Search Results

Free Essays
Unrated Essays
Better Essays
Stronger Essays
Powerful Essays
Term Papers
Research Papers

Your search returned over 400 essays for "Security"
1  2  3  4  5    Next >>

These results are sorted by most relevant first (ranked search). You may also sort these by color rating or essay length.

Title Length Color Rating  
Why is ‘security’ such a contested concept? - Why is ‘security’ such a contested concept. The foreign, military and economic policies of states, the intersections of these policies in areas of change or dispute, and the general structure of relations which they create, are all analysed in terms of aspirations to achieve national and/or international security. Security is most commonly associated with the alleviation of threats to cherished values (Williams; 2008). However this is a definition that is undesirably vague and a reflection of the inherent nature of security as an ‘essentially contested concept’ (Gallie; 1962)....   [tags: Security]
:: 7 Works Cited
785 words
(2.2 pages)
Better Essays [preview]
IT Security - Denial of service (DoS)- This type of attack occurs when a hacker overloads a server or network device with numerous IMCP (Internet Control Message Protocol) ping requests, such that it is unable to respond to valid requests. By updating to the latest service pack and applying security patches, you can minimize the threat of DoS attacks by reducing the vulnerabilities in the TCP/IP network protocol. Although disabling ICMP can remove valuable troubleshooting tools, it can effectively remove the possibility of DoS attacks....   [tags: Cyber-security, Enterprise Security]
:: 4 Works Cited
3468 words
(9.9 pages)
Research Papers [preview]
Singapore Hotel Security Conference - A Hotel Security Conference 2007 was held in Singapore with the Senior Minister of State for Law and Home Affairs of Singapore addressing the public, and highlighting the need to enhance building security especially hotels. Ho (2007) has specially mentioned in this forum the usage and to incorporate CPTED considerations in future building or redevelopment plans, and as early as possible in all building design plan. He further mentioned that this approach will make security and criZXCxcsDDvcwvme prevention activity much more effective in the long term....   [tags: Security ] 1285 words
(3.7 pages)
Strong Essays [preview]
Security Management Models for Information Systems - Background Security management within the context of information systems “needs a paradigm shift in order to successfully protect information assets” (Eloff & Eloff, 2003). Due the rapid increase in information security threats, security management measures have been taken to proactively remedy the growing threat facing information security. As a result of this, security management “is becoming more complex everyday, many organization’s security systems are failing, with serious results” (Fumey-Nassah, 2007)....   [tags: Security ]
:: 5 Works Cited
1081 words
(3.1 pages)
Strong Essays [preview]
Finding the Balance Between Privacy and Security - Clearly, the United States is in unfamiliar territory when it comes to combat- ing counter-terrorism with technology. The founding fathers could not foresee the technological advances, and the complications that arose from them. Under- standably, the United States law enforcement is having a rough time reconciling the constitutional rights a orded to its citizens, while protecting them from a terrorist threat. Initially, the government struggled with this balance. What brought these laws on in the rst place was the lack of balance; security dominated privacy during the Vietnam War to an unacceptable point....   [tags: Security] 1785 words
(5.1 pages)
Powerful Essays [preview]
A Survey on NEMO Security: Threats and Solutions - If the mobile node moves out of its home network, it starts searching a new router called access router to provide service from the visited network. With the help of AR the mobile node will maintain connectivity with its home agent. But if the mobile node joins with a new network, topologically it’s not possible to maintain the address assigned by the home network. So a new address called Care of Address will be assigned by the AR, then the mobile node has to send an update to its home agent about its new care of address....   [tags: Security ]
:: 1 Works Cited
1234 words
(3.5 pages)
Strong Essays [preview]
Computer Security Against Viruses and Hacking - Viruses, worms, Trojan horses, and hacking are all security issues in our computer network. Each of these malwares or programs attaches and spreads in different ways. Through hacking hackers can infect computers with various types or malware and viruses. This paper will explain what viruses are, how it occurs and the types of cybercrimes that can result from it, and how to better protect your computer. “Security warning. Application cannot be encrypted or Spyware alert. Your computer is infected by spyware....   [tags: Security ]
:: 11 Works Cited
1625 words
(4.6 pages)
Powerful Essays [preview]
The Department of Homeland Security and Border Security - Over the course of the history of the United States of America, the country has had struggles with its own borders and the protection of those borders. Illegal immigration is a big problem and the smuggling of drugs, weapons, and cash over our borders into our country has evolved into a bigger problem. The United States has over seven-thousand miles of border to cover each day. That is quite a bit of land, but the only problem with this is there is a lack of manpower to cover every single mile of border....   [tags: Homeland Security]
:: 3 Works Cited
1130 words
(3.2 pages)
Strong Essays [preview]
Cloud Computing Security - Managing the security of an Electronic Medical Record (EMR) system in a cloud computing environment can be challenging. Even without the addition of the cloud computing environment, the EMR system is vulnerable to the compromise of login information, unauthorized viewing or editing of medical records, and denial of service attacks. First of all, the data contained within the Electronic Medical Record (EMR) itself is sensitive. Inside the structure of an EMR, one is potentially looking to find patient data that pertains to identity, billing information, dentistry, cardiology, dermatology, mental health, and physical attributes among other forms of data....   [tags: Security ]
:: 7 Works Cited
1119 words
(3.2 pages)
Strong Essays [preview]
Security Cooperation Brigades - Sydney J. Freedberg Jr. in the “The Military’s New Hybrid Warriors” suggests that splitting the U.S. Army into two separate distinct types of units, one for conventional warfare and one for stabilization operations, would better prepare our unit for future conflicts. The creation of dedicated “Security Cooperation Brigades” are unnecessary and will degrade the U.S. Army’s ability to wage full spectrum operations and defeat future threats. The splitting of the Army is not necessary because of the idea of “Full Spectrum Operations” allowing our unit to train and prepare themselves to work in numerous types of environments....   [tags: Security ]
:: 14 Works Cited
1506 words
(4.3 pages)
Powerful Essays [preview]
Physical Security - Physical Security Physical security could be thought of as a very important piece of security. Just because you apply many different policies to have a lockdown on the software environment, it doesn’t mean that people are not able to just go in and inflict damage upon your network. Physical security is the measures to prevent or deter attackers from trying to gain access into the facility. With FTD Enterprises they have none to barely any physical security in place. The most security that they have is a locked door, which is also seen to be open during the night....   [tags: Security] 662 words
(1.9 pages)
Better Essays [preview]
Information Security - Introduction The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad....   [tags: IT Security]
:: 6 Works Cited
2693 words
(7.7 pages)
Research Papers [preview]
Peace and Security - Collective security is one type of coalition building strategy whether global or regional in which a group of nations agree not to attack each other and to defend each other against an attack from one of the others, if such an attack is made. The principal is that "an attack against one is an attack against all." It differs from "collective defense" which is a coalition of nations which agree to defend its own group against outside attacks. It can also be described as a system where states attempt with its use to prevent or stop wars....   [tags: National Security ]
:: 10 Works Cited
1910 words
(5.5 pages)
Term Papers [preview]
History of Security - The Beginning When security first started it was the job of every person to watch there own property and belongings. (Kelly, 2005) If there was a grievence it was handled by the individual or a small group of people. It was not until 2100 b.c. that things were codified by Hammurabi, also known as the King of Babylon. (King, n.a.) Hammurabis Code includes the Code of Ur-Nammu, Laws od Eshnunna and Lipit-Ishtar Isin, than later codes were added including Hittite laws, Assyrian laws, and Mosaic Law....   [tags: Security, Police]
:: 5 Works Cited
3170 words
(9.1 pages)
Term Papers [preview]
Information Security in America and Sweden - Introduction: Business today retains a variety of problems, a major one of these problems are breaches in information and consequently society has come up with Information security to help secure peoples privacy. In order to understand why we have information security, one has to first apprehend the value of information. Typical information stored by different businesses and individuals will consist of an assortment of hypersensitive information that revolves around their employees, financial status, earnings, plans for the future, personal information etc....   [tags: Information Security]
:: 7 Works Cited
1469 words
(4.2 pages)
Unrated Essays [preview]
International Cooperation and National Security - In “Anarchy is What States Make of It” Alexander Wendt describes two opposing state systems—competitive and cooperative. In competition, “states identify negatively with each other’s security so that ego’s gain is seen as alter’s loss.” In cooperation, “the security of each [state] is perceived as the responsibility of all.” Currently, there are problems such as the spread of nuclear weapons, terrorism, poverty in developing countries, international financial instability, and climate change that confront the entire global community....   [tags: National Security] 1480 words
(4.2 pages)
Powerful Essays [preview]
Security Summary and Travel Recommendation: - The Nigerian city of Lagos has a high threat of crime. Limited manpower, a lack of vehicles and widespread corruption have crippled local law enforcement. As a result, travel in Lagos requires vigilance and diligent consideration of security measures. As it is a large urban area, travelers should take the same precautions they would in any other major metropolitan area. In addition, adhere to the following risk mitigation strategies to be able to safely conduct business. Rely on transportation provided by local contacts....   [tags: Travel Security] 1716 words
(4.9 pages)
Powerful Essays [preview]
B2C Web Site Security - Abstract In this report, the author endeavours to present the how the security issues generally presented on the B2C web sites can assured by technical controls and educating customers. The report presents levels of end-to-end security components that include: physical system security, operating system security and network security. With advent of web applications that are now being used extensively for deploying e-commerce applications, author also presented the web security threat profile of web services that is currently an active research topic....   [tags: Web Security] 2555 words
(7.3 pages)
Powerful Essays [preview]
Globalisation and Maritime Security - Background Maritime security traditionally focuses on maritime disputes, naval competition, Sea lines of communication (SLOCs), War at sea . The modern maritime securities after the cold war and 9/11 have been significantly changing and more complex, which is involving worldwide collaboration and mutual understanding . The United Nations Convention on the Law of the Sea (LOSC) has been managing maritime issues fundamentally for years and acceptable as the basic convention on solving maritime dilemmas....   [tags: Maritime Security ]
:: 8 Works Cited
3241 words
(9.3 pages)
Research Papers [preview]
The Homeland Security Act - The Homeland Security Act of 2002 impacted the American people without many of them realizing it. The act called for increased monitoring of computer networks, phone lines, and online history inside the United States and allowed the government to deport suspects (ACLU). What was created by the act has snaked its way into all aspects of our lives, creating a sense of order and restricting some freedom. However, some say that this imposition into our daily lives limits our freedoms and actions allowed us by the Constitution....   [tags: National Security]
:: 6 Works Cited
825 words
(2.4 pages)
Better Essays [preview]
Security: Hindsight is 20-20 - Companies in the news for security breaches are now benefiting from their newly found hindsight via way of a lack of security point of view. These views come at a highly expensive cost and it should come as no surprise that many companies will continuously and gratuitously benefit from those views. The reason I believe this is because companies just don't get it. At the cost of millions of dollars spent post compromise, companies rush off to apply band-aids where sutures are needed. Anyone with a connection to the Internet who has viewed any form of news site in recent weeks have come to know their names: RSA, Sony, Nintendo, L3, Northrop and the list goes on and on....   [tags: Corporate Security]
:: 9 Works Cited
1059 words
(3 pages)
Better Essays [preview]
What Factors do Governments Need to Consider When Planning Their Security for Large Events such as The Soccer World Cup? - Introduction Background Security at major events such as the FIFA World Cup in South Africa 2010 has become an increasing cause for concern. During the last four decades there have been several occasions when hosts have encountered criminal actions or experienced disruptions in their mega-events. For example, during the 1972 Olympic Games in Germany, at 4.00 am on September 5, the group Black September Organisation (BSO), a radical wing of the Palestinian Liberation Organisation (PLO), raided the Olympic Village apartments in their search for Israeli athletes....   [tags: Security]
:: 25 Works Cited
1941 words
(5.5 pages)
Term Papers [preview]
IPSec and Network Security - IPSec is a framework which utilizes a set of IETF protocols to offer end-to-end IP security using strong encryption, public and private key pair cryptography. IPSec secures communication links that could experience network security issues like corruption, eavesdropping, misused data etc (Pezeshki et al 2007) when not secured. However, using IPSec tends to also have an adverse effect on router utilization and overall network performance. One of the major issues with IPSec is performance degradation and throughput (Berger, 2006) which goes back to the complex authentication and encapsulation techniques....   [tags: Internet Security]
:: 15 Works Cited
653 words
(1.9 pages)
Unrated Essays [preview]
The Safety and Security of Students at a University - Formatting Problems The Safety and Security of Students at a University Introduction Our group designed a study to measure violent crimes that occur on University’s campus. We began this study with the benefit being able to be distributed 3 ways: the parents, students, and faculty/staff. The parents would benefit from the results of the study by knowing or gaining a better understanding of how safe the campus of University is. The students would be better equipped with the tools needed to prevent and observe certain crimes from occurring on campus....   [tags: Security] 1123 words
(3.2 pages)
FREE Essays [view]
Concept of Security in the Context of International Relations - The most commonly used definition by scholars is the definition of Barry Buzan in his book People, States, and Fear says that: "Security, in any objective sense, measures the absence of threat to acquired values, in a wiki sense, the absence of fear that such values will be attacked" (Buzan, 1991:4). Then from the definitions that have been mentioned by the penstudi HI can be seen that the security threat is the lack of values needed to live a human life. While the concept of a threat to its own security Ullman defined as: "An action or sequence of events that (1) Threatens drastically and over A relatively brief span of time to degrade the quality of life for the inhabitants of a state or (...   [tags: international security, security system, military]
:: 23 Works Cited
1791 words
(5.1 pages)
Powerful Essays [preview]
Private Security and Critical Infrastructure Assets - The private security and law enforcement officer as well the FBI function and responsibilities have tightened after the 9/11 attacked. Private security officers are undergoing more advanced training from latest technology system to protect the nation to terrorism to be prepared and ready in any event that might come along the way like the 9/11 attacked. After the disastrous event of the 9/11 attack numerous companies and group of people obligate themselves a thorough investigation and evaluation....   [tags: National Security ]
:: 1 Works Cited
936 words
(2.7 pages)
Better Essays [preview]
Transport Layer Security and Secure Shell - The fundamental reason why security protocols are implemented in networks is simple – to protect data as it traverses the network. The mechanism associated with protecting data on its travels is called cryptography. This particular mechanism employs algorithms which encrypt data so that hackers are prevented from easily intercepting the data. Cryptography operates in tandem with a group of protocols which help to control the passing of data between network devices. Therefore, security protocols are a vital component in networks in order to increase data security and without them security would be compromised (Linn, 2014)....   [tags: security protocols ]
:: 22 Works Cited
1465 words
(4.2 pages)
Powerful Essays [preview]
Actionable Intelligence and National Security Decisions - Throughout American history, commanders, NCOs and civilian authorities that wield the authority to make important decisions during conflict often relied on actionable intelligence to gauge the ever-changing operational environment. Two such security episodes which bring clarity to this charge include decisive events leading to the Battle of Yorktown during the Revolutionary War and the Gulf of Tonkin Incident which became of casus belli for America’s involvement in the Vietnam War. Understanding the limitations of unverifiable information used during the production of actionable intelligence during Revolutionary and Vietnam conflicts emphasize the need for military leaders to seek dialectic,...   [tags: National Security]
:: 7 Works Cited
2309 words
(6.6 pages)
Research Papers [preview]
The Importance of Corporate Network Security - Networking is a norm in many corporate based institutions in modern society. Computerized applications, software and communication has been greatly deployed to foster service delivery in the organizations. Despite the many merits tied to networking, it poses some threats that can proof costly if not handled professionally. Good news is that there are measures that can be adopted to form a robust computer network system that will ensure minimal or no intrusion by any assailants. This paper seeks to explore a number of factors indicative of weak computer networking system, and various measures to plan and enable stern security....   [tags: cyber crime, cyber security]
:: 8 Works Cited
2848 words
(8.1 pages)
Powerful Essays [preview]
Individual Privacy versus National Security - The attacks on American soil that solemn day of September 11, 2001, ignited a quarrel that the grade of singular privacy, need not be given away in the hunt of grander security. The security measures in place were planned to protect our democracy and its liberties yet, they are merely eroding the very existence with the start of a socialistic paradigm. Benjamin Franklin (1759), warned more than two centuries ago: “they that can give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety.” Implementing security measures comes at a cost both economically and socially....   [tags: National Security] 1933 words
(5.5 pages)
Powerful Essays [preview]
Security Issues of Ambient Networks - In this essay we will present security issues of a networking concept referred to as ambient networks, which aims to enable the cooperation of heterogeneous networks belonging to different operator or technology domains. In this way, it appears as homogeneous to the users of the network services. Providing security in ambient networks is a huge challenge. The main reason is that the traditional security model is not valid anymore. Traditional security assumes that there is a vulnerable channel between communicating parties, where eavesdropping, modification of messages or denial of service attacks can occur....   [tags: Ambient Network Security, AmI]
:: 10 Works Cited
2184 words
(6.2 pages)
Powerful Essays [preview]
Organizational IT Security and Troubleshooting - Security of a network is a huge issue with companies due to the sensitive information that the companies work with. One of the easiest ways of security the computer is to secure user accounts and people need to understand to never give out their passwords to anyone. Techs may ask for the user name to reset a person password but never give out the password. Social engineering activity lately has been increasing with attacker calling claiming to be an internet helpdesk or some sort of helpdesk. There are user authentication policies which can be created to help improve the network security....   [tags: cyber security, hacking, network]
:: 4 Works Cited
3141 words
(9 pages)
Powerful Essays [preview]
The Future of Social Security - As the baby boomers continue to reach the Social Security-drawing age, the American government’s surplus of finances will gradually fall to a dearth of funds unless intervention is made quickly. Plans for reform have been mentioned, but so far nothing has been done to supplement the future’s inevitable lack of funds. The sooner the government takes action on Social Security, the less severe the reform will have to be. Well- planned adjustments in the smallest increments can make the largest impacts on the system of Social Security....   [tags: Social Security, USA, ] 699 words
(2 pages)
Better Essays [preview]
Human Vulnerability and IT Security - Information Technology (IT) managers are constantly tasked with evaluating their organization’s overall security posture and reporting the greatest vulnerabilities to leadership. Senior management is often surprised to hear that the greatest vulnerability within an organization is not a misconfigured firewall or a virus being forwarded across an internal e-mail server, but rather a human being. When compared to a piece of hardware or software, a human user is easily the single most targeted weakness within an organization....   [tags: Computer and Information Security]
:: 10 Works Cited
2352 words
(6.7 pages)
Research Papers [preview]
Security Risks of Mobile Devices - Objective: I will be searching about the Security Risks of Mobile Phones, Expanding on them, how they affect us and what we can do to prevent them. “About 75 percent of the world has Mobile Phones”. I will be searching how it affects their everyday life. I will also talk about different Mobile Phones and what kind of risks they contain. It is a Vast and broad topic which requires a lot of Research. I will be searching different sites to make sure that I have Why we Choose it. We Chose Mobile Security Risk because we thought it was a really nice area to expand our knowledge in and also expand the knowledge of the person who is or might be read this....   [tags: Mobile Device Security]
:: 5 Works Cited
3373 words
(9.6 pages)
Better Essays [preview]
Network Security Practices - Today’s corporate infrastructure is not the same as it was 10 years ago. In the past you were able to control the amount of attacks on a network because of the reasonable number, which is not the case today. At any given time an organizations network will be attacked or try to be attacked several hundred times in one day. For larger more well-known organizations this number could grow significantly. To ensure your organization is not one of the ones on the 10’oclock news you have to ensure you have proper security practices in place to secure your network....   [tags: Network Security] 799 words
(2.3 pages)
Better Essays [preview]
Network Security Measures - Identify Security Measures Which Address These Threats and Vulnerabilities Any network is vulnerable at its weakest point and perpetrators will try to get in any way that they can. Some just to see if they can and others for manipulated personal gain. Security measures, policy and procedures are written and tailored to meet the specific needs of an organization. Security tools are installed on networks to keep out cyber criminals. Vulnerability is a weakness in a security system. A threat is a set of circumstances that has the potential to cause loss or harm....   [tags: Internet Security ]
:: 4 Works Cited
1138 words
(3.3 pages)
Strong Essays [preview]
Effective Physical Security - In order to have an effective physical security program you need to know what you are protecting and why you are protecting it. Physical Security encompasses the protection of people, places, things, and data. Protecting each of these elements requires different pieces of equipment or different avenues but the philosophy of the protection is the same. In this I mean that you are protecting from unauthorized access to the places, people, things, and data. As stated by Fennelly, “no business is without security problems and assets protection risks....   [tags: Corporate Security]
:: 7 Works Cited
2468 words
(7.1 pages)
Term Papers [preview]
National Security Strategies - In terms of the national security strategies (NSS), one needs to comprehend the foreign policies of the United States. In understanding these foreign policies, one can learn how the U.S. asserts power. In essence, the foreign policies of each administration are integrated throughout the national security strategies. One should start with the presidential NSS of President Bush; then move down to the NSS of President Obama; and finally look at a comparison of the two. The best way for someone to approach this, would be to explain this under the Grand Strategic Objectives (GSO)....   [tags: National Security]
:: 6 Works Cited
2308 words
(6.6 pages)
Term Papers [preview]
Reform for the Social Security System - The Social Security System is in need of a new reform; our current system was not designed for the age stratification we have at this time. The U.S. Social Security Administration Office of Policy states, “The original Social Security Act, signed into law on August 14, 1935, grew out of the work of the Committee on Economic Security, a cabinet-level group appointed by President Franklin D. Roosevelt just one year earlier. The Act created several programs that, even today, form the basis for the government's role in providing income security, specifically, the old-age insurance, unemployment insurance, and Aid to Families with Dependent Children (AFDC) programs.” Social Security was modeled...   [tags: United States, Social Security Administration]
:: 6 Works Cited
873 words
(2.5 pages)
Better Essays [preview]
Privacy vs. Security - Ever since day one, people have been developing and creating all sorts of new methods and machines to help better everyday life in one way or another. Who can forget the invention of the ever-wondrous telephone. And we can’t forget how innovative and life-changing computers have been. However, while all machines have their positive uses, there can also be many negatives depending on how one uses said machines, wiretapping in on phone conversations, using spyware to quietly survey every keystroke and click one makes, and many other methods of unwanted snooping have arisen....   [tags: Privacy, Security]
:: 2 Works Cited
1260 words
(3.6 pages)
Better Essays [preview]
Overview of Network Security - Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to prevent people or things from getting in their network....   [tags: Computer Network Security]
:: 3 Works Cited
868 words
(2.5 pages)
Better Essays [preview]
Local Network Security - There is a false sense of security experienced when someone is blissfully ignorant of certain details or lead to believe that they are indeed safe. For something that is practically essential to human life in an industrial nation, this false sense of security is a hidden danger. With so many people accessing a necessity and not realizing that this technology is insecure, there is an obvious problem. Unfortunately, a lot of people are nice and cozy with their ignorance of the issue. These people rely on the internet for various activities on a daily basis....   [tags: Internet Security] 1963 words
(5.6 pages)
Powerful Essays [preview]
TJX Security breach - The average consumer never thinks twice about using a credit card, when purchasing at a major chain department store. Most point of sales and credit card terminals, are made by a choice few companies. As a result this means that a hacker only needs to know how to exploit vulnerabilities from a small handful of systems. When a consumer makes a purchase they never wonder “is my transaction safe?” Never do they wonder if the company’s Information Technology department has upgraded all computer systems to the latest revision and updates....   [tags: Network Security ]
:: 5 Works Cited
927 words
(2.6 pages)
Better Essays [preview]
Impacts of the Disappearance of Social Security - More and more talk recently about the fact that Social Security is on the fast decline has left many people, especially those around the retirement age, wondering what they are going to do for their income when they retire and the system falls through. The fact that this system is disappearing is quickly turning into a major problem because there is a large percentage of the economy that is on the verge of retiring and they are going to need money for that. How, though, will they receive this money if it no longer exists....   [tags: American Government, Social Security Fund] 2271 words
(6.5 pages)
Strong Essays [preview]
National Security Decision Making - Sir B. H. Liddell Hart declared that the “Role of grand strategy – higher strategy – is to co-ordinate and direct all the resources of a nation, or band of nations, towards the attainment of the political object…” These resources are known generally as the “instruments of national power” and include the Diplomatic, Informational, Military, and Economic, (DIME) instruments of power. America’s grand strategy should be incorporated in the National Security Strategy, which includes the developing, applying, and coordinating of the instruments of national power to achieve objectives that contribute to national security....   [tags: National Security Policy]
:: 7 Works Cited
2279 words
(6.5 pages)
Research Papers [preview]
Intelligent Multimedia Security Services - Recently, security has become one of the most significant and challenging problems for spreading new information technology. Since digital data can easily be copied, multiplied without information loss, and manipulated without any detection, security solutions are required, which encounter these threats. Security solutions are especially of interest for such fields as distributed production processes and electronic commerce, since their producers provide only access control mechanisms to prevent misuse and theft of material....   [tags: multimedia surveillance, data security] 2629 words
(7.5 pages)
Term Papers [preview]
Building a Cyber-Security Policy - Organizations which rely on network infrastructure for their business operation must utilize security technology to protect the network from harmful actions of automated attacks as well as malicious human activity. It is also important to enact policies and guidelines for the employees of the organization, which in many regards can be the weakest link in the chain of security. According to a survey by The Ponemon Institute (2012), “78 percent of respondents said their organizations have experienced a data breach as a result of negligent or malicious employees or other insiders” (p.1)....   [tags: Network Security Policy]
:: 4 Works Cited
1073 words
(3.1 pages)
Strong Essays [preview]
The failure of the State as the primary referent object for security studies - The belief that the State should be the primary referent object for security studies has for many, become outdated. With the failure of the Westphalian system in the late 20th century , under which States were the primary institutional agents, international debate sparked over issues of sovereignty and the State became less relevant as the primary referent object. The world was changing and as Dr. Javier Solana, Secretary General of NATO said in 1998, humanity and democracy, two principles at the fore of international debate, and essentially irrelevant to the original Westphalian system, now serve as guideposts in crafting a new international order, one better adapted to the security realiti...   [tags: Global Security]
:: 12 Works Cited
1855 words
(5.3 pages)
Term Papers [preview]
Human Security in the UN Mandate for UN Missions - In this paper I will argue that the inclusion of Human Security in the UN mandate does not necessarily make UN Missions more successful. In order to do this, I have considered two UN Missions in the Congo. I have compared the two interventions that the UN had to make in Congo, first in 1960 when the Human Security framework did not exist and later in the period after 1997-2006 when Human Security became an important consideration. I have also analyzed the role of other states that were involved in the Congo during the two interventions in the context of Realism and assessed if the generalizations contained therein were applicable in this situation....   [tags: Congo, Security]
:: 11 Works Cited
2873 words
(8.2 pages)
Research Papers [preview]
The Controversy Over New Airport Security Measures - The country’s recently heightened airport security measures have become a source of controversy and debate across the Nation. Due to a recent attempted act of terrorism, where a man on an international flight to Detroit attempted to blow up the plane using a bomb, the department of homeland security has taken new measures to ensure national security in the form of new high- tech full-body scans and pat down procedures in airports. The new body scanning machines create images of people without their clothing, and the new pat down procedure is generally considered too personal....   [tags: National Security]
:: 30 Works Cited
2045 words
(5.8 pages)
Term Papers [preview]
Technical Security Policy Proposal for Small Company - TicTek Inc is a small company with about a hundred employees and one facility. The company sells home security electronics online. The devices are manufactured by a third party company and shipped to TicTek, whereupon they are warehoused until they are purchased through the company’s website. The warehouse staff prepares and ships customer orders in the same facility which houses the office staff and management. TicTek has a few major stockholders, but the majority of the company’s stock is owned by its executives and employees....   [tags: IT Security Proposal]
:: 5 Works Cited
1062 words
(3 pages)
Strong Essays [preview]
The Effectiveness of the National Security Association (NSA) - The Effectiveness of the National Security Association (NSA) American citizens are entitled to own freedom, which says that the citizens can act, behave, and do whatever we want without worrying about someone watching our every move. Ayn Rand once said, “Civilization is the progress toward a society of privacy. The savage’s whole existence is public, ruled by laws of his tribe. Civilization is the progress of setting a man free from men.” The National Security Association (NSA) was set up to protect the American citizen’s freedom, although they may push their boundaries which interferes with the right to privacy; this organization is very effective....   [tags: Terrorism, National Security]
:: 15 Works Cited
1896 words
(5.4 pages)
Better Essays [preview]
Security Sector Reform and a Sustainable Peace - In the modern world, with Democracy in an upward advance in countries like our own, the world is a huge battle field. The people of countries all around the world are in uproar, looking at the free society that the United States has and using it as its light house, directing it in the right direction, with their own input and ideals. These uproars are commonly known as revolutions, which usually end in the death of many thousand innocent lives fighting for their own right to govern themselves....   [tags: Politics, Security, Peace]
:: 5 Works Cited
1301 words
(3.7 pages)
Strong Essays [preview]
The National Security State in the 1970s and 1980s - The National Security State was challenged in the 1970s due to the diminished capacity of the United States to control world events, made evident by the defeat in Vietnam, and the unsustainable economic development that had started with president Lyndon B. Johnson and continued with president Richard Nixon. This challenge also impacted the Nixon administration and its decision-making process, including abuse of executive power, misleading the public, wiretappings of National Security Council employees, and justified it by saying “(…) freedom must sometimes be sacrificed for security.” When Ronald Reagan took over the presidency after Jimmy Carter, he continued the defense buildup thro...   [tags: National Security State]
:: 5 Works Cited
3165 words
(9 pages)
Research Papers [preview]
Security Sector Reform in Egypt and Liberia - Both Egypt and Liberia have been struggling to improve their security sector reform. In Egypt they have been facing a revolution since 2011. It started when President Hosni Mubarak's security and police were harsh and merciless toward the people and because of his security divisions that weren’t doing their jobs correctly. Liberia revolution on the other hand is being lead by Charles Taylor who is head of Liberia and who was kind of their unelected president at the time but is now elected as their current president....   [tags: Security Sector Reform]
:: 6 Works Cited
1089 words
(3.1 pages)
FREE Essays [view]
National Security Strategy for a New Era - Introduction The state of the United States today is in many ways similar to what it was following the Vietnam War. Then as is now, there are concerns over the misuse and overreaching of military force. As well, today’s economic dispair mimics that of the inflation that gripped the nation in the 1970’s and 1980’s (Snow, 2014, p. 5). Left unidentified is a comprehensive strategy for United States national security. What are the priorities for American national security today, and how can they effectively be met....   [tags: Viertnam war, national security]
:: 10 Works Cited
1482 words
(4.2 pages)
Powerful Essays [preview]
Security Sector Reform and a Sustainable Peace - The world we all live in has been going through war and revolt since man was first on the planet. Man has always wanted a certain individuality in their lives. People don’t want to be ruled over or made to make decisions they want to do what they think is right. One of the main problems with this is that not everyone wants the same thing. Because everyone wants different things countries revolt and have wars, which in turn destroys what innocent people wanted which is just to live and be happy....   [tags: Politics, Security, Reform]
:: 5 Works Cited
1070 words
(3.1 pages)
Strong Essays [preview]
The Social Security is not a Ponzi Scheme - Social Security is not the Ponzi scheme some oppositions may advocate. Social insurance, as envisaged by President Roosevelt, would address the permanent problem of economic security for the elder community by creating a work-related, contributory system in which workers would provide for their own future economic security through taxes they paid while employed. It provided an alternative both to reliance on welfare, and to radical changes within the capitalist system. It can be seen as a moderately conservative, yet activist, response to the challenges of the Depression (SSA, 2014)....   [tags: social security act,ponzi scheme,social insurance]
:: 4 Works Cited
857 words
(2.4 pages)
Better Essays [preview]
Impact of Cyber Security Vulnerability on Organizations - Weaknesses to mistreatment in contemporarymainframes are wide-ranging. They variant from weaknesses of internet server which permitthe hackers or assailantsto command the internet server to a cultured lateral network that uses stuff like packet technique or immediate control depletion to collect private and trustworthy material from cyber security computersystems. Vulnerabilities or weaknesses seem to be in the customer software whois a fellow of an industry that uses it to get their tasks performed....   [tags: hackers, cyber security, softwares]
:: 5 Works Cited
1270 words
(3.6 pages)
Strong Essays [preview]
Privatization of Social Security - It’s a matter of either losing all that you have worked for and live in poverty when retired or allowing your hard earned dollars to grow and have a secure comfortable retirement. I believe that Social Security is a doomed Government Program and that Privatization of Social Security would allow for a more secure retirement plan for all Americans. Social Security was first created to help aging Americans in their senior years so they would not end up in poverty. Social Security was signed in as law on August 14, 1935 by President Franklin D....   [tags: retirement plan, privatization of social security]
:: 5 Works Cited
1348 words
(3.9 pages)
Strong Essays [preview]
Social Security System: Success to Failure - It was the year of 1934. America was fighting to come out from the worst economic crisis that the world would ever witness. It was also the year of high crime rate, low Gross Domestic Product and the lowest unemployment rate America had experienced. The Depression had paralyzed American labor forces, but there was a hope still alive in every American including J.D. Rockefeller when he said, “These are days when many are discouraged. In the 93 years of my life, depressions have come and gone. Prosperity has always returned and will again” (Rockefeller)....   [tags: Social Security, USA, history, ]
:: 12 Works Cited
1952 words
(5.6 pages)
Term Papers [preview]
Freedom is More Valued than Security - “Some tourists think Amsterdam is a city of sin, but in truth it is a city of freedom. And in freedom, most people find sin.” This might sounds like a section from a travelling guide, but it also describes why we as a society cannot gain complete freedom. Complete Freedom requires all negative repercussions from individual’s actions to be unpunished, making it impossible to allow any form of justice into the community, turning it into a den of criminals. Due to that, a government with security force to help regulate rules is necessary to keep the whole country going without breaking down....   [tags: Freedom vs Security]
:: 11 Works Cited
1434 words
(4.1 pages)
Powerful Essays [preview]
Border Security Through Technology and Manpower - It was reported in the San Antonio Express News that “Border-Patrolling Drones Would Call Texas Base Home.” Lynn Brezosky reported that “U.S. Customs and Border Protection Commissioner Alan Bersin cut the ribbon for the launch of the nation’s fourth base for operating border surveillance drones.” This is important in securing the U.S.-Mexico border, which the U.S. has an approximate 1,933 mile long border with Mexico (Beaver). Brezosky also reported that “the Homeland Security budget called for two drones for Texas.” The new drones in Texas are another step towards securing the U.S....   [tags: Immigration, Technology, Security]
:: 15 Works Cited
1655 words
(4.7 pages)
Powerful Essays [preview]
Customer Data and Security Breach Ligitation - In re Zappos.com, Inc., Customer Data Security Breach Litigation, No. 3:2012cv00325, was a case held in United States District Court for the District of Nevada in which the Court supposed that the customers of Zappos.com were not held to the browse wrap terms of use due to their ambiguous nature and also held that the agreement was not enforceable since Zappos had earmarked the right to make changes in it at any time without notifying the customers. The above court decision set preference for businesses that use browse wrap agreements and/or comprise a phrase in their agreements that let them to change the agreements at any phase....   [tags: zappos, data security, web]
:: 3 Works Cited
1152 words
(3.3 pages)
Strong Essays [preview]
The Security Council of the United Nations - The world is at a point where people have to question if they feel safe, and if they do, why they feel safe. The answers will vary, but more than likely, the United States, not the United Nations, will be the answer. The Security Council was made to keep peace among the world, and the concept of it was a great idea in theory. The world needs protection from the horrors of genocide, the death from terrorists, and the corruption of governments that can create many issues. However, in recent years the United States has led the charge for the war on terror, while the U.N....   [tags: peace, world safety, un, security council]
:: 9 Works Cited
1695 words
(4.8 pages)
Powerful Essays [preview]
Bank Solutions Inc. Security Plan - Introduction Bank SolutionsInc. is in need of a tailored IT security plan for strategic advantage, regulatory compliance, and risk mitigation. As an organization that relies on IT for innovation and technical advantage, it is essential to invest in necessary security controls. This will ensure the infrastructure supports a layered security posture to detect, deter, eliminate or reduce as many vulnerabilities and exposure as possible. It is the responsibility of executive management to determine the amount of exposure and risk their organization is willing to accept....   [tags: Security Plan, Strategic Advantage]
:: 8 Works Cited
1676 words
(4.8 pages)
Better Essays [preview]
Indiviual Privacy vs National Security - James Madison once said “Knowledge will forever govern ignorance; and a people who mean to be their own governors must arm themselves with the power which knowledge gives.” To gain a better understanding of a society, one must gain knowledge of the needs and wants the citizens’ demand from the country’s representatives. In every country the needed to protect its citizens is the same. In some nations, security is a higher priority which causes sacrifices to be made to obtain an indefinite protection against all rivals....   [tags: Privacy vs Security ]
:: 2 Works Cited
1175 words
(3.4 pages)
Strong Essays [preview]
Social Security: Time for Change? - For the past 78 years, one governmental system’s benefits have been essential to the nation’s elderly and disabled individuals. This system itself has focused on providing benefits to every American when they reach the age of 65, or earlier than the age of 65 if they preferred to receive smaller amounts of benefits per year (Social Security Administration). The system, at the same time, has taxed citizens and companies to levy this distribution of benefits. This system may seem to be a great idea; however, the trust fund has been ever decreasing with no end of this decrease in sight (Economist Briefing)....   [tags: tax, republicans, democrats, Social Security Act]
:: 9 Works Cited
1826 words
(5.2 pages)
Term Papers [preview]
Was the Security Prepared for the London 2012 Olympics? - The 2012 London Olympics were held at the Olympic Park in East London from Friday, July 27, 2012 to Sunday, August 12, 2012. The Olympics have been held in London two times before the 2012 Olympics, once in 1908 and once in 1948 (Scott). Over 10,500 athletes participated from over 204 countries, over 120,000 people were going to the Olympic Park every day to watch the Olympics. Over 302 medal events were being held, with three swimmers being the top medalists in the 2012 London Olympics (“Olympics”)....   [tags: olympic games, g4s, security agency]
:: 8 Works Cited
808 words
(2.3 pages)
Better Essays [preview]
Transport Layer Security - Computers are used for nearly everything today, from entertainment to business, and even banking. Though convenient, this makes computers and the internet a prime target for fraud, and security paramount. Recently, however, there has been security exploit after security exploit, some of which need nothing more than typing in a website and clicking “Go!” A couple have even been known for years before being fixed. This creates debate whether computer security is in fact safe, or it is all a false hope....   [tags: computers, security, heatbleed]
:: 9 Works Cited
994 words
(2.8 pages)
Better Essays [preview]
Medical Record Security - Medical Record Security In the world of technology there are many types of threats to be considered when a hospital or health care facility depends on keeping their clients personal information private and safe from unauthorized people from viewing. When information safety, and regulations are considered by a healthcare facility it is held at high regards and high standards to assure that there is no chance of any information being leaked that should have been protected. A patients personal information should be kept safe from any unauthorized person from viewing, because a patients personal medical records can be used maliciously if it is viewed by anyone who is not authorized to view the i...   [tags: Network Security Privacy]
:: 7 Works Cited
1278 words
(3.7 pages)
Better Essays [preview]
Transportation Security Administration: Airport Protection - A major plane crash can change hundreds of lives. If the U.S. government was not monitoring airport security, not checking bags and or passengers, then it would have allowed many dangerous people to board an airplane. The 21st century is on high alert for passenger safety because if a terrorist boards a plane it can truly be a devastating situation. Airport security is important for the safety of passengers. Risks are associated with flying; in order to assure safety, passengers need to receive full body screening....   [tags: plane crash, airport security, tsa] 725 words
(2.1 pages)
Better Essays [preview]
United States Social Security Policy - Social Security in the United States today is being utilized in a manner never intended much different from how it was intended, with over 33 percent of retirees using the funds as a main source of income (“Many” para 1). While it appears to be a genuinely good and generous thing that the government provides a substantial income for senior citizens, the funds are drying up more quickly each year. They are expected to run out by the year 2033, but this is at a faster pace than expected; in 2011 the funds were expected to contribute to the elderly until 2036 (“Social” para 2)....   [tags: Social Security, America, Retirees, Funds]
:: 9 Works Cited
1407 words
(4 pages)
Powerful Essays [preview]
The Analysis of Security Sector Reforms in North and South Korea - Security Sector Reform (SSR) is a concept that first emerged in the nineteen-nineties in Eastern Europe. Though there is no single globally accepted definition, SSR generally refers to a process to reform or rebuild a state's security sector. Basically the security is needed because countries in transitional position, post-conflict situations, and sometimes developed countries need protection from dictators, radicals, and dangerous criminals that would take advantage of the country. Established countries such as America, England, and France do not have to worry about needing extra security help as much as countries like Liberia, Turkey, Nigeria etcetera....   [tags: Politics, Security, Reform]
:: 5 Works Cited
901 words
(2.6 pages)
Better Essays [preview]
The Department of Defense’s Use of Private Security Contractors - Definition of Terms Before we begin we must first understand the different definitions of proprietary and contract security operations. There are many definitions and explanations that are used to distinguish between the two but I will use the definitions provided by Fischer, in his book titled Introduction to Security. “Proprietary security operations are those that are “in-house,” or controlled entirely by the company establishing security for its operations” Fischer, Robert; Halibozek, Edward; Walters, David (2012-11-23)....   [tags: Private Security Contractors]
:: 13 Works Cited
4403 words
(12.6 pages)
Research Papers [preview]
Information Security - Why do we need management’s support for information security. Doesn’t IT own information security. The technical side is important, but management’s role cannot be overlooked. Thornton states that management has to drive information security. Why does management need to drive this policy. The management team is legally responsible for any breaches that occur. Plus, senior management has a fiduciary responsibility to the company’s assets. Our management can provide the necessary resources, including finances and personnel, needed to implement policy....   [tags: Information Security Essays] 2590 words
(7.4 pages)
FREE Essays [view]
An Evaluation of Information Security and Risk Management Theories - An abundance of information security and risk management theories are prevalent; however, it can be difficult to identify valid and applicable theories. In the reading to follow, several information security and risk management theories are evaluated. These theories are presented and employed via various frameworks, models, and best practice guidelines. An assessment of sufficient research pertaining to these theories is addressed, along with a consideration of the challenges that arise from a lack of research....   [tags: it security, risk management, nist]
:: 11 Works Cited
1902 words
(5.4 pages)
Term Papers [preview]
Global Distribution Inc.'s Security Policy Regarding Computer Usage - Acceptable Use Policy Purpose --The purpose of this policy is to detail acceptable computer usage at Global Distribution Inc. Adhering to acceptable usage standards protects the user and the company from potential attack. Scope -- This policy applies to all personnel associated with Global Distribution Inc., whether permanent personnel, temporary, or contractor. This policy applies to all equipment owned and operated by Global Distribution Inc. Policy -- Acceptable Use -- All users requesting access to Global Distribution Inc workstations and network resources will be required to sign an acknowledgement of acceptable use policies....   [tags: Corporate Security]
:: 3 Works Cited
1887 words
(5.4 pages)
Term Papers [preview]
Security Sector Reform Contributes to Sustainable Peace - War and disease are eminent in this world. But is peace possible. In this world of starving children, mutiny, betrayal, crisis, and national debt. In a world so corrupt and hateful that people are murdered in the streets and the elderly have all but lost hope for the coming generation. But, is it the world itself that is corrupt and cruel. Or is it the many governments that try to rule it. Governments that confine the rights of the citizens and allow rapists and terrorists to roam the streets were wary citizens live....   [tags: Politics, Security, Peace]
:: 5 Works Cited
978 words
(2.8 pages)
Strong Essays [preview]


Your search returned over 400 essays for "Security"
1  2  3  4  5    Next >>