StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
India National Risk Register - Hazards and Vulnerabilities
19 pages (4394 words) , Download 0 , Report
Free
In 2008 national security Advisor of India indicated that there close to 800 terrorist sales in the country (The Times of India, 2008).... nternational and national Media outrage ... The major step that is undertaken so as to enhance cyber security is creation of awareness to all information technology companies in the country.... Symantec which is internal security provider has revealed that between 2012-2013 there was a very rapid increase in cyber crime in the country with the government having to part with 4 billion dollars (Hiudu, 2013)....
Preview sample
Computer Security Policies
4 pages (1000 words) , Download 4 , Essay
To further enhance our capabilities aside from our modern infrastructure and certified personnel, our company has started the “road map” to ISO 17799/27001 – Code of Practice for Information security Management and Information security Management Systems certification.... This is a globally-recognized information security certification that ensures a company practices globally-accepted and best practices in information security – all our corporate policies are based on this ISO standards....
Preview sample
Preparedness Homeland Security
7 pages (1802 words) , Download 2 , Assignment
Free
The paper "Preparedness Homeland security" describes that the need for a National Incident Management System ( NIMS ) became even more apparent after the September 11 attacks on the twin towers of World Trade centr and other targets of strategic importance ( W.... HOMELAND security: NATIONAL INCIDENT MANAGEMENT SYSTEM (NIMS) Introduction: The National Incident Management System NIMS is the system for the coordination of emergency preparedness and incident management among the various federal, state and local agencies of United States of America....
Preview sample
Controller Suggestions for ABC Company
5 pages (1250 words) , Download 2 , Math Problem
The company will experience challenges due to increases of prices and shortage of major raw materials used in the manufacturing of building materials; this exposes the company to the risk of running out of supplies and ultimate reduction in profit margin.... The company should also ensure that the cash that is borrowed is used to finance operations that will boost the sales by a big margin, so that the cash inflow from operations can be boosted....
Preview sample
Security and Risk Management Challenges
12 pages (3552 words) , Download 1 , Research Proposal
Free
The insurance of terrorism can add to making the community more flexible to events of terrorism: access to terrorism insurance price that is appropriate can promote growth in the economy, increasing the availability of the resources for the addressing the threats in the national security or other social problems.... national security Perspectives on Terrorism Risk ... This research proposal "security and Risk Management Challenges" discusses some of the blasts that include: the Abuja bombing, UN Guest House Attack in Kabul, Alger's bombing and Canal Hotel Bombing....
Preview sample
Foreign Security Analysis
2 pages (500 words) , Download 2 , Coursework
Free
From the above calculations, it is advisable to take a lower level margin debt since.... This leads to a lower margin call.... Also, on the same point, a diversified portfolio helps to mitigate the chances of a margin call. ... f the margin call is received, it means that the investor losses a 48% of his cash investments and he or Buy and Hold Buy-n-hold is an investment strategy where an investor buys stocks and then holds them for some time regardless of the changes in the market....
Preview sample
Computer Systems Security
10 pages (2769 words) , Download 2 , Essay
Free
From the paper "Computer Systems security" it is clear that there are many security measures that can be taken to ensure computer systems security.... The management and design of the encryption program are essential to the effective implementation of security measures.... Computer Systems security Introduction The world today has been reduced to a global network.... More importantly, data that was assumed to be stored safely in an organization seems to be migrating out of it, raising privacy concerns and questioning the security of digital storage and distant, scattered workforce....
Preview sample
Keys to Success of a Startup Company Tesco Security
13 pages (3423 words) , Download 2 , Assignment
Free
This assignment "Keys to Success of a Startup Company Tesco security" focuses on the company that will provide security audits, security guards, and referrals to those who provide equipment to commercial buildings, and finally special event venues and other individual clients.... Executive summary TESCO security is a startup Company offering security services based in Dubai.... The company will provide security audits, security guards, and referrals to those who provide equipment to commercial buildings, and finally special event venues and other individual clients....
Preview sample
NIE National Intelligence Estimates
13 pages (3250 words) , Download 2 , Essay
discusses national Intelligence Estimates (NIE) produced by the Intelligence u (IC), which are to some extent problematic and tend to question their usefulness to the Congress.... As a Specialist in national Defense, the writer offers insight into the complexity of the NIE and proposes certain challenges incumbent on the end consumer.... national Intelligence Estimates (NIE's) entail the collection or analysis of trends that are difficult and extensive to understand....
Preview sample
Security Managers Should Be Managers First And Security Specialist Second
14 pages (3500 words) , Download 2 , Essay
In today's world of high technology, security became part of the business of many private and government organizations and companies.... From local to international projects, security became important on global activities.... As a result, others see the importance that made them aware of involving security in anything they are involved. ... hile in some aspect of considerations, security perceptions to some organizations don't change 'till something goes wrong....
Preview sample
Globetrotting Hotels Security Management
9 pages (2620 words) , Download 3 , Coursework
Free
From the paper "Globetrotting Hotels security Management" it is clear that hotels are a typical area for fingerprint biometrics to get hold of ongoing security guarantee, for the reason that on average, lost keys and cards cost them approximately $ 2 each day for each room.... Table of Contents Table of Contents 2 Executive Summery 3 Introduction 3 Need of Technology 4 Globetrotting Hotels security Management 6 Globetrotting Hotels Online Payment Technology 8 ...
Preview sample
Terrorism and Homeland Security
3 pages (750 words) , Download 3 , Essay
Free
CBP officers are empowered by the law and Department of Homeland security regulations to perform their duties of protecting the borders.... This is the career that I would choose under the Homeland security umbrella.... The priority mission of the CBP is generally homeland security.... Terrorism and Homeland security Department Terrorism and Homeland security CBP officers are empowered by the law and Department of Homeland security regulations to perform their duties of protecting the borders....
Preview sample
Biometric Security
15 pages (3989 words) , Download 5 , Essay
Free
This essay "Biometric security" focuses on security measures.... Biometric security Background These days the world community is experiencing a fierce security scare from a number of sources.... Terror related incidents in different parts of the world; despite highest security alerts is a testimony to the wide reach of the terror tentacles.... The 9/11 attacks on WTC twin towers in the heart of the US, the bomb blasts in London, the 26/11 attacks in India are some of the heinous acts of terror which have forced the security agencies around the world to go for foolproof security measures....
Preview sample
Promoting Information Security in Banking Solutions Inc
5 pages (7946 words) , Download 1 , Case Study
Free
This case study "Promoting Information security in Banking Solutions Inc" focuses on the major information security issue faced by Bank Solutions Inc.... Skipping some item processing facilities poses an information security risk to both customers and the institution.... Multiple Projects based on 2 case studies scenarios Affiliation PROJECT CASE STUDY GAP ANALYSIS Summary of security Issues ... One of the major information security issue faced by Bank Solutions Inc....
Preview sample
American National Government
6 pages (1722 words) , Download 1 , Coursework
Free
It is projected that the economy will be much worse by 2025 because the baby boomers shall be paid some of their interest in the Medicare and the social security.... For example, the discretionary spending cuts that required both the security and non-security spending to be shared equally.... It is good to note that the country will have a faster economic growth when its security is stable.... Therefore, a large sum of money will be used to maintain security in the country thus making it difficult for both security and non-security spending to be the same....
Preview sample
Web Security Importance
12 pages (4399 words) , Download 1 , Coursework
Free
The paper "Web security Importance " states that Web security is not an instant success story but, instead, requires the ongoing implementation of countermeasures that try to curb any malpractices that may pose a threat to secure information transfer.... Several experts have come up with different tools such as SWEET that provide a better environment for the training and management of security operations on the web.... Final Report- Web security....
Preview sample
Security Administration and Management
14 pages (3500 words) , Download 3 , Essay
rom our analysis, by focusing on differentiation strategies in the security industry, Securitas AB success can be attributed to its vast experience in the market, product differentiation, and assorted brands.... Securitas AB by using its trademark experience and know how both product differentiation and cost leadership strategy means the company has a focus strategy, focusing on cash on transit and other security system....
Preview sample
Chief Security Officer
8 pages (2092 words) , Download 2 , Assignment
Free
The paper "Chief security Officer" discusses that the security of important documents in learning institutions is a factor that should never be ignored.... The chief security officers serving in the institutions of higher learning should establish measures that enhance reduced cases of cyber-crimes.... The issue of security is a primary concern in all developmental plans.... In essence, before establishing an enterprise or an institution, it is necessary to ensure that effective security mechanisms are put in place....
Preview sample
Multi-National Company Entering India
8 pages (2148 words) , Download 2 , Research Paper
Free
The paper "Multi-national Company Entering India" discusses that the company under consideration operates in the oil and natural gas sector.... Multi-national Company Entering India Contents Introduction 3 Brief Summary of the business 4 Fluctuations In exchange rate 4 Nullifying the negative impacts of fluctuations in exchange rates 6 Two currency derivative strategies 6 Hedging techniques to manage exposure 7 A country risk analysis 9 Reference 10 Introduction When the world's largest energy companies are taken into consideration one cannot rule out Gazprom....
Preview sample
The National Budget Deficit of the United States of America
40 pages (10595 words) , Download 2 , Dissertation
This dissertation "The national Budget Deficit of the United States of America" examines the United States' problem with massive spending with regard to Chinese products, China's ability to continue massive lending to the United States, and relations between the two nations.... What is perhaps most troubling, however, is the national budget deficit.... One of the major problems that are currently being dealt with is a national budget deficit crisis that will not go away....
Preview sample
Food Insecurity in Sub-saharan Africa
11 pages (2965 words) , Download 3 , Essay
Free
Food insecurity in Sub-Saharan Africa and Implication to US national security Introduction Food insecurityrefers to a situation in which, there is a lack of a reliable and consistent access to sufficient food over a period.... As a result, it is plausible for food insecurity in Sub-Saharan Africa to have an implication on United States national security and the military respectively. ... he implication on the United States national security ... In addition to the commitment of resources in other areas of the world, a gap is created domestically in terms of national security because of overstretched resources in the international front10....
Preview sample
Security officer
9 pages (2250 words) , Download 2 , Essay
Free
security Officer Question On November of this year, a teenager was charged with releasing separate DDoS attacks on Oxford University and Cambridge University.... Also, computer-protection issues at Ohio University saw the institution alumni being exposed to identity theft after hackers acquired their social security numbers.... The alumni data were compromised in a massive computer and security breach (Privacyrights.... The universities now use an IT security system that covers inside the institution, instead of the perimeter....
Preview sample
Energy Security and Energy Securitization
8 pages (2810 words) , Download 2 , Essay
Free
This paper ''Energy security and Energy Securitization'' tells us that the continuous development of industrial activities has resulted in the increased need for energy.... Energy security and energy securitization Energy security and energy securitization Introduction The continuous development of industrial activities worldwide has resulted to the increased needs for energy.... Energy security has become a critical issue for all countries around the world; countries, which have developed strategic alliances within the international community, have been able to respond more effectively to the needs of energy security; for example, the case of the European Union (Checchi, Behrens, and Egenhofer 2009)....
Preview sample
Border security issues (week 6)
1 pages (250 words) , Download 2 , Essay
Free
According to Meyer (2013) the current President's security strategy is to have a national gendarmerie.... Law Week 6: Border security Issues Question Perhaps it is almost impossible for the border security to effectively measure whenthere are unfortunate events on the border.... According to Meyer (2013) the current President's security strategy is to have a national gendarmerie.... Mexico's new military police force: the continued militarization of public security in Mexico....
Preview sample
EU Preferential Trade Agreements for Developing Countries
14 pages (4178 words) , Download 2 , Essay
Free
McQueen (2007) emphasises that a problem with a direct evaluation of the utilisation rate and the preference margin is that the choice to use preferences relies on several variables aside from merely the preference margin, like the knowledge of the traders of the system as well as variables establishing the cost and benefits from sourcing to a specific market....
Preview sample
My Security Company
9 pages (2733 words) , Download 0 , Report
Free
From the paper "My security Company" it is clear that the business has the ability to revolutionize security and first aid services in the UAE.... My security Company will be a startup security company specializing in recruiting and training youths in a range of positions in first aid and security services.... Given the increased terrorist activities and the present-day economic climate, security has become a concern....
Preview sample
The Concept of Human Security
6 pages (1668 words) , Download 3 , Essay
Free
ne should always bear in mind that the primary threats to human security are always internal which stem out of ‘economic failure, violation of human rights, political discrimination' and therefore it is essential for the policy framers to realize that “the guarantee of national security no longer lay in military power, but in favorable social, political and economic conditions, the promotion of human development, and the protection of human rights” (Tadjbakhsh 2006, p.... The author of the paper "The Concept of Human security" argues in a well-organized manner that there have been several studies carried out to understand, define and explain the concept of human security....
Preview sample
National Response Plan
1 pages (360 words) , Download 3 , Essay
Free
The essay under the title "national Response Plan" states that emergency management in the United States of America has drastically taken another direction, which is relatively new to many agencies, following the danger posed by future terrorist attacks.... The federal government, therefore, created a national Response Plan which was considered an all-discipline and all-hazards plan (Bullock et al, 2012).... The main aim behind the establishment of the national Response Plan was to create a single and comprehensive framework that involves almost all government levels in managing domestic incidences....
Preview sample
Aston Martin Crash Structure
8 pages (2250 words) , Download 2 , Coursework
Free
The paper 'Aston Martin Crash Structure' will focus on one of the most vital, or important, elements of any car model – the crash beam structure.... The crash beam interconnects different components of a given car; the crash houses the drive train or engine.... ... ... ... The author states that the crash beam structure is required to be rigid in order to support stress and weight and to effectively secure or tie together the other car components....
Preview sample
Analysis of the Proposed Rustica Industries Corp Acquisition
8 pages (2311 words) , Download 0
Free
The choice of Rustica Industries Corp as the best investment option for Newport Partners is associated with both merits and risks.... Thus, Martin Smith has to.... ... ... The paper 'Analysis of the Proposed Rustica Industries Corp Acquisition' is a detailed example of a finance & accounting business plan....
Preview sample
Wireless Network Security
7 pages (1750 words) , Download 3 , Research Paper
Free
This paper, Wireless Network security, discusses various issues and aspects of security-related features in wireless networks.... The primary goal of this research is to present a comprehensive discussion of various features included in wireless network security.... This paper will discuss topics like wireless network security tools, their advantages, and directions.... In this scenario, wireless network security is a promising topic that covers a lot of critical features....
Preview sample
Comparison between Hitler and Martin Luther King's Ideologies
4 pages (1000 words) , Download 3 , Essay
Adolph Hitler and Martin Luther King junior: ideological comparison University Date Introduction Martin Luther King junior and Adolph Hitler were without doubt some of the most charismatic leaders of the 20th century, though they had distinctively different ideological paths, the ideologies may have seemed similar when contextualized....
Preview sample
Can Security Countermeasures Be Overdone
10 pages (2820 words) , Download 2 , Essay
Free
Some may argue, however, that in the matter of national security, one should not go by the record of convictions to measure the effectiveness and that prevention is better than cure. ... The paper "Can security Countermeasures Be Overdone" states that security countermeasures can to an extent provide the answer to the problem of terrorism, especially at the individual level of protection of life and property through the use of technological gadgets....
Preview sample
Information Security Risks
8 pages (2211 words) , Download 3 , Essay
Free
Evidence of decrease in the profit margin of the company and the increased operating costs due to the regulations will also be examined.... This paper ''Information security Risks'' objectives are the identification of the information security threat to contemporary global financial organizations.... Running head: Managing information security risks in global financial s Managing information security risks in global financial institutions ...
Preview sample
Homeland Security
8 pages (2421 words) , Download 2 , Assignment
Free
In addition, it forces private corporations to share records and data with federal law enforcement departments during investigations and data with federal law enforcement departments during investigations and allows the FBI to seize material when it believes national security is in jeopardy (Howard, Forest and Moore, 2006).... This assignment "Homeland security" shows that the legal system of the United States has provisions regarding terrorists and acts of terrorism....
Preview sample
Food Security and Climbing Food Prices in Nigeria
11 pages (2661 words) , Download 0 , Coursework
Free
Because of this, the given essay analyses the appearance of food crisis in Nigeria and investigates how both international organizations and national leaders face this challenge.... The paper "Food security and Climbing Food Prices in Nigeria" highlights that unequal distributions of wealth and existence of politicians who monopolise the industries make it hard for the World Bank to achieve set by the United Nations MDGs and end the problem with the lack of food security....
Preview sample
Privacy-Enhancing Security Mechanisms
3 pages (750 words) , Download 3 , Research Proposal
There exist many privacy enhancing security mechanisms that ensure secure delivery of data to the intended location.... In this paper, we will discuss the technique to design a reliable and efficient privacy-preserving scheme in order to ensure increased security of data over the network.... Problem Statement The problem statement for the research paper is: "Design and analysis of privacy-preserving network and cryptographic protocols" Conceptual Framework Aim of the Research In realistic networked environments, data security is the main focus of the management....
Preview sample
Carles Martin in Uganda
8 pages (2000 words) , Download 3 , Case Study
Free
The author of the present case study "Carles Martin in Uganda" highlights that culture is the beliefs, values, practices, customs or social behaviour of a particular society.... Different people in various countries adore different cultures which may not be in line with other people.... .... ... ...
Preview sample
Critically analyse the effectiveness of United Nations Security Council
11 pages (2750 words) , Download 4 , Essay
At the recent historic summit meeting of the United Nations security Council (UNSC) held in New York on 24 September 2009, United States President Barack Obama, who presided over the meeting, called on the thirteen Heads of States to pledge their support to tackle.... His sentiments were echoed by French President Nicolas Sarkozy, who observed that Iran and the Democratic Peoples Republic of Korea , who were “right in front of us,” had violated security Council resolutions to stop the testing of ballistic missiles (security Council SC/ 9746, 2009)....
Preview sample
Security Risk Management
16 pages (4409 words) , Download 0 , Literature review
Free
The paper "security Risk Management" is an outstanding example of a management literature review.... The study will elaborate mainly focus on the issues related to security and risk management but first, the research will define the meaning of the terms risk and how the issues of risks can be managed in any given organization or society.... The paper "security Risk Management" is an outstanding example of a management literature review.... The study will elaborate mainly focus on the issues related to security and risk management but first, the research will define the meaning of the terms risk and how the issues of risks can be managed in any given organization or society....
Preview sample
Port Security Problems
6 pages (1852 words) , Download 0 , Coursework
Free
The regulations that are enacted by the IMO are always enforced by the local and national maritime authorities, which are controlled by member countries.... This coursework "Port security Problems" gives a critical analysis of the challenges that developing countries face while implementing various international legislation, regarding port security.... The security of the ports is of paramount importance if the international community has to succeed in promoting commerce....
Preview sample
Financial Security in a Persons Retirement
5 pages (1250 words) , Download 2 , Term Paper
Free
The paper gives the sign to the financial security in the retirement.... inancial security in a person's retirement does not just happen, however, it takes planning as well as commitment and, yes, money.... In order to have financial security in our retirement, we need to start saving, keep saving and also stick to our goals.... This increases my social security benefits a certain percentage if I delay receiving benefits until after my full retirement age (Berk & DeMarzo, 2014)....
Preview sample
Case Study - Homeland Security Issue
11 pages (2750 words) , Download 3 , Essay
The research veers on the importance of United States Homeland security policies.... The United States Home security Agency must implement defense and counter.... he purpose of the research is to determine the relationship of the Homeland security policy and the terrorist group responsible The suspected terrorist group is Al-Qaeda.... The problem includes the responsibility of the United States' Homeland security Agency to thwart future terrorist attacks, especially the biological weapon attacks....
Preview sample
Attacks on national security through the use of Internet and computers
2 pages (500 words) , Download 4 , Research Paper
Free
One of the major features of cyber warfare is the ability to attack even Attacks on national security through the use of Internet and computers Attacks on national security through the use of Internet and computers “Cyber warfare or information warfare involves units organized along nation-state boundaries, in offensive and defensive operations, using computers to attack other computers or networks through electronic means”(Billow & Chang, 2004, p.... America like countries are currently tightening security measures against information warfare....
Preview sample
Terrorism and Homeland Security Quiz
4 pages (1000 words) , Download 2 , Assignment
Free
uicide attack involves activities that individuals or groups carry out to kill civilian and security forces in order to achieve a set goal.... Terrorism and Homeland security.... The five types of force multipliers in terrorism are: religion, media, transitional support, technology and recruitments as discussed....
Preview sample
International Workshop on Security Protocols
8 pages (2344 words) , Download 1 , Report
Free
This report "International Workshop on security Protocols" presents a sequence of operations that make sure data is protected.... College security protocols The term security protocols refers to a sequence of operations that make sure data is protected.... There are various types of security protocols which include SSL (secure sockets layer) and TLS (transport layer security). ... he following can be identified as the main components of security protocols: ...
Preview sample
Financial Management of eBay Company
9 pages (2250 words) , Download 2 , Assignment
Free
Because employees are given compensation in the form of base pay to give them security, the incentive pay aims to balance the goals of the company and the individual.... By constantly finding new revenue sources such as classified platforms and venturing into in-season product markets, this is an objective that aims to support the objective of getting an overall operating margin above 33%.... This objective is also in line with the overall objective of achieving above 33% profit margin for the company....
Preview sample
The Pillow as a National Historic Landmark
1 pages (250 words) , Download 2 , Essay
Free
The institution was listed in 2003 as a national Historic Landmark.... The Pillow is also a national Historic Landmark with an extensive and rare dance archives entailing materials from 1894 through to now.... n summary, the mission of the Jacob's Pillow Dance is to support dance creation, education, presentation and preservation: and to deepen and engage the public support and appreciation for dance....
Preview sample
US Security Concern from Israel-Palestine Conflict
9 pages (2581 words) , Download 2 , Essay
Free
They have increased threats to national security.... They have, however, increased threats for its national security.... However, until 1960s, Britain became the dominant western power in the Middle East, accompanied with the United States and Soviet Union but however, today the Middle East is the focal point for the United States and its national security.... Bush stated in the national security Strategy: "The reversal of Iraq's aggression against Kuwait was a watershed event....
Preview sample
Environmental Security
6 pages (1500 words) , Download 4 , Essay
Free
This paper focuses on environment security, a concept that allows policy makers to establish a bridge between thought and action so as to replenish natural resources that are destroyed by human mismanagement or negligence.... Environmental security Introduction Environment is an essential part of every facet of human life.... This paper focuses on environment security, a concept that allows policy makers to establish a bridge between thought and action so as to replenish natural resources that are destroyed by human mismanagement or negligence....
Preview sample
1301 - 1350 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us