movements (Zakariya). What is misunderstood about the entire suicide terrorism idea is the fact that â€Å"... It is a demand-driven phenomenon† (Pape). It is not as if they will stop bombing if they run out of people. They will continue to bomb until the foreign powers occupying the Middle East recognize their point view and withdrawal all troops from the area. According to iCasualties.org some 4397 troops have died in Iraq since 2002 with 904 or 20.6% of those deaths coming in 2007. Lest the American people want to continue to slaughter their own boys, it might be high time to put someone into power who is willing to remove the troops. Body2 The second main cause of the war in Iraq is known as Islamic Fundamentalism. The leaders of the Islamic Fundamentalism movement believe that the for some time now the countries in the Middle East have been moving away from the main ideals of the Islamic religion. To respond to this, these leadersShow MoreRelatedThe Iraq War1487 Words   |  6 PagesIn his 1988 Republican National Convention acceptance speech former U.S. President George H.W. Bush proclaimed that, â€Å"Weakness and ambivalence lead to war.†. For better or worse a states ability to influence world politics is primarily based on much power they have. In purely academic terms, power is the ability of Actor A to get Actor B to do something that B would otherwise not do; the ability to get the other side to make concessions and to avoid having to make concessions oneself (Frieden PRead More war in iraq1122 Words   |  5 Pagesfor the failed Iraq war. Congress is gearing up to pour more money to quot;stay the cou rsequot; of the past two tragic years. Tell your Member of Congress that not one more dime should go to waging war in Iraq. Instead, the U.S. must end the occupation, bring our troops home, and support Iraqi sovereignty. Many good-intentioned people in the United States say we cant withdraw our troops now and abandon Iraqis to chaos and disorder. Yet the U.S. presence on the streets of Iraq is fueling animosityRead MoreThe War Of The Iraq War958 Words   |  4 Pageswith the terrorism that went on in Iraq. March 20, 2003 marked the day that President George W. Bush announced the start of the war against Iraq (1). This was the beginning of a very costly war on both America and Iraq. The cost of the Iraq War was not just the amount of money spent, but the impact of war on the soldiers and the toll that it took on the families of those who were involved, as well as the amount of time and dedication of resources put into the war by the Government. The amountRead MoreThe War Of Iraq War Essay1198 Words   |  5 Pagescontroversy, and terror. The capital of Iraq was shaking not only by their new government that reflected dealmaking not meritocracy but, also with an internal religious struggle that was peaking with seventy or more deaths a day. Death was far too easy in Iraq, the United States was in the search for the for the best approach in a hostile environment where the identity of the enemy is masked by the surrounding civilians. The pending question that comes from the war in Iraq war, What is the right approach toRead MoreThe War And The Iraq War862 Words   |  4 PagesThe Gulf War and the Iraq war can reflect the tension between a phenomenon is that the United States and the Middle East. The American media reported on the two Gulf War had many similarities. In the recent ten years, with the development of social economy and media technology has increased democratization, media reports and presents new features about the media. The topic of what the role of wars in the society has been discussed for many people. Some people argue that during the war, everythingRead MoreThe Iraq War1926 Words   |  8 PagesThe Iraq War began in 2003 and lasted until 2011, and stands to be among the most controversial conflicts of modern times. It was a war that proceeded without the approval of the United Nations (UN) and was said to be a failure on all counts, for despite managing to end Saddam Hussein’s regime did not lead to an improvement in the situation in Iraq, and instead led Iraq to becoming a failed state and being on the brink of a civil war. According to then Secretary-General Kofi Annan, the Iraq WarRead More War in Iraq Essay801 Words   |  4 Pages War in Iraq nbsp;nbsp;nbsp;nbsp;nbsp;Picture this, you, in a 3rd world country, no friends no family for thousands of miles, hungry, not feeling so well, tired, exhausted and being forced to fight thousands of people who want you out of there country? Fun? I wouldn’t think so†¦ This is a reality for thousands of American Soldiers stationed in Iraq and maybe your reality if the draft is reinstated. Now, picture this. You’re watching the news, they are calling out birthdays, oh they choose yoursRead MoreThe Iraq War Of 20031350 Words   |  6 PagesThe Iraq war of 2003 is a blueprint of tyranny, which is full of controversial ideas, and works of individuals who believe that the United States of America is a crusader of freedom and democracy. And killing or unintentional homicide of substantial amount of civilians alongside with the targets of the U.S marines (Saddam’s armed forces) was a successful mission in the Middle East. An operation that was to be executed in a tim e limit, transformed into a war, which began in March 19th 2003 InvasionRead MoreThe Vietnam War And Iraq Wars1214 Words   |  5 PagesFinal Exam Paper The Vietnam War and Iraq wars have many more similarities then the common American would think. Both were fighting gorillas in a foreign land in a way that the soldiers were never trained or prepared for, against a foe that despise America as a whole. However I believe the biggest difference is the American publics view and attitude toward each of the two wars. As well as the attitude of the soldiers in each of the wars in 2001 after the September 11 attacks we had people like PatRead MoreIntervention Of The Iraq War Essay1465 Words   |  6 PagesIn the years leading up to and during the Iraq War, the United States pursued a neo-conservative agenda that aimed to dismantle Saddam Hussein’s regime, eliminate the threat of Weapons of Mass Destruction (WMD), and install a democratic government in Iraq. To do so, U.S. policymakers deployed military forces and diplomatic ambassadors to intervene. This strategy, clearly seen during the early invasion in 2003 and the surge of 2007, produced mixed reactions. Indeed, more than a decade after the U

Thursday, December 12, 2019

Australian and New Zealand Army Corps

Question: What impact has the ANZAC tradition had on Australian society and culture? Answer: Introduction: Although the Gallipoli movement was considered a tragedy in expressions of the slaughter of life experienced in attendance and the breakdown to accomplish a martial conquest, the Australian and New Zealand Army Corps (or ANZACs as they encompasses turn out to be recognized as) be converted into a myth. What occurred at Gallipoli prepared them as a very significant portion of the Australian civilization at an instance when the new amalgamated State of Australia yet not had been recognized her into the phrase of an international echelon. In speculation, the myth is so as to Australian and New Zealand crowd assisted to set up their nations' standings in the international level from side to side characters of potency and courageousness when encountered with hardship Stockings, (C., Connor, J. Eds.2013). In actual fact, it is a lot added than that. The myth of these persons who continued so good extend has prearranged incredible of that Australians be able to be bigheaded. It places the mark of Australia on the international society as somewhat further than a country move down from crooks (Burgmann, M. 2015). Here in this context various aspects in relation to the legendary ANZAC tradition are going to be discussed, the role of the ANZAC in the historical peripherals is unbeatable and these make the citizen of the country Australia and New Zealand feel proud of them. Australian and New Zealand army cops were not only the savior of their countries but they made a huge impact upon the world at large. In the year of 1916, the infantry sections of Australian andNew Zealandwere dived intothe territory of France. They had taken participation in a few of the bloodiest events in relation to the battle and recognized status as best astonish flocks, against the cost of profound fatalities (Kwok, et. Al. 2014). The division of New Zealand, in due course unrelenting by enlistment, it was next to no one in the course of the combat, preparation, and management. The divisions of Australian, in due course accomplished the potency of five sections, countenanced complicatedness in substituting wounded asAustraliatwo times discarded the mobilization. Assembled in a solitary unit controlled bySir John Monash, who accompaniment the flamboyance and the strategic ability of the armed forces along with widespread, cautious preparation, the Australians nonetheless were fundamental to overwhelming the German distasteful on March 1918 and into the hundred days since 8th August to 11th November, that fini shed the immense combat. The cavalry elements of ANZAC continued in the Central East part, in concerting a key function in the campaign of Palestine in the year 19171918. A distinctive state of mind on the basis of the perceptions of adulthood and desirability is recurrently quoted as the solution to the soldier of Australia and New Zealand velour and success. 25th April is the ANZAC days in Australia and New Zealand; it is one of the main occasions for the purpose of articulating sentiments towards the nation (Lipton, 2012). It has been initially anticipated to forename the group as the Australasian Army Corps, this designation has been mentioned in the component chronicle, subsequent to the universal carry out of the instance, which over and over again saw the people of New Zealander and Australia contend collectively asAustralasiain generous proceedings. On the other hand, remonstrations from New Zealand leading the adoption of the title as Australian and New Zealand Army Corps. The management staffs originate the designation very unwieldy so swiftly accepted the short form A. N.Z.A.C. or minimally ANZAC.Abruptly later on it was formally approved as the soubriquet for the corps except it did not cross the threshold ordinary convention in the middle of the multitude in anticipation of later than the Gallipoli upstairs hallway (Murphy et al. 2012). In spite of being tantamount along with Australia and New Zealand, ANZAC was a cosmopolitan organization. Into the bargain to the several British officials in the group and section forces, the Australian and New Zealand Army Corps controlled, at a variety of spots, the seventh Task force of the IMA (Indian Mountain Artillery), the Zion Mule Corps, Ceylon Planters Rifle Corps troops, four battalions from the Royal Naval Division, one brigade of the British 10th Division of the Irish part and the 29th Indian Infantry Brigade, the British 13th Division of western part (Blackman, et. Al. 2003). Conclusion: After the above discussion it can be summarized that the Australian and New Zealand Army Corps are one of the greatest task force, and it was proved by the task force itself by their bravery. This organizational body will always make the people of those two countries proud. Reference Murphy, E. B., Blackman, B. G., Murphy, E. B., Blackman, B. G. (2012). Relative abundance trends in Arctic grayling (Thymallus arcticus) populations of the Parsnip, Table and Anzac rivers in 2001.Fish and Wildlife Compensation. Lipton, M. (2012). Tactical Agency in War Work:'Anzac Ada'Reeve, the Soldiers' Friend'.Popular Entertainment Studies,3(1), 7-23. Blackman, B. G., Murphy, E. B., Cowie, D. M., Blackmanr, B. G., Murphy, E. B., Cowie, D. M. (2012). Relative abundance trends of Arctic grayling (Thymallus arcticus) populations in the Parsnip, Table and Anzac rivers in 2003.Fish and Wildlife Compensation Program. Stockings, C., Connor, J. (Eds.). (2013).Before the Anzac Dawn: A military history of Australia before 1915. NewSouth. Burgmann, M. (2015). The Women Against Rape in War Collectives protests against ANZAC Day in Sydney, 1983 and 1984.Cosmopolitan Civil Societies: An Interdisciplinary Journal,6(3), 116-122. Kwok, K. W., Batley, G. E., Wenning, R. J., Zhu, L., Vangheluwe, M., Lee, S. (2014). Sediment quality guidelines: challenges and opportunities for improving sediment management.Environmental Science and Pollution Research,21(1), 17-27.

Wednesday, December 4, 2019

Case Study of Ms Foley-Free-Samples for Students-Myassignmenthelp

Questions: 1.Refer to the case scenario provided below for Ms Foley who has been diagnosed with acute pulmonary oedema. From the assessment information in the scenario, you are to analyse the information provided and then complete two (2) charts Observation Chart and Fluid Balance Chart (FBC). 2.Explain the inter-professional model of care required for Ms Foley while in hospital. You are to include the most appropriate national nursing regulatory standards linked to Ms Foleys care. A starting point is to read the Registered Nurse Standards for Practice (NMBA 2016). Answers: Introduction and outline This assignment is about a patient named Ms. Martha Foley, a 35 year old lady who is suffering from acute pulmonary oedema and was admitted in the hospital prior to 5 days because of post multi-trauma caused by a car accident. She is also suffering from multiple fractures in both legs and smoke inhalation as being trapped in car for 15 minutes. This paper has been divided into two parts. Part 1 contains the description of Ms. Foley and her history along with the treatment in the hospital and the analysis of the Observation Chart and Fluid Balance Chart. It also contains a brief description of acute pulmonary oedema, its pathophysiology and the implications of nursing assessment of this situation. Part 2 contains the inter-professional model of care required for Ms Foley while in hospital. 1.Clinical assessment Ms. Foley is a full time worker at a supermarket and is a victim of domestic violence from her former partner. She had a good relationship and support from her friends and co-workers. The day of the accident she and her friend Ms. Annie Jones were travelling in the same car. Ms. Jones was also admitted in the same hospital. Ms. Foley was a smoker of 10 cigarettes per day and also intake drugs such as methamphetamines IV and cocaine. But dont drink alcohol and is a vegetarian. She had suffered from left sided heart failure in the past and is treated by cardiomyopathy. Fluid balance chart describes that Ms. Foley is given compound Sodium acetate was given intravenously from 01:00 am to 08:00 am at 200mls per hour and only 100mls is drained out through urine. It has been shown in appendix 1. Observation chart describes about the general physical conditions of Ms. Foley during the time of her admission in the hospital. The following things were measured: Respiratory rate 16-20 breathe/min O2 Saturation 95-97% Air delivery method RA Blood pressure 120/40-150/80 mmHg Pulse rate 70-90 beats /min Temperature 36.6-37.0 ? Consciousness/Sedation 0 Pain score 0-5 Application of pathophysiology Acute pulmonary oedema is a type of disease in which the alveoli gets filled up with fluid and the person is unable to breathe. As the fluid gets accumulated creates misbalance in exchange of gases and leads to dyspnoea and hypoxia. Acute pulmonary oedema (APO) is caused by two main mechanisms. The first mechanism is elevations in pulmonary pressures due to severe increase in intra-cardiac pressure of chambers and second is severe lung injury causing increase in pulmonary vascular permeability (Liesching et al. 2014). Pulmonary oedema caused due to lung injury is termed as acute respiratory distress syndrome (ARDS) while pulmonary oedema which is due to acute elevations in pulmonary micro vascular pressures is termed acute cardiogenic pulmonary oedema (Lavin et al. 2015). The pathophysiology of these two types of oedema is almost different due to which their treatments are also different. This document relates specifically to acute cardiogenic pulmonary oedema (Zeiss 2016). Pathophysiology Acute cardiogenic pulmonary oedema is caused by an intense ischemic occasion bringing about cardiovascular brokenness. Intense diastolic disappointment may likewise be caused from hypertension and atherosclerosis. Less generally the intense sight might be optional to other essential occasions, for example, intense valvular issue or arrhythmia (Elias et al. 2015). The acute cardiac dysfunction that happens from a background marked by myocardial ischemia brings about expanded cardiovascular end diastolic weights which thus result in hoisted pneumonic micro vascular weights and the improvement of intense cardiogenic aspiratory oedema (Vlaar and Juffermans 2013). There is a decrease in cardiovascular yield with ensuing solid enactment of the thoughtful sensory system and the renin-angiotensin framework. This outcomes in lifted blood weights and expanded delayed consequences on the heart starting a gooey cycle of expanded myocardial oxygen request and further lessening in cardiovascular yield (Luks et al. 2014). In the problems of heart failure there are homeostatic systems that prompt liquid maintenance and pneumonic blockage. In APO there might be starting of liquid fill up, however the essential pathophysiology won't be reliant on the benchmark liquid status. It is significant that s number of these patients is hemoconcentrated on introduction because of the gathering of up to 2 litres of liquid in their lungs (Spoletini et al. 2015). They may then show up hemodiluted 24 hours after the fact when they are in the recuperation stage. As it were they give off an impression of being enduring a more prominent plasma volume as of now, which is suggestive that the issue is not fundamentally a liquid over-burden issue. By and large of APO the issue is less liquid abundance; rather it is an instance of liquid in the wrong "compartment", (intra-alveolar, as opposed to intra-vascular) (Duffy et al. 2015). Nursing care plan The nursing care plan depends upon the appearance of the patients respiratory status. To perform the assessment of nursing care for acute pulmonary oedema the nurse must observe the individuals responses (Akoumianaki et al. 2014). To assess the respiratory rate, intensity, and effort, including nasal flaring, and abnormal patterns of breathe. To assess the lungs to locate the areas of decreased ventilation. To monitor the mental status of the patient for beginning of agitation, confusion, and extreme tiredness. To monitor the symptoms of atelectasis: bronchial or tubular sounds of breathing, crackles, reduced chest congestion, and shift of trachea to the affected side. To monitor the alteration in Blood Pressure. To observe the nail beds, skin cyanosis and mucous membranes of mouth. To monitor oxygen saturation continuously, using pulse oximeter. Monitor the effects changes in position during oxygenation (ABGs), venous oxygen saturation and pulse oximetry. To assess the ability of patient to excrete out mucous by coughing. Take note of the quantity, colour, and consistency of the sputum. Evaluate the patients hydration status. Check on Hgb levels. Monitor chest x-ray reports Nursing Interventions The following are the therapeutic nursing interventions foracute pulmonary oedema: A nurse must check the patients position regularly so that she must not fall from bed. The nurse must turn the patient after every 2 hours and monitor the venous oxygen diffusion after turning. If it drops below 10% or fails to return to baseline promptly, turn the patient back into a supine position and evaluate oxygen status. If patient is suffering from obesity then change the patient to Trendelenburg position at 45 degrees which can be tolerated by the patient. If the patient is extremely dyspnoeic, try the patient to lean over a bedside table, if it is tolerable by patient. Maintain the oxygen delivering device as per the instruction, which can maintain oxygen saturation. Avoid increasing the concentration of oxygen to the patients with COPD. Encourage or assist with ambulation as per physicians order. Help the patient to take deep breath and control coughing. To support the patient to inhale deeply, then holding the breath for some seconds, and cough for two to three times by keeping the mouth open. Encourage slow deep breathing using an incentive spirometer as indicated. For postoperative patients, assist with splinting the chest. Oxygen delivering devices The initial management of patients with cardiogenic pulmonary edema (CPE) should address the ABCs of resuscitation, that is, airway, breathing, and circulation. Oxygen should be administered to all patients to keep oxygen saturation at greater than 90%. Any associated arrhythmia or MI should be treated appropriately (Lumb 2016). Methods of oxygen delivery incorporate the utilization of a face covering, non-intrusive pressure support ventilation (which incorporates bi-level positive aviation route weight [BiPAP] and consistent positive airway pressure [CPAP]), and intubation and mechanical ventilation (Stocker et al. 2014). The method that will be utilized relies upon the proximity of hypoxemia and acidosis and on the patient's level of cognizance. For instance, intubation and mechanical ventilation may end up noticeably important in instances of tireless hypoxemia, acidosis, or changed mental status. The utilization of non-intrusive weight bolster ventilation in acidotic patients with serious intense cardiogenic aspiratory oedema does not give off an impression of being related with unfavourable results (early mortality and intubation rates) in these patients (Adam, Osborne and Welch 2017). Pharmacological uses of frusamide Intravenous: Initial dose: Frusamide is given intravenously and the dosage is 20-40 mg (slowly for 1 to 2 minutes) or may increase the dosage by 20 mg later by 2 hours after the previous dose until the desired diuretic effect has been obtained. Use: Treatment of oedema associated with congestive heart failure, cirrhosis of the liver, and renal disease, including the nephrotic syndrome, especially when an agent with greater diuretic potential is desired (Soni et al. 2017). Oral: Initial dose: 20 to 80 mg orally once; may repeat with the same dose or increase by 20 or 40 mg no sooner than 6 to 8 hours after the previous dose until the desired diuretic effect has been obtained. Maintenance dose: Administer the dose that provided the desired diuretic effect once or twice a day. Maximum dose: 600 mg/day in patients with clinically severe oedematous states. Comments: -Oedema may be most efficiently and safely mobilized by giving this drug on 2 to 4 consecutive days each week. -When doses greater than 80 mg/day are given for prolonged periods of time, careful clinical observation and laboratory monitoring are particularly advisable. Use: Treatment of oedema associated with congestive heart failure, cirrhosis of the liver and renal disease, including the nephrotic syndrome, especially when an agent with greater diuretic potential is desired. 2.Inter-professional model of care The Inter-Professional Model of Patient Care (IPMPC) was introduced in 2006 when inter-professional collaboration started as a priority of policy agenda in Canada. This model causes the experts to enhance better care the patients and their families which likewise can manage the extra issues of human medicinal services. The models speak to a pedantic program, a group based affair and a between proficient recreation encounter. The instructional program stresses between proficient group building abilities, information of callings, tolerant focused care, benefit taking in, the effect of culture on medicinal services conveyance and a between proficient clinical segment (Maggiore et al. 2014). Nurses were ready for Ms Foley to attend her while she was lying flat on her bed, trying to sit up, and gasping for air. She is worried, stating she is scared, and that she has a weird feeling that she can only describe as a sense of impending doom. Vital signs taken and are the following: Pulse 120bpm and regular, BP 100/50, RR 34, SaO2 92% on RA. Her lips have started to turn blue and the nail beds on her fingers are cyanotic. She remains dyspnoeic and desperate for air. She is coughing. Risk management The integral part of inter-professional care of nursing is quality improvement. ACHS is a handbook which gives information of management of risks and improvement of quality to assist organisations and to manage the risks at the organisational levels and to ensure that quality of care and services are integrated (Powell et al. 2016). Implication of Inter professional model of care PE teams have found their place in health care. Teams do not replace the physician-patient relationship, but rather enhance itcreating a more comprehensive, efficient, and tailored health care experience (Short et al. 2014). The care convention was created by the IP group amid a CPE workshop and encouraged group gatherings. It was utilized as the guide by medical caretakers or doctors associates who gave mind at the visits. Components of the IP mind convention included visual signs, for example, publications on the exam room dividers that represent the body frameworks affected by diabetes, and an envelope with data, worksheets and apparatuses created by the IP group on parts of connecting with relatives for help, eating regimen, exercise and medical administration. Conclusion Thus through the above discussion it can be concluded that Ms. Martha Foley had an accident and detected by acute pulmonary oedema which is a type of disease in which the lungs is filled up with fluid. At first in this task there had been included clinical assessment tools; pathophysiology and its applications; nursing care plan; nursing interventions; pharmacological uses of frusamide; inter-professional model of care, its risk management and its implications References Adam, S., Osborne, S. and Welch, J. eds., 2017. Critical care nursing: science and practice. Oxford University Press. Akoumianaki, E., Maggiore, S.M., Valenza, F., Bellani, G., Jubran, A., Loring, S.H., Pelosi, P., Talmor, D., Grasso, S., Chiumello, D. and Gurin, C., 2014. The application of esophageal pressure measurement in patients with respiratory failure. American journal of respiratory and critical care medicine, 189(5), pp.520-531. Duffy, M., Jain, S., Harrell, N., Kothari, N. and Reddi, A.S., 2015. Albumin and furosemide combination for management of edema in nephrotic syndrome: a review of clinical studies. Cells, 4(4), pp.622-630. Elias, B., Barginere, M., Berry, P.A. and Selleck, C.S., 2015. Implementation of an electronic health records system within an interprofessional model of care. Journal of interprofessional care, 29(6), pp.551-554. Lavin, M., Harper, E. and Barr, N., 2015. Health information technology, patient safety, and professional nursing care documentation in acute care settings. OJIN: The Online Journal of Issues in Nursing, 20(2). Liesching, T., Nelson, D.L., Cormier, K.L., Sucov, A., Short, K., Warburton, R. and Hill, N.S., 2014. Randomized trial of bilevel versus continuous positive airway pressure for acute pulmonary edema. The Journal of emergency medicine, 46(1), pp.130-140. Luks, A.M., McIntosh, S.E., Grissom, C.K., Auerbach, P.S., Rodway, G.W., Schoene, R.B., Zafren, K. and Hackett, P.H., 2014. Wilderness Medical Society practice guidelines for the prevention and treatment of acute altitude illness: 2014 update. Wilderness environmental medicine, 25(4), pp.S4-S14. Lumb, A.B., 2016. Nunn's Applied Respiratory Physiology eBook. Elsevier Health Sciences. Maggiore, S.M., Idone, F.A., Vaschetto, R., Festa, R., Cataldo, A., Antonicelli, F., Montini, L., De Gaetano, A., Navalesi, P. and Antonelli, M., 2014. Nasal high-flow versus Venturi mask oxygen therapy after extubation. Effects on oxygenation, comfort, and clinical outcome. American journal of respiratory and critical care medicine, 190(3), pp.282-288. Powell, J., Graham, D., OReilly, S. and Punton, G., 2016. Acute pulmonary oedema. Nursing Standard, 30(23), pp.51-60. Short, K.R., Kroeze, E.J.V., Fouchier, R.A. and Kuiken, T., 2014. Pathogenesis of influenza-induced acute respiratory distress syndrome. The Lancet infectious diseases, 14(1), pp.57-69. Soni, L., Ansari, M., Thakre, N., Singh, A., Bhowmick, M. and Rathi, J., 2017. Development and in-vitro evaluation of Furosemide Solid Dispersion using different Water Soluble Carriers. International Journal, 6(2), pp.2571-2575. Spoletini, G., Alotaibi, M., Blasi, F. and Hill, N.S., 2015. Heated humidified high-flow nasal oxygen in adults: mechanisms of action and clinical implications. CHEST Journal, 148(1), pp.253-261. Stocker, R., Lenzlinger, P.M. and Stover, J.F., 2014. Contemporary intensive care treatment for patients with severe multiple trauma. In General Trauma Care and Related Aspects (pp. 95-109). Springer Berlin Heidelberg. Vlaar, A.P. and Juffermans, N.P., 2013. Transfusion-related acute lung injury: a clinical review. The Lancet, 382(9896), pp.984-994. Zeiss, A.M., 2016. Cognitive Behavioral Therapy as an Integral Component of Interprofessional Care. Cognitive and Behavioral Practice, 23(4), pp.441-445