StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Enterprise Networking and Security
12 pages (3226 words) , Download 2 , Report
Free
This report "Design for Computer Network security" discusses network vulnerabilities that are constantly at a rise, the current network security vulnerabilities are evaluated in three categories i.... logical security, internal security, and external security.... The logical security domain will cover technical controls such as the deployment of IDS, Virtual LAN, monitoring violation logs, auditing on domain environment, ISA server, and VPN security as well....
Preview sample
Recommendation for a Security on the Tadawul Stock Exchange
5 pages (1351 words) , Download 2 , Research Paper
Free
The paper "Recommendation for a security on the Tadawul Stock Exchange" highlights that generally, Almarai Company already holds a significant place in the economy.... The paper presents the real-life snapshots of selected security on the Tadawul stock exchange with the objective to analyze and evaluate them before giving a buy recommendation to a client by the small investment firm KSA.... The paper evaluates the security within the broader spectrum of the specific sector in the economy of Saudi Arabia....
Preview sample
The Patriot Act: Security vs. Civil Liberties
4 pages (1000 words) , Download 2 , Research Paper
Free
Presidential Power in national security Fisher's article deals with the actions taken by President Bush following 9/11, and the similar actions of previous presidents: “If an emergency occurs and there is no opportunity for executive officers to seek legislative authority, the executive may take action--sometimes in the absence of law and sometimes against it--for the public good” (2009, p 348).... Presidential power in national security: a guide to the president-elect....
Preview sample
Issues in Homeland Security
1 pages (250 words) , Download 3 , Essay
Free
The primary objective of the Department of Homeland security (DHS) is to ensure the security of the US from the terror attacks, emergencies, man-made hazards, and.... Since the establishment in 2002, the DHS has regularly assisted tribal, local, and state governments in combat against terrorism, natural disasters, and other security threats (Webster, 2008, p.... However, there are Issues in Homeland security al Affiliation Issues in Homeland security The Department of Homeland security is a special department under the administration of the US federal government....
Preview sample
Security Automation in Oil and Gas Companies
11 pages (3229 words) , Download 2 , Coursework
Free
The paper "security Automation in Oil and Gas Companies" states that the specific field is characterized by important trends in the future, not only in regard to the type of software applications involved but also as of the type of threats against firms in the oil and gas industry.... security automation in oil and gas companies Controlling risks in industrial operations is a quite difficult task.... In this study the use of security Automation Systems for limiting risks related to the oil and gas industry is critically discussed....
Preview sample
Online Pizza Security
28 pages (7000 words) , Download 2 , Research Paper
The paper 'Online Pizza security' seeks to evaluate online security, which has become the biggest challenge for businesses.... Before we start the discussion on security issues related to online Pizza shop we should be familiar with security and privacy issues involved in online businesses.... This paper covers the detailed analysis of security aspects regarding the project of the online Pizza shop.... This paper is aimed to provide a detailed overview of the main security aspects and imitation we need to consider regarding the online pizza shop....
Preview sample
The Life of Martin Luther in Germany
1 pages (250 words) , Download 2 , Assignment
Free
The author describes the life of Martin Luther in Germany.... The son of a German miner, Martin Luther was born 10th November 1483.... Despite his parent's expectations that he would pursue a legal career, following a near-death experience, Luther decided to follow a religious vocation.... .... ... ...
Preview sample
Internal Building Security Proposal
4 pages (1126 words) , Download 0 , Report
Free
This paper ''Internal Building security Proposal'' tells that Increasing incidents of terrorism and industrial espionage have heightened the threat perceptions for industrial buildings.... However, it is important to install a security system that monitors the internal movements of personnel, and checks on visitors (Dempsey, 2011).... This paper discusses three important aspects of internal security and these are Access control, Surveillance, and Protection of high-value areas....
Preview sample
Financial Analysis for Kroger Co
9 pages (2250 words) , Download 2 , Research Paper
Free
Consumers often prefer branded products in place of national and Kroger has been successful in understanding this need.... Profitability ratio Gross Profit margin = = 1.... 1% Gross margin for the financial year 2012 is 1.... 1% The industry average for gross margin is around 0.... Sales have decreased in the recent years and costs have increased which have contributed towards this fall in gross margin.... Gross margin is the best indicator of how a company is able to cover its costs and Kroger is merely covering its costs....
Preview sample
Transportation and Security administration
11 pages (2750 words) , Download 3 , Research Paper
Free
The paper provides viable courses of actions by providing a better understanding of homeland security, and the roles provided by Transportation and security Administration (TSA) with the responsibilities and practices, policies, equipment, and civilian prospective.... The aim of this study is to provide a solution in identifying different security capabilities for security at airport that affect the citizens of this nation; besides just equipment....
Preview sample
Information Security Management
9 pages (2347 words) , Download 2 , Literature review
Free
This review ''Information security Management'' discusses, that to protect information systems for organization is a complex task as hackers create new vulnerabilities every now and then.... The security devices are updated for only protecting the data and network from the current known threats and vulnerabilities.... MA01 Information security management QUESTION A Before conducting information security risk assessment, there are certain fundamental concepts thatneed to be recalled....
Preview sample
Comparing Malcolm X and Martin Luther King
3 pages (750 words) , Download 2 , Essay
Course Date Comparing Malcolm X and Martin Luther King Throughout in African-American history two individuals shall be never forgotten for their struggle in 1950s - 60s for the rights of their people (Baldwin 25-26).... Those men were Martin Luther King Jr.... ... ... ... and Malcolm X.... Both fought very hard for what they symbolize but in distinct ways....
Preview sample
Career Prospects in National and International Human Rights
5 pages (1591 words) , Download 0 , Essay
Free
There are also human rights career opportunities awaiting one within the European Union Institute for security Studies (EUISS), Court of Justice of the European Communities, and the Global Policy Forum.... The paper "Career Prospects in national and International Human Rights" highlights that career in national and international human rights offers me a wide range of career prospects.... Career prospects in national and international human rights of the of the 4 February Career prospects in national and international human rights ...
Preview sample
Security of Information in Commercial or Business Organisations
15 pages (4680 words) , Download 0 , Literature review
Free
This literature review "security of Information in Commercial or Business Organisations" discusses the management of vulnerabilities in and threats to assets as a major challenge for business organizations.... Therefore, this paper intends to explore some significant security concepts, as well as the existing categories of threats to commercial assets.... It also aims to outline some of the physical, human, and technological countermeasures to the security threats discussed....
Preview sample
Introduction to Windows Security and Vulnerabilities
9 pages (2776 words) , Download 2 , Essay
Free
The paper "Introduction to Windows security and Vulnerabilities" states that with newer versions of the patches being released as research progresses, there is an increased need that users to consistently update their antivirus software in order to protect themselves from security threats.... Practical Windows security Contents Introduction to windows security and vulnerabilities 3 The use of remote procedurecall 5 CVE- 2003-0352 7 Mitigating Factors 9 security solutions 9 Conclusion 10 Reference List 12 Introduction to windows security and vulnerabilities A Windows system is prone to security threats once it is used as an internet server....
Preview sample
Private Security Law
3 pages (750 words) , Download 2 , Essay
Private security law Name: Institution: Abstract Certain kinds of private security conduct may lead to legal liability on the part of the organization.... Private security law Introduction Over the last few years, outsourcing of many policing activities has increased (Pastor, 2007).... Private security agencies have played a vital role in preventing, detecting and investigating instances of crime on the employer's premises (Dempsey, 2010)....
Preview sample
World Cup Security Plan
2 pages (500 words) , Download 3 , Essay
Free
The essay "World Cup security Plan" essentially highlights the way in which the government addresses and answers the imminent security threat the tournament poses.... That is an important issue because of the Brazil poor security rating.... Brazil will host the FIFA World Cup in 12 cities in June 2014, and the tournament is expected to attract both local and foreign fans as well as security threats.... To this end, the government will invest $ 855 million and 57,000 troops towards security for the duration of the tournament (Trevisani 1)....
Preview sample
Denali National Park
4 pages (1000 words) , Download 2 , Essay
Denali national Park and Preserve are located in the interior of Alaska and contains the tallest mountain of America, Mount McKinley, within its precincts.... The national park is a.... In 1917, Mount McKinley national Park was established as a It was renamed as Denali national Park and Preserve in 1980, when under national Interest Land Conservation Act, another 4 million acres were added to it....
Preview sample
Characteristics of a Modern Nation-State
7 pages (1926 words) , Download 2 , Essay
Free
It is made up of a President and national leader of state or government.... In regulating the nuclear expertise and hardware, USA is one of the members of Nuclear security Summit (NSS) that involves in planning Missile shield in Europe.... he European nation was formed as a result of the following events; the idea of Europe that was as a result of the unified empires that exited before 1945, and the 1945-1957 peace forged to lead in terms of security, politics and economics....
Preview sample
The Security Domain in Australia
9 pages (2659 words) , Download 0 , Annotated Bibliography
Free
This paper ''The security Domain in Australia'' tells that security is essential in all aspects of life for effective and efficient progression and growth.... The names of the job titles in the analyzed firms are as follows, assistant security advisor.... At the same time, the paper analyzes the relationship between security employment and academic setting.... security Domain in Australia ... security is essential in all aspects of life for effective and efficient progression and growth....
Preview sample
The Security Risk Management
7 pages (2267 words) , Download 2 , Term Paper
Free
The paper entitled 'The security Risk Management' presents the provision of security which involves both the private and public forms of services.... Promoting Sector Skills in security Risk Management ... he provision of security involves both the private and public forms of services.... The training enable the private an public security firms attain the goals developed by the security sectors in the different countries, nations and states within which they are established (SFS, 2010). ...
Preview sample
Information Security Plan
15 pages (4378 words) , Download 1 , Case Study
Free
security Plan MIR [Pick the COMPANY INFORMATION Telemarketing are firms that direct market the product to the s, and sale representatives are hired to directly talk to the customers and sell the product.... rganizations are created by people, buildings and procedures, and these three ingredients can perform well only if they are assure of their security.... From the exchange of information for communication purpose to the exchange of secrets pertaining to the security of countries, cyberspace has become the medium of choice for everyone....
Preview sample
National Labor Relations Board
1 pages (331 words) , Download 2 , Case Study
Free
The case "national Labor Relations Board" features NLRB's involvement in a Construction Contractor case, in Lakewood, Washington.... The NLRB had a justifiable reason to protect the employees based on the labor relations Act (national Labour Relations Board, 2014)....
Preview sample
Elements of Security System
1 pages (250 words) , Download 2 , Coursework
Free
This paper explains the reason and how security strategy as a key element might require being updated as a perfect way of addressing security risks associated with various business environment.... When migrating to an email system that is cloud-based, updating security strategy would be important to avoid possible risks associated with the increase concern on hosted email services due to the associated benefits.... Elements of security System An understanding of each of the seven key elements of a security system is important....
Preview sample
Homeland Security Organization
6 pages (1500 words) , Download 2 , Book Report/Review
Free
This book review "Homeland security Organization" talks about the technologies which are being used for security purposes and their usage and acceptance from the point of view of people on whom they are being used.... The article Technology, security, and individual privacy: New tools, new threats, and new public perceptions is a standard research article which has definite research questions, relevant assumptions and hypothesis, well explained research methodology which includes how the data has been collected, the obtained results and their implications etc....
Preview sample
Comparing and Contrasting Security Threat Assessment and Security Risk Assessment
6 pages (1847 words) , Download 0 , Literature review
Free
The author of the "Comparing and Contrasting security Threat Assessment and security Risk Assessment" paper compares and contrasts the security threat assessment and security risk assessment for contemporary security and intelligence professionals.... The essay has compared and contrasted security threat assessment and security risk assessment for contemporary security and intelligence professionals....
Preview sample
Internet Security Article
1 pages (250 words) , Download 3 , Article
Free
Because of internet, there are many global internet security concerns.... Global internet security is a concern for all the world because due to internet, where people have gained many benefits, there are also many disadvantages such as internet fraud, loss of security and privacy, virus attacks, spamming, threat to data protection and computer misuse.... Because of internet, there are many global internet security concerns....
Preview sample
National Risk Register of Civil Emergencies
6 pages (1769 words) , Download 1 , Case Study
Free
ased on this report, other risks with a high probability of occurrence in the UK are severe weather, major industrial accidents, animal diseases, transport accidents, disruptive industrial action, cyber security, unconventional attacks, public disorder and attacks on infrastructure and public places.... Of interest in the following paper "national Risk Register of Civil Emergencies" is the risks assessed in the register, risk qualification and quantification, main results from the assessment, and the difference in practice in response to the paper....
Preview sample
Azerbaijan's Role in European Unions Energy Security
15 pages (3750 words) , Download 2 , Literature review
Free
The review 'Azerbaijan's role in the European Union's Energy security' concerns one of the basic challenges of the EU looking for alternatives to support its energy sector.... European Union's Energy security and Azerbaijan's role ... nergy security is one of the main challenges facing the development of the EU.... European Energy security ... Issues in European Energy security ... Azerbaijan's collaboration with neighboring countries in EU's Energy security diversification ...
Preview sample
Information Security Management
1 pages (250 words) , Download 5 , Assignment
Free
The writer of the paper "Information security Management" gives detailed information about the Systems security Engineering Capability Maturity Model (SSE-CMM) security management framework considering and analyzing the diagram giving at the beginning of the paper.... Information security Management Insert Insert Question Consider the diagram above from the Systems security Engineering Capability Maturity Model (SSE-CMM) security management framework....
Preview sample
Computer Security Licensing
6 pages (1686 words) , Download 2 , Essay
Free
The paper "Computer security Licensing" states that generally, computer users should be taught on the varied solutions to computer problems.... Users should, therefore, be taught the various Computer security measures such as encryption of computer software to prevent and reduce fraud and fraud-related acts.... COMPUTER SCIENCES AND INFORMATION TECHNOLOGY ID, LAST A report on computer security licensing Computer sciences and information technology ...
Preview sample
Network Security Questions
2 pages (500 words) , Download 3 , Assignment
Free
When installations are done based on the default settings of the system, there is no regard for network security and the default configuration is not reset.... otnet are pieces of malware, which infect victims by contacting Assignment, Computer sciences and Information technology Network security Questions Question How to mitigate Configuration WeaknessesIn order to mitigate the weaknesses with network configuration, the first step is to identify the causes.... auses of configuration weaknessesWhen installations are done based on the default settings of the system, there is no regard for network security and the default configuration is not reset....
Preview sample
National Rifle Association
7 pages (1912 words) , Download 1 , Essay
Free
In addition, the association aims to, through its activities, to promote public safety, law and order and national defense.... This work called "national Rifle Association" describes an American non-profit association that promotes firearm competency, safety, and ownership including police training, marksmanship, hunting, and self-defense training in the United States.... national Rifle Association Number Goals, Charter and Mission ments The national Rifle Association of America (NRA) is an American non-profit association which promotes firearm competency, safety and a\ownership including police training, marksmanship, hunting and self-defense training in the United States....
Preview sample
Information Security Plan
12 pages (3385 words) , Download 2 , Research Paper
Free
This research ''Information security Plan'' delves on the information security risks.... The research delves on the on implementing programmes that will reduce or eliminate information security threats in an Australian company setting.... The company has information security risks.... Information security Plan's safeguarding of company assets policy ensures the Australian company's business continuity.... As recently appointed head of a security team that is responsible for protecting the information holdings of a business organisation of some 60 staff, the head current task is to ensure the safeguarding of the company's holdings....
Preview sample
GSM Phone Security
10 pages (2875 words) , Download 0 , Coursework
Free
The writer of the paper 'GSM Phone security' states that there are specific attacks that can be done on the GSM phone.... GSM PHONE security Table of Contents Table of Contents 2 Executive Summary 3 Introduction 4 Wireless Networks security Features 4 GSM Networks security Mechanisms 6 ... The A5/3 is the most recent standard and has proven to better than the previous standards in terms of security but has its loopholes too. ...
Preview sample
Is a nation has an obligation to go to war
3 pages (750 words) , Download 2 , Essay
Although this is a philosophical question which has different interpretations, this paper will attempt to summarize the basic assumptions in this field while presenting a personal view on this problem based on the thesis that a nation has an obligation to go to war if a situation threatens its existence as a unity, or if it threatens its security and national safety.... Every nation relies on its own 'common sense' which means prudent and reasonable policy towards other nations through the lenses of its own security and safety....
Preview sample
Attacking Cryptography Computer Security
6 pages (1627 words) , Download 3 , Report
Free
This report "Attacking Cryptography Computer security" discusses computer operating systems that use various data protection methods to prevent any form of malware and spyware from getting access to the data stored into a computer or a computer network.... Attacking Cryptography Computer security Table of Contents Introduction 2.... Various computer security firms provide information about data protection methods, encryption and decryption being one of them (Echizen, Kunihiro & Sasaki, 2010)....
Preview sample
Security Best Practices
2 pages (567 words) , Download 2 , Case Study
Free
From the paper "security Best Practices" it is clear that the information located on the NIST document is extremely helpful to organizations that use information systems in their dealings, and the fourth student did a marvelous job of explaining this.... The paper will discuss security best practices for these three topics mentioned above.... Information security OfficerThe first thing that every security program should do is establish the existence of the Information security Officer (Putvinski 1)....
Preview sample
Rational Approaches to Organizations
6 pages (1811 words) , Download 0 , Coursework
Free
To take specific examples, the cases of GM (General Motors) and the United States Government along with the NHS (national Health Service) in the United Kingdom are instances of organizations that practice rational approaches to HRM and this is mainly due to the fact that these organizations have a well defined structure and are tightly coupled with clear boundaries with the environment in which they operate....
Preview sample
National Transportation Safety Board
4 pages (1000 words) , Download 2 , Case Study
Free
This paper "national Transportation Safety Board" focuses on the fact that American Airlines Flight 191 was a passenger flight that was regularly scheduled from O'Hare International Airport in Chicago to Los Angeles International Airport (Kilroy, 2012).... The national Transportation Safety Board (NTSB) took the responsibility of determining the probable causes of the accident and made recommendations to prevent future incidences.... national Transportation Safety Board ...
Preview sample
National Health System
3 pages (750 words) , Download 4 , Assignment
Free
national Health Systems Name Institution national Health Systems According to Carey and Baribault (1999), the number of United Kingdom citizens seeking quality medical care has increased in the recent times compared to five years ago.... national Health Systems national Health Systems According to Carey and Baribault (1999), the number of United Kingdom citizens seeking quality medical care has increased in the recent times compared to five years ago....
Preview sample
Martin Luther King Jr
1 pages (250 words) , Download 3 , Essay
Free
Martin Luther King Jr.... In his speech, he stated that no matter how long it takes, justice and fairness continues to improve amongst people in society.... This paper builds and proves that the.... ... ... The civil rights movements in the 1960s fought hard for economic equality of all people despite the color of their skins (Brands et....
Preview sample
Trust, Paradigm, and Knowledge Appreciation as Leadership Factors
11 pages (2750 words) , Download 2 , Research Paper
Free
Leadership factors such as trust, and employee, paradigm and knowledge appreciation go a long way in fostering organizational success. ... The paper explores leadership as one of the most critical skills in management.... In an organization, persons in leadership positions direct the organization so as to make it more coherent and cohesive by utilizing their leadership attributes....
Preview sample
Rational Way to Approach Morality
9 pages (2461 words) , Download 2 , Case Study
Free
there is no need to assume that we are ever needing to sacrifice liberty for equality by ensuring people's security.... But people's security is necessary to ensure the social contract itself, and as such it is more important for a person to sacrifice the liberty to completely consume themselves in being able to keep every last advantage gained through their actions and to ensure other's security....
Preview sample
IPad's Security Breach
4 pages (1000 words) , Download 2 , Essay
Running Head: iPad's security BREACH AT&T‘s iPad's security Breach [Name of Student] [Name of Institution] Introduction In June 2004, Apple suffered an embarrassment when a security breach exposed personal details of its iPad's owners, among them influential politicians, businessmen, corporate CEOs, and the U.... This hacking was the work of a website security group called Goatse security, which shared the iPad's users IDs and personal information with a media firm called Gawker Media, LLC (Tate, 2011)....
Preview sample
Investment Report Issues
6 pages (1628 words) , Download 2 , Essay
Free
Based on the Portfolio Theory, it is clear that the combination of assets that are not closely tied in terms of appreciation and depreciation allows investors to limit the risks they expose their investments to different industries.... Based on the Portfolio Theory, it is clear that the combination of assets that are not closely tied in terms of appreciation and depreciation allows investors to limit the risks they expose their investments to provided that different industries are affected differently by economic factors....
Preview sample
Data Security Policy and Effective W5 Security System
5 pages (1528 words) , Download 2 , Essay
Free
The paper "Data security Policy and Effective W5 security System" discusses that privacy is the freedom individuals have to be left alone both at home and at work, free from observation or intrusion by other individuals or the State, or in the case of organizations, from the State.... The following pages present an analysis of the Data security Policy and comprise detailed analysis and recommendations regarding the improvements to our department's data security policy....
Preview sample
Safety and Security in Health Care
4 pages (1000 words) , Download 2 , Assignment
Free
The aim of the paper 'Safety and security in Health Care' is to the initiative of ensuring safety in the units.... afety and security in Health Care ... Protection and security in the various paces of work has been advocated over the years.... he aim of the paper “Safety and security in Health Care” is to the initiative of ensuring safety in the units. ... hy is a national tracking agency for licensed physicians necessary? ...
Preview sample
Disseminating Organizational IT Security
8 pages (1914 words) , Download 2 , Essay
Free
This paper ''Disseminating Organizational IT security'' tells that The main task is to help advance the security of the company's IT infrastructure after a chain of network security breaches.... Disseminating Organizational IT security and Troubleshooting Best Practices In this paper, we are going to show how the information technology (IT) section plays an essential role in the operation of a well-run company.... ompanies must be cautious of security breaches....
Preview sample
Problem of Cyber Security
1 pages (305 words) , Download 22 , Essay
Free
The essay "Problem of Cyber security" focuses on the critical analysis of the problem of cyber security.... Such situations include security breaches, spear phishing, and social media fraud.... Ensuring cyber security is the role of every individual as everyone must ensure it is safer, more secure, and resilient (Marshall, 67).... Cyber security refers to the body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access....
Preview sample
2951 - 3000 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us