Professional Documents
Culture Documents
Chapter 5
Protecting Information Resources
Learning Objectives
Information technologies can be misused to invade users’ privacy and commit computer crimes.
However, one can minimize or prevent many of these risks by installing operating system
updates regularly, using antivirus and antispyware software, and using e-mail security features
Hackers, computer criminals, and cyber criminals, both domestic and international, could cost
2
the U.S. economy over $100 billion and 500,000 jobs per year. The costs will include stolen
identities, intellectual property, and trade secrets as well as the damage done to companies’
and individuals’ reputations. Job losses would include manufacturing jobs as well as jobs
where stolen trade secrets and other intellectual properties resulted in jobs being moved
overseas.
Spyware is software that secretly gathers information about users while they browse the Web.
This information could be used for malicious purposes. Spyware can also interfere with users’
control of their computers. To protect against spyware, one should install antivirus software
that also checks for spyware or one should install antispyware software, such as Spy Sweeper,
CounterSpy, STOPzilla, and Spyware Doctor.
Adware is a form of spyware that collects information about the user (without the user’s
consent) to determine which advertisements to display in the users Web browser. In addition
to antivirus software, an ad-blocking feature should be installed in the Web browser to protect
against adware.
Phishing is sending fraudulent e-mails that seem to come from legitimate sources, such as a
bank or university. Pharming is similar to phishing in that Internet users are directed to
fraudulent Web sites with the intention of stealing their personal information, such as Social
Security numbers, passwords bank account numbers, and credit card numbers. The difference
is that pharmers usually hijack an official Web site address by hacking a Domain Name
System server, then alter the legitimate Web site IP address so that users who enter the correct
Web address are directed to the pharmer’s fraudulent Web site.
D. Keystroke Loggers
Keystroke loggers monitor and record keystrokes and can be software or hardware devices.
Sometimes, companies use these devices to track employees’ use of e-mail and the Internet,
and this use is legal. Keystroke loggers can be used for malicious purposes, too, such as
collecting the credit card numbers that users enter while shopping online.
Sniffing is capturing and recording network traffic. Although it can be done for legitimate
reasons, such as monitoring network performance, hackers often use it to intercept
3
Computer fraud is the unauthorized use of computer data for personal gain, such as
transferring money from another’s account or charging purchases to someone else’s account.
In addition to phishing, pharming, and spoofing, computer crimes include the following:
• Denial-of-service attacks
• Identity theft
• Software piracy and other infringements of intellectual property
• Distributing child pornography
• E-mail spamming
• Writing or spreading viruses, worms, Trojan programs, and other malicious code
• Stealing files for industrial espionage
• Changing computer records illegally
• Virus hoaxes
In some cases computer criminals and hackers get hold of a company’s critical data and then
ask for ransom. In recent years, ransomware has been created, which is a type of malware
designed to block access to a computer system until a sum of money is paid.
In-Class Activity
Prior to class, ask students to use a computer system to identify different security breaches
that they might encounter in the virtual world. These breaches can be as minor as an email
breach (spam mails) and as major as an industrial espionage. Students should also make a list
of software that can filter spam while accessing the Internet to avoid a security breach.
Discussion Question
With the advancements in technology, can one expect computer crimes to diminish or will
this help perpetrators of computer crimes to flourish?
4
Computer and network security has become critical for most organizations, especially in recent
years, with hackers becoming more numerous and more adept at stealing and altering private
information. A comprehensive security system protects an organization’s resources, including
information, computer, and network equipment. The information an organization needs to protect
can take many forms: e-mails, invoices transferred via electronic data interchange (EDI), new
product designs, marketing campaigns, and financial statements.
These three aspects are collectively referred to as the CIA triangle. The Committee on National
Security Systems (CNSS) has proposed another model, called the McCumber Cube. John
McCumber created this framework for evaluating information security. Represented as a three-
dimensional cube, it defines nine characteristics of information security. This model includes the
different states in which information can exist in a system: transaction, storage, and processing.
When planning a comprehensive security system, the first step is designing fault-tolerant
systems, which use a combination of hardware and software for improving reliability—a way of
ensuring availability in case of a system failure. Commonly used methods include the following:
• Uninterrupted power supply (UPS)—this backup power unit continues to provide electrical
power in the event of blackouts and other power interruptions and is most often used to
protect servers.
• Redundant array of independent disks (RAID)—this is a collection of disk drives used to
store data in multiple places.
5
• Mirror disks—this method uses two disks containing the same data; if one fails, the other is
available, allowing operations to continue.
In-Class Activity
Students can use the Internet to research about different firms that have faced security
breaches. The class can then discuss the firms’ vulnerabilities and why they failed in
maintaining the essential safeguards in computer and network security?
Discussion Question
Why has computer and network safety become critical for most organizations? Can hacking
be ethical?
Computer and network security are important to prevent loss of, or unauthorized access to,
important information resources. Some threats can be controlled completely or partially, but
some cannot be controlled. Threats can also be categorized by whether they are unintentional
(such as natural disasters, a user’s accidental deletion of data, and structural failures) or
intentional.
A. Intentional Threats
Intentional computer and network threats include viruses, worms Trojan programs, logic
bombs, backdoors, blended threats (e.g., a worm launched by Trojan), rootkits, denial-of-
service attacks, and social engineering.
Viruses
Viruses are the most well-known computer and network threats. They are a type of
malware (short for malicious software), which is any program or file that is harmful to
computers or networks.
hoaxes can cause as much damage as real viruses. Installing and updating an antivirus
program is the best measure against viruses. Widely used antivirus programs include
McAfee Virus Scan, Norton Antivirus, and Trend Micro.
Worms
A worm travels from computer to computer in a network, but it does not usually erase
data. It might corrupt data, but it usually replicates itself into a full-blown version that eats
up computing resources, eventually bringing a computer or network to a halt.
Trojan Programs
A Trojan program contains code intended to disrupt a computer, network, or Web site,
and it is usually hidden inside a popular program. These programs can erase data and
wreak havoc on computers and networks, but they do not replicate themselves, as viruses
and worms do.
Logic Bombs
A logic bomb is a type of Trojan program used to release a virus, worm, or other
destructive code. They are triggered at a certain time or by specific event, such as a user
pressing the Enter key or running a certain program.
Backdoors
A backdoor (also called a trapdoor) is a programming routine built into a system by its
designer or programmer. This routine enables the designer or programmer to bypass
system security and sneak back into the system later to access programs or files.
Blended Threats
A blended threat is a security threat that combines the characteristics of computer viruses,
worms, and other malicious codes with vulnerabilities found on public and private
networks. They may launch a worm through a Trojan horse or launch a denial-of-service
(DoS) attack at a targeted IP address. Their goal is not just to start and transmit an attack
but to spread it.
Denial-of-Service Attacks
prevent legitimate user’s access to the system. Typically, DoS attackers target Internet
servers (usually Web, FTP, or mail servers), although any system connected to the Internet
running TCP services is subject to attack.
Recently, emergency-service providers and many other organizations have been targeted
by a new type of DOS attack, called a TDoS (telephony denial of service) attack. These
attacks use high volumes of automated calls to tie up a target phone system, halting
incoming and outgoing calls.
Social Engineering
In the context of security, social engineering means using “people skills”—such as being a
good listener and assuming a friendly, unthreatening air—to trick others into revealing
private information. Social engineers use a variety of tools and techniques to gather private
information, including publicly available sources of information—Google Maps, company
Web sites, newsgroups, and blogs, for example.
In addition, two commonly used social engineering techniques are called dumpster diving
and shoulder surfing. Social engineers often search through dumpsters or trash cans
looking for discarded material (such as phone lists and bank statements) that they can use
to help break into a network. Shoulder surfing—that is, looking over someone’s shoulder is
the easiest form of collecting information. Social engineers use this technique to observe
an employee entering a password or a person entering a PIN at an ATM, for example.
In-Class Activity
Ask students to gather information about two famous security threats that the world has
witnessed. Were these threats intentional or unintentional? Have students discuss how these
threats were controlled.
Discussion Question
In the context of computer network security, identify some measures that can protect against
data theft and data loss. Do technological advancements act as a boon or bane in protecting
data?
Biometric security measures use a physiological element that is unique to a person and
cannot be stolen lost, copied, or passed on to others. The following list describes some
biometric devices:
• Facial recognition
• Fingerprints
• Hand geometry
• Iris analysis
• Palm prints
• Retinal scanning
• Signature analysis
• Vein analysis
• Voice recognition
Some drawbacks of biometrics are high cost, users’ reluctance, and complex installation.
However, with improvements being made to address these drawbacks, biometrics can be a
viable alternative to traditional security measures.
The three main biometric measures are called back modems, firewalls, and intrusion detection
systems.
Callback Modems
A callback modem verifies whether a user’s access is valid by logging the user off (after
he or she attempts to connect to the network) and then calling the user back at a
predetermined number.
Firewalls
the network. Information being transmitted is stored in what’s called a packet, and after
examining a packet, a firewall can take one of the following actions:
• Reject the incoming packet
• Send a warning to the network administrator
• Send a message to the packet’s sender that the attempt failed
• Allow the packet to enter (or leave) the private network
Application-filtering firewalls are generally more secure and flexible than packet-filtering
firewalls, but they are also more expensive. Typically, they are software that is installed on
a host computer (a dedicated workstation or server) to control use of network applications,
such as e-mail, Telnet, and FTP. Application-filtering firewalls also filter viruses and log
actions more effectively than packet-filtering firewalls, which helps network administrators
spot potential security breaches.
Although firewalls can do a lot to protect networks and computers, they do not offer
complete security. To provide comprehensive security for data resources, firewalls should
be used along with other security measures. Other guidelines for improving a firewall’s
capabilities include the following:
• Identify what data must be secured, and conduct a risk analysis to assess the costs
and benefits of a firewall
• Compare a firewall’s features with the organization’s security needs
• Compare features of packet-filtering firewalls, application-filtering firewalls, and
proxy servers to determine which of these types addresses a user’s network’s security
needs the best
• Examine the costs of firewalls
• Compare the firewall’s security with its ease of use
• Check the vendor’s reputation, technical support, and update policies before making
a final decision
10
Another alternative is to build a firewall instead purchasing one. This option might be more
expensive.
An intrusion detection system (IDS) can protect a network against both external and
internal access. It is usually placed in front of a firewall and can identify attack signatures,
trace patterns, generate alarms for the network administrator, and cause routers to
terminate connections with suspicious sources. An IDS monitors network traffic and uses
the “prevent, detect, and react” approach to security. Although it improves security, it
requires a great deal of processing power and can affect network performance.
Physical security measures primarily control access to computers and networks, and they
include devices for securing computers and peripherals from theft. Common physical
security measures can include the following:
• Cable shielding
• Corner bolts
• Electronic trackers
• Identification (ID) badges
• Proximity-release door openers
• Room shielding
• Steel encasements
D. Access Control
Access controls are designed to protect systems from unauthorized access in order to preserve
data integrity.
Terminal resource security is a software feature that erases the screen and signs the user off
automatically after a specified length of inactivity. Some programs also allow users to
access data only during certain times, which reduces break-in attempts during off hours.
Passwords
A virtual private network (VPN) provides a secure “tunnel” through the Internet for
transmitting messages and data via a private network. Data is encrypted before it is sent
through the tunnel with a protocol, such as Layer Two tunneling Protocol (L2TP) or Internet
Protocol Security (IPSec). VPNs are an alternative to private leased lines or dedicated
Integrated Services Digital Network (ISDN) lines and Tl lines.
F. Data Encryption
Data encryption transforms data, called plaintext or cleartext, into a scrambled form called
ciphertext that cannot be read by others. The rules for encryption, known as the encryption
algorithm, determine how simple or complex the transformation process should be. The
receiver then unscrambles the data by using a decryption key.
A commonly used encryption protocol is Secure Sockets Layer (SSL), which manages
transmission security on the Internet. A more recent cryptographic protocol is Transport
Layer Security (TLS), which ensures data security and integrity over public networks, such
as the Internet.
A PKI (public key infrastructure) enables users of a public network such as the Internet to
securely and privately exchange data through the use of a pair of keys—a public one and a
private one—that is obtained from a trusted authority and shared through that authority.
Asymmetric encryption uses two keys: a public key known to everyone and a private or
secret key known only to the recipient. A message encrypted with a public key can be
decrypted only with the same algorithm used by the public key and requires the recipient’s
private key, too. The main drawback of asymmetric encryption is that it is slower and requires
a large amount of processing power.
In symmetric encryption (also called secret key encryption), the same key is used to encrypt
12
and decrypt the message. The sender and receiver must agree on the key and keep it secret.
The problem with symmetric encryption is that sharing the key over the Internet is difficult.
Encryption can also be used to create digital signatures that authenticate senders’ identities
and verify that the message or data has not been altered. One encrypts a message with one’s
private key and uses an algorithm that hashes the message and creates a message digest. The
message digest cannot be converted back to the original message, so anyone intercepting the
message cannot read it. Then one can use the private key to encrypt the message digest, and
this encrypted piece is called the digital signature.
The user then sends the encrypted message and digital signature. The recipient uses the public
key to decrypt the message, and then uses the same algorithm that was used to hash the
message and create another version of the message digest. Next, the recipient uses the public
key to decrypt the digital signature and gets the message digest that was sent. The recipient
then compares the two message digests. If they match, the message was not tampered with
and is the same as the one that was sent.
The Computer Emergency Response Team (CERT) was developed by the Defense Advanced
Research Projects Agency (part of the Department of Defense) in response to the 1988 Morris
worm attack, which disabled 10 percent of the computers connected to the Internet. Currently,
CERT focuses on security breaches and DOS attacks and offers guidelines on handling and
13
In addition, the Office of Cyber Security at the Department of Energy offers a security
service, Cyber Incident Response Capability (CIRC). CIRC’s main function is to provide
information on security incidents, including information systems’ vulnerabilities, viruses, and
malicious programs.
In-Class Activity
Discussion Question
Ask students to type a message that they want to send across. Students should prepare an
As biometric security measures use physiological elements that are unique to an individual,
algorithm of their own to encrypt this message. The instructor can show the students a simple
can one rely completely on these methods for a comprehensive security system? Are
substitution algorithm in which each letter in the original message is replaced by a letter that
individuals using these methods safe from security breaches?
is placed three positions farther in the alphabet. For example, the word “top” is transmitted as
“wrs.” Students should use the algorithm mentioned above as a reference to create their own
algorithm.
An organization’s employees are an essential part of the success of any security system, so
training employees about security awareness and security measures is important. In addition,
making sure management supports security training is important to help promote security
awareness throughout the organization.
Organizations should understand the principles of the Sarbanes-Oxley Act of 2002 and conduct a
basic risk analysis before establishing a security program. This analysis often makes use of
financial and budgeting techniques, such as return on investment (ROI), to determine which
resources are most important and should have the strongest protection. This information can also
help organizations weigh the cost of a security system.
To lessen the effects of a natural disaster or a network attack or intrusion, planning the
recovery is important. This should include business continuity planning, which outlines
procedures for keeping an organization operational. A disaster recovery plan lists the tasks
that must be performed to restore damaged data and equipment as well as steps to prepare for
disaster.
If disaster strikes, organizations should follow these steps to resume normal operations as
soon as possible:
14
In-Class Activity
Ask students to write a paper on how natural disasters affect the data system of a firm.
Students can cite examples from the past to show the extent of the damages faced by a firm
and the measures it took to recover from the disaster.
Discussion Questions
What role do the employees of an organization play in achieving a strong security system?
How can one keep an organization operational when disaster strikes?
Key Terms
Spyware is software that secretly gathers information about users while they browse the Web.
(P.90)
Adware is a form of spyware that collects information about the user (without the user’s
consent) to determine which advertisements to display in the user’s Web browser. (P.90).
Phishing is sending fraudulent e-mails that seem to come from legitimate sources, such as a
bank or university. (P.90)
Pharming is directing Internet users to fraudulent Web sites with the intention of stealing their
personal information, such as Social Security numbers, passwords, bank account numbers, and
credit card numbers. The difference is that pharmers usually hijack an official Web site address,
then alter its IP address so that users who enter the correct Web address are directed to the
pharmers’s fraudulent Web site. (P.90).
15
Keystroke loggers monitor and record keystrokes and can be software or hardware devices.
(P.90)
Computer fraud is the unauthorized use of computer data for personal gain. (P.90).
Confidentiality means that a system must prevent disclosing information to anyone who is not
authorized to access it. (P.93)
Availability means that computers and networks are operating, and authorized users can access
the information they need. It also means a quick recovery in the event of a system failure or
disaster. (P.93)
A virus consists of self-propagating program code that is triggered by a specified time or event.
When the program or operating system containing the virus is used, the virus attaches itself to
other files, and the cycle continues. (P.94)
A worm travels from computer to computer in a network, but it does not usually erase data.
Unlike viruses, worms are independent programs that can spread themselves without having to
be attached to a host program. (P.95)
A Trojan program contains code intended to disrupt a computer, network, or Web site, and it is
usually hidden inside a popular program. Users run the popular program, unaware that the
malicious program is also running in the background. (P.95)
A logic bomb is a type of Trojan program used to release a virus, worm, or other destructive
code. Logic bombs are triggered at a certain time (sometimes the birthday of a famous person) or
by a specific event, such as a user pressing the Enter key or running a certain program. (P.96)
A backdoor (also called a trapdoor) is a programming routine built into a system by its designer
or programmer. It enables the designer or programmer to bypass system security and sneak back
Another random document with
no related content on Scribd:
CHAPTER IX
NEWS
After looking out upon the garden from where she stood upon the
porch, Cassy decided that she would like to be by herself for a while
and think over all that had been taking place. So she stole down the
long path to a little corner sheltered by trees on one side and by tall
bushes on the other.
Into this little hiding-place she crept and lay down with face
upturned towards the leaves and branches overhead. There was an
empty nest among the branches, and there were all sorts of
creeping, crawling things at hand to amuse and interest her. A fuzzy
caterpillar, with a funny face, looked over the side of a leaf at her; a
nimble spider spun a web from twig to twig; a busy colony of ants
near by ran back and forth as if the affairs of the nation had to be
settled. John had told her many things about the ants, and he had
been as interested as she in a family of spiders.
“And he is my uncle. Think of it,” she said, winking her eyes at the
caterpillar. “I don’t suppose you care about your relations because
you have to have such lots and lots of them, but I care. You couldn’t
have as nice a one as my Uncle John if you tried. Uncle John, Uncle
John; how nice that sounds. What will Rock say? And Eleanor, and
oh dear, there’s so much I haven’t heard about yet. I wish they’d
hurry up and tell me. I wish little girls could hear every blessed thing
that grown people talk about. I wonder if my mouse is at home. I
think I’ll go and see.”
She jumped up and ran to the tool-house. After opening the door
softly she stood inside whistling and chirruping in a gentle way, and
after some patient waiting she saw a little mouse come creeping out.
Then she gently opened a small tin box and took some crumbs from
it; these she held in her hand, crouching on the ground as she did
so, and after a little while the mouse came nearer, and finally crept
upon her hand, eating the crumbs confidently and stopping once in a
while to look at her with round bright eyes. She heard the whir, whir
of the lawn-mower outside, and then the sound stopped and she
lifted her head to listen, for she heard a voice say: “Where is Cassy?
I can’t find her anywhere.”
The little mouse paused in its meal, and as a shadow darkened
the door it leaped from Cassy’s hand and went scudding across the
floor, but not before it was seen by some one who was entering.
“Well, Miss Oddity,” cried a voice. “I might know you’d be off hiding
somewhere playing with a mouse or a spider or something.”
Cassy was so happy that she did not resent this but replied,
laughing: “Well, Miss Morning-Glory, you’ve scared my mouse away,
you see.”
“Yes, I am sorry I did. I wish I had crept up softly to see you feed it.
How tame it is, but ugh! I don’t believe I’d like a mouse crawling on
me.” And Eleanor stepped in, looking very pretty in her white dress
and broad-brimmed hat. “I came down with papa this morning,” she
said. “Mamma and I came, and Rock and Uncle Heath. Mamma and
papa have gone back, and I am going to stay all night, for I have to
go to the dentist’s in the morning.”
“Are you going to stay here?”
“Yes, if your mother doesn’t mind.”
“Oh, I know she won’t, and I shall be so glad. Will Rock stay, too?”
“Yes. He is down town now and will be here after a while.”
“Have you heard the news?” asked Cassy.
“What? About the money? Yes, but isn’t it too bad that it isn’t
more? Papa says that Uncle Heath did his best, but he was only one
against many, and that it was the best that could be done.”
“It is much better than nothing,” said Cassy, repeating her mother’s
words. “But I didn’t mean that news so much as the other about—but
never mind now, let’s wait till Rock comes, and then I can tell you
both. It’s the most of a s’prise you ever heard; it’s just wonderful.”
“You might tell me first. I won’t tell Rock.”
Cassy shook her head.
“No, I must wait.” She could be very determined sometimes, and
Eleanor soon saw that there was no use in insisting.
“You are not going back to Orchard Street, I hope,” said the latter.
“No, indeed, mother says we are not.”
“I know something, too,” said Eleanor. “Aunt Dora isn’t coming
back to the city till November, so you can stay here till then if you
want to.”
“That is more good news, but if—— Oh, dear, I wish Rock would
come. I can hardly keep my secret.”
“I wish you’d just make out I’m Miss Morning-Glory, and then you’d
be sure to tell me.”
“I don’t see so much of Miss Morning-Glory nowadays,” Cassy
confessed. “I have so many things to do, and I think she’s in the
country a great deal in the summer.” She spoke very seriously, and
Eleanor laughed.
“You funny girl! You are as funny as Bubbles. I wish you could see
Bubbles, our little colored girl, you know; and I wish—oh, dear, I was
so in hopes you were going to have a cottage near us. Rock told me
he had picked one out for you.”
“Tell me about it.”
“Well, it stands by itself just a little way out of our town. It is a
country town, you know, with trees and gardens, and there are
woods very near the cottage, and it has a big field next to it. There’s
a little brook runs through the field and on into the woods.”
“Oh,” sighed Cassy, “how lovely! Is it a little, little cottage?”
“Not so very, very little; it has eight rooms, I think.”
“I’m afraid that’s much too big; but it’s nice to hear about it. Mother
said—oh, dear, there I go again. Come, I want to show you such a
dear little hiding-place I have under the bushes. I don’t believe you
ever found it. Isn’t it too queer for anything that I should be living
here all summer, when I always longed just to get behind these
garden walls?”
“Yes, but we all think it is fine to have you.”
“I never, never expected to be so happy as I have been here.”
“And don’t you like John McClure?”
Cassy laughed, a pleased, half-embarrassed little laugh, and
Eleanor looked at her, puzzled.
“What makes you laugh that way?”
“Because. Oh, just because——”
“I hear Rock’s whistle.”
They ran up the walk down which Rock was coming. “Here we
are,” cried Eleanor. “Hurry, Rock, Cassy has something to tell you.”
“I know,” he returned as he came near. “Father told me.”
“No, I don’t believe you do know it,” Eleanor declared. “It is not the
railroad money; it is something else.”
“What is it?” Rock had come up to them.
Cassy clasped her hands tightly and looked from one to the other.
“John McClure is my truly uncle.”
“I don’t believe it,” cried Eleanor. “You are joking. How can he be?”
“He is truly, my owny downy uncle.”
“He can’t be your father’s brother because his name is McClure,”
said Rock.
“He isn’t my father’s brother; he is my mother’s.”
“You told me your name was Catherine Kennedy after your
grandmother, and that your mother’s name was Kennedy before she
was married,” said Eleanor severely.
“He might be a stepbrother,” suggested Rock.
“But he isn’t; he is my mother’s own brother, and his real name is
Kennedy.”
“Not McClure?” exclaimed Rock and Eleanor at once.
“No, he changed his name. Oh, it’s a long story. Come over here in
my corner and I’ll tell you.”
They followed her readily, being quite eager to hear more of this
strange matter, and she told her story to two very interested
listeners.
“Whew!” exclaimed Rock, when she had concluded. “It is like a
story-book. Isn’t it the queerest thing, Dimple? Father always said
that there was a history connected with John McClure and that he
was out of place in this position.”
“But I haven’t found out yet what entail means,” said Cassy,
soberly.
“I can tell you,” Rock informed her. “It’s not letting property go out
of the family. It goes down from father to son, and it can’t be sold by
one person because it has to go to his son. That’s why John comes
by your grandfather’s property; it would have gone to his father if he
had lived, and then down to John.”
“But he can sell it; he is going to.”
“Then the entail stops with him; it is that way sometimes. I can’t
explain it exactly, but anyhow when a place is entailed it can’t be
sold or left by will to any one but the next in descent, and John is the
next in descent so it comes to him. Entail means to cut off, to
abridge; I looked it up one day.”
“I thought it meant to put a tail on,” said Cassy.
Rock laughed.
“Never mind what it means; you can study it up when you’re older.
I am mighty glad for John. I must go and tell him so. And I’m glad for
you, Cassy. It is a good deal to happen in one day. Where is Jerry?
What does he think of it?”
“He’s glad, of course. I don’t know just where he is. He came out
here after dinner but I suppose he’s with the boys. He does stay in a
great deal more than he used to, but he gets tired of not having boys
to play with. If he knew you were here he’d be back quick enough.”
“And don’t you get tired of not having girls?” Rock asked.
“I do have,” Cassy returned, in all seriousness. To her mind if Flora
and Miss Morning-Glory were not girls she would like to know who
were.
“I think I’ll go hunt up Jerry after I have seen John,” said Rock, as
he walked off.
Left to themselves the two little girls talked till Mrs. Law called
them. They found Martha on hand, Mr. Dallas having very
thoughtfully sent for her.
“You will have too much of a houseful, Mrs. Law,” he said, “and if
we are all to be looked after you will need more than one pair of
hands. Besides, you and your brother will have much to say to each
other. I am sorry I must lose the best man we ever had, but I am glad
for you all.”
Such an exciting time never was. All this houseful of people, an
old friend suddenly appearing as an unknown and unlooked for
uncle, and besides this all that about the money that had been that
day received. Any one of these things would be enough to excite any
child, but take them all together and it was too much for one of
Cassy’s imaginative temperament. Long after every one else in the
house was fast asleep she lay with wide open eyes.
Finally she decided that she would get up and go out on the porch
which led from the room. She put on her shoes and stockings and
wrapping a blanket around her, for the September night was chill,
she crept out on the porch. The moon was on the wane and was not
shining very brightly. In the trees the insects were keeping up a noisy
chirping. Cassy looked down into the shadowy depths of the garden.
The large white moon-flowers shone out of the green around her and
sent up a faint sweet odor.
“You ought to be called night-glories,” Cassy whispered to them.
“That is what I should call you.”
Presently she saw down in the garden below her a man’s figure,
pacing up and down the long walk.
“It is Uncle John,” she said, “and he can’t sleep either. I wonder
what he is thinking about, and if he is lonely down there.” She
thought she would like to go down to him, but she was a little afraid
to grope her way through the dark house, so she leaned over the
railing of the porch and when he came near she called him softly.
He came and stood under where she was.
“What are you doing up this time of night, you little witch?” he
asked.
“I couldn’t sleep and I thought I’d like to see how the world looked
in the night-time; ’way in the night like this.”
“Would you like to come down here with me and see?”
“Yes, indeed I would.”
He went a little aside and brought a long ladder up which he
climbed, and lifting her over the railing, he carried her down pick-a-
back.
“There,” he said, when they had reached the ground, “we’ll take a
turn around the garden. Are you wrapped up good and warm?”
“Almost too warm, in this blanket. Do I look like an Indian?”
“You might look like almost anything in this light, but I don’t think
your costume will do to walk in.” He took her up in his arms, although
she protested that she was too heavy. “If I couldn’t carry a mite like
you I’d be a poor stick,” he told her, and he bore her off under the
trees, down this path, and up that, between hedge-rows and past
flower borders, telling her of the moths, the katydids and of all the
night creatures; of flowers that went to sleep and of those that were
awake only after the sun went down.
After a while Cassy asked, “What were you thinking of, Uncle
John, when you were walking, walking up and down?”
“Of many things; of my boyhood and of——” he paused, “my little
baby girl asleep forever out there in Australia.”
“Oh!” Cassy held him closer. “I didn’t know. Oh, Uncle John, I am
so sorry and I love you very much.”
He kissed her.
“Dear little lassie, that too, was what I was thinking of. It is a great
thing to me, who thought himself alone in the world, to find suddenly
that he has those who are his own flesh and blood, and who are his
friends already.”
“We will live together always, won’t we?”
“I hope so.”
“And when you come back, what will you do?”
“I will pick you all up and carry you off with me to a home of our
own.”
“Oh! Oh!”
“I’ve been thinking of it and I believe I love a garden better than
most things, and so I think I will be a florist. I have studied up the
subject pretty well.”
“And you’ll have——”
“Greenhouses and all sorts of flowers.”
“And will we live close to them?”
“I haven’t a doubt but that we will.”
Cassy dropped her head on his shoulder.
“I think that is the loveliest plan I ever heard of. I am so glad I
didn’t go to sleep, for if I had I wouldn’t have come out here to have
you tell me about it.”
“I think it is time you were going in. You will be too sleepy to get up
to-morrow and Miss Eleanor is here, so you will not want to lie abed.
I’ll take you back now and you must try to go to sleep so as to be up
to breakfast to-morrow.”
Cassy promised, and he carried her back. For awhile she lay in
bed listening to the sound of the insects, and then she fell asleep.