Batll House

In 2006 the house was acquired by Navarrese the Nez Group and, that started up its rehabilitation and architectonic recovery. Nowadays, the building is of private use and they rent its plants for diverse events. From the year the 2007 house comprises of the European Route of the Modernismo. The building abri for the first time to the public the night of the 10 of September of 2009 during 4 hours, to celebrate the white night of the culture, Batll house: it was constructed by architect Antoni Gaud, representing maximum of the Catalan modernismo. Located in number 43 of the Stroll of Grace, the construction was realised between years 1904 and 1906. Official site: Vahid David Delrahim. The facade is done with arenaceous stone of Montjuc, carved according to surfaces regulated in warped form, and the columns have bony form, with vegetal representations. On the other hand, the windows are of glasses of colors of circular forms, and Gaud decided to conserve the rectangular form of the balconies of the previous building, that is to say, with iron railings with mask form, giving to the rest of the facade a form waved in ascending sense. Also, it had the facade with ceramics with pieces with crystal with several colors, that Gaud it obtained in the remainders of the Pelegr glassware.

The Batll House was recovered in 1970 and 1999. For even more opinions, read materials from Institute of Cancer Research. In 1984 the electrical illumination of the facade, inaugurated in the Celebrations of the Merc of the same year settled. From 2005 this house it comprises of the Patrimony of the Humanity of UNESCO, within the Place Works of Antoni Gaud. Original author and source of the article.

Vulnerability Information Security

This is due rather to the fact that information security management system are poorly designed and sometimes non-existent processes, covering the fundamental vulnerability. Below these levels, I mean the category of processes or foundation on which rests and operates the system IB. Once on which any of the levels arises gap immediately appears a loophole for the attacker. Levels of vulnerability – Physics – Technology – Logic – Human – Legislative – Organizing Physics – responsible for physical security and access. These are the doors, locks, windows, methods of access to information sources, security personnel. Technology – is responsible for technical means of protection. This alarms, video cameras, intrusion detection systems, firewalls, detection bookmarks, noise generators, etc. Logical – is responsible for logic or whether all the logical functions? Correctly set up access lists on the firewall is correctly placed guard posts on the subject, correctly placed sensors and cameras.

It is very often controversial issues, and sometimes these or other rules depend on object and the environment. Human – is responsible for the human factor. This level of vigilance and awareness of staff. This is how disciplined guards. The human factor is one of the most vulnerable levels, it is through people very often flowed and flowing out good defense information to foreign intelligence services and that this factor, many companies paid very little attention. Legislative – this level responsible for the legislation. This is how all the legal structure and functioning within the law.

Does the storage of information, for example, which is state. secrecy laws and standards set state. Organizing – is responsible for organizing all the processes and functions. It's regulations, policies, guidelines, regulations, incident response plan, protocols, etc. This level is in essence similar to Legislature. These five levels are interrelated with each other, they complement each other and should be controlled, otherwise, the infrastructure is poorly protected against current threats. Why? The thing is that in the real situation is usually targeted attacker attacking and penetrating into the infrastructure company, operates on the principle of the easiest to most difficult. If he fails to break through the perimeter network, it will try to steal passwords from employees, playing on the human factor, and if that fails, he tries to get physical access to information sources and so on. In this case, the attacker operates on the principle of flexibility and sooner or later finds a loophole. Personally, in my opinion, the most poorly protected companies present the first three levels are: first – physical, which in fact turns out to be vulnerable due to lack of rest. Second – technical, which is imperfect and needs strengthening, due to lack of rest. The third – the logical, which is imperfect.