Security Essays
The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.
Security Essays & Related Services
9/11’s Impact on Security
Example essay. Last modified: 8th Feb 2020
The world is very much different, following the September 9th, 2001 terrorist attacks against the United States., and the entire concept of flight and the image of flight by most Americans was co...
A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks
Example essay. Last modified: 8th Feb 2020
Abstract Social engineering has increased the vulnerabilities in today’s technological world. There are six types of social engineering attacks; baiting, phishing, email hacking and co...
Addressing Challenges of Security Risk Management in Computer Security
Example essay. Last modified: 24th Nov 2020
The practice of security risk management (SRM) begins with a thorough and well-thought-out risk assessment [1]. In order to identify risks, we need to consider the assets that are important to the organisation and / or individual...
Advantages and Disadvantages of RFID Tags on Students
Example essay. Last modified: 18th May 2020
Advantages and Disadvantages of RFID Tags on Students To tag school children with RFID chips is uncommon, but not new. Schools have been implementing RFID tags for what appears to ...
An Examination of the National Security Agency and Central Intelligence Agency
Example essay. Last modified: 18th May 2020
An Examination of the National Security Agency and Central Intelligence Agency Today the United States faces threats from multiple countries, organization, and individuals throughout the...
An Overview of Security
Example essay. Last modified: 21st Apr 2017
Security Introduction Security is the level of imperviousness to, or insurance from, damage. It applies to any powerless and profitable resource, for example, an individual, staying, group, country, ...
An Overview of the National Infrastructure Protection Plan
Example essay. Last modified: 24th Nov 2020
Before the horrific terrorist attacks on September 11, 2001, the United States did not have a full governmental infrastructure plan. Once Al Queda showed that they can use aircraft as weapons to destroy important critical infrastructure the President and the Whitehouse sprang into action....
Analysis of online user protection
Example essay. Last modified: 30th Jul 2021
Recently a large number of PCs were affected by a virus, causing a work stoppage among the administration and accounting department. Following this incident of large scale virus infection, the company management has decided to completely review all the computer security precautions and procedures in use within the organisation....
Analysis of the United States' National Security Strategy
Example essay. Last modified: 8th Feb 2020
“Analyse the documents key tenets in light of contemporary events; does the disposition outlined therein still inform US policy today? Do the arguments still frame the debate on sovereignty? Ha...
Analysis of World Security & the Factors Affecting Global Safety
Example essay. Last modified: 6th Aug 2021
This article describes the issue of world security and then analyses the factors affecting global safety. This research focuses on three related factors of global security that are ‘gun violence’, ‘terrorism’ and ‘racial discrimination’...
Analyzing United States Infrastructure Cyber Readiness
Example essay. Last modified: 18th May 2020
Analyzing United States Infrastructure Cyber Readiness During the Cold War, the United States was worried about the possibility of a nuclear attack, an imminent land invasion by Russians...
Annotated Bibliography on Cyber Security
Example essay. Last modified: 8th Feb 2020
Introduction to cyber security Cyber-security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s o...
Annotated Bibliography: Swetman Security Service Homeland Security Threat Preparedness Assessment
Example essay. Last modified: 18th May 2020
Annotated Bibliography: Swetman Security Service Homeland Security Threat Preparedness Assessment Caruson, Kiki & MacManus, Susan A. (2005). Homeland security preparedness: Federal a...
Are managerial skills more importance than specialist knowledge for security managers
Example essay. Last modified: 3rd Aug 2021
Within this study, the intention is to address the question of whether managerial skills are of more importance than specialist knowledge for security managers. It is the author’s opinion that the likely conclusion of the research undertaken is that, although managerial skills are of paramount importance to a security manager, because of the delicacy of their position a high level of specialist skills are also essential....
Are Whistleblowers Making the Right Choice to Leak Government Information
Example essay. Last modified: 7th Sep 2021
The purpose of this article is to examine whether whistleblowers made the right choice in deciding to leak top secret government information. Are these whistleblowers heroes for making the world aware of the grotesque acts that the United States government affiliated to both America and the rest of the world?...
Boeing Security Mechanisms
Example essay. Last modified: 23rd Sep 2019
1. Some virtual teams at Boeing have discussions focused on military aircraft. Do some Internet research on UC security mechanisms and identify and briefly describe several that Boeing should ha...
Business Proposal to Porivde Cyber Security Protection
Example essay. Last modified: 18th May 2020
Table of Contents 1. Executive Summary 2. Background 3. Proposal Option 1 Do nothing Option 2 Build a Cyber security team Opti...
Causes of Private Security Industry Growth
Example essay. Last modified: 13th Jul 2018
The increase in criminal activity and the heightened fear of crime, has led to the growth of the private security industry. This paper will address the expansion of private security and discuss the e...
Causes of the British Public's Hostility to Migrants
Example essay. Last modified: 29th Mar 2019
“‘Brexit’ and the ‘migration crisis’ are just the most recent examples of migrants being presented as a threat.’” Discuss with reference to securitisation literature. In recent years...
Causes of the Spread of Islamic Terrorist Groups
Example essay. Last modified: 8th Feb 2020
Account for the spread and expansion of Islamic terrorist groups in the contemporary world. Following a peak in 2014, deaths from terrorism have fallen for the third cons...
Challenges in Predicting Terrorism
Example essay. Last modified: 13th Jul 2018
Evaluate the claim that however thoroughly the security manager plans and prepares, acts of terrorism are always unpredictable and this makes terrorism a form of risk that is ultimately impossible to...
Challenges to Combating Domestic Terrorism in the US
Example essay. Last modified: 25th Mar 2019
Combating Domestic Terrorism: A Problem-Solution Analysis Abstract The biggest problem faced today in United States Homeland Security is combating both domestic terrorism and lone wolf terroris...
Challenges to Fighting Transnational Terror Networks
Example essay. Last modified: 19th Mar 2019
Traditional State Power limitation in dealing with Transnational Terrors Networks: and the role of Social Media Governments have been phased with challenging situations when implementing effective...
Combating Criminal Narcotics Activity along the Southern Border
Example essay. Last modified: 18th May 2020
Combating Criminal Narcotics Activity along the Southern Border Human trafficking and drugs action in the southern part of Texas outskirt is the significant issues centered for this situ...
Comparison between Homeland Security and Homeland Defense
Example essay. Last modified: 3rd Dec 2020
This paper will explore published articles discussing missions, tasks, operations, and areas of responsibility for homeland security and homeland defense. The similarities between the two will be highlighted and discussed as well...
Comparison between Realist and Liberal Views on Security
Example essay. Last modified: 24th Nov 2020
This essay shall attempt to answer the question on whether one tends to favour a realist or a liberal vision of security? This will be done by providing a brief description of both theories and their limitations before a conclusion to answer the question....
Computer and Network Security Threats and Techniques
Example essay. Last modified: 18th May 2020
When talking about computer and networking security threats, TCP/IP is at the forefront of it all. When TCP/IP was designed by ARPANET in 1983. The US Department of Defense made TCP/IP model the ...
Computer Security Incident Response Team Incident Handling
Example essay. Last modified: 8th Feb 2020
A Computer Security Incident Response Team (CSIRT) is an association or team that gives, to a well-characterized constituency, administrations and backing for both avoiding and reacting to comput...
Critical Thinking, Homeland Security, and Domestic Terrorism
Example essay. Last modified: 8th Feb 2020
Critical thinking is lacking in modern society. Modern society has become the age of social media and ten second media clips. Many wait to be told what to think, feel, or believe, instead of part...
Cryptography and Network Security Applications
Example essay. Last modified: 28th May 2019
Part I – Cryptography and Data Security Role of Cryptography in Securing Data Cryptography plays a key role in securing any company’s online data. Encryption is the most widely used met...
Cyberattack on the Nuclear Power Plant of Iran
Example essay. Last modified: 8th Feb 2020
Research Paper Abstract “Cyberattack on the nuclear power plant of Iran– What went wrong in the whole cybersecurity communication there” ...
Cybersecurity Essay: The Importance of Cybersecurity
Example essay. Last modified: 18th Jan 2023
This essay discusses the importance of cyber security in today's digitally enabled world, citing a range of academic sources....
Cybersecurity System Security Report for Successful Acquisition
Example essay. Last modified: 18th May 2020
Executive Summary In the coming months Netflix (NFLX), a media and entertain company will begin to facilitate the merger and acquisition (M&A) of SoundCloud (SC) a small media ...
Data leakage
Example essay. Last modified: 1st Jan 2015
Data leakage is the “unauthorized or unintentional exposure, disclosure, or loss of sensitive information” (GAO, 2007, p.2). Many businesses have in their control sensitive data about thei...
Data Mining techniques
Example essay. Last modified: 16th May 2017
ABSTRACT Competitive advantage requires abilities. Abilities are built through knowledge. Knowledge comes from data. The process of extracting knowledge from data is called Data Mining. Da...
Database security and encryption
Example essay. Last modified: 18th May 2017
Introduction Organisations are increasingly relying on the distributed information systems to gain productivity and efficiency advantages, but at the same time are becoming more vulnerable to security...
Department of Defence's Role in Homeland Security
Example essay. Last modified: 18th May 2020
Winslow, Timothy J. 2014. The DoD Role in Homeland Security: Past, Present, and Future. Homeland Defense and Civil Support Journal. Spring2014, Vol. 3 Issue 1, p60-73. 14p. Retrieved fro...
Department of Homeland Security: Cybercrime and Risk Management
Example essay. Last modified: 16th Mar 2021
As DHS progresses, it will need to address its leadership and coordination of the HSE. In providing guidance and organizing activities among its stakeholders, DHS has made significant progress....
Discretion in Law Enforcement
Example essay. Last modified: 4th Oct 2017
The Use of Law Enforcements Discretion Discretion is the ability to change from a previous set plan, rule, or action. It is used in many peoples work and personal life every day. In law enforcement, ...
Drone Technology: Uses and Ethics
Example essay. Last modified: 20th May 2019
In the last several years, humanity has seen great advancements in technology. From the creation of smartphones to all-electric cars, technology is advancing at a faster pace with each passing day. O...
Effect of 9/11 on Safety in the US
Example essay. Last modified: 18th May 2020
Is America Safer Now Than Before 9/11 Our country has suffered from multiple, devastating events. One of the most catastrophic events includes the September 11 attacks that were a ...
Electronic Surveillance in Intelligence Services
Example essay. Last modified: 13th Jul 2018
Overview It will be argued that the increased use of electronic surveillance is unlikely to lead to the demise of human intelligence sources, this assignment will show that the two will work together...
Ethical and Moral Issues in Surveillance Technology
Example essay. Last modified: 13th Jul 2018
Surveillance technology: The ethical and moral dilemma Introduction The global increase in terrorist atrocities, such as 9/11 in the United States and 7/7 in the United Kingdom, have undoubtedly led...
Evaluation of UK Responses to Terrorism
Example essay. Last modified: 8th Feb 2020
Identify and evaluate models of responses employed by police and other agencies of the criminal justice system. Introduction – The Prevent Program Islamic radicaliz...
Female Motivations for Terrorism and Gendered Counter Terrorism
Example essay. Last modified: 22nd Mar 2019
Female Agency & Motivations Before venturing into gendered approaches to countering terrorism, it is useful to provide a brief summary of female motivation and mobilizati...
Future Challenges to Homeland Security
Example essay. Last modified: 18th Mar 2019
Abstract Since the creation of The Department of Homeland Security, we have seen many challenges, changes, and growth. As we move forward in a society that is technology driven there will be conti...
Global Finance Incorporated: Security Risk Assessment
Example essay. Last modified: 8th Feb 2020
Contents I. Background Purpose Risk Impact III. Network Office Topology Network Security Access Points Internal Access Exte...
Hacking and Cyber Power: The Internet in China
Example essay. Last modified: 18th May 2020
Rough Draft: Hacking and Cyber Power: The Internet in China Introduction With the rise in foreign election interference via the internet in recent years many have their ey...
Hazard Analysis on Terrorist Attacks of 26/11 in India
Example essay. Last modified: 3rd Dec 2020
This paper will analyze the attacks & further try to provide an optimum solution to minimize damages from such sieges in future....
Hezbollah: Training and Funding Methods
Example essay. Last modified: 18th May 2020
The purpose of this paper is to examine a terrorist organization that is likely to conduct an attack within the United States. This paper will analyze the terrorist group Hezbollah and its fundin...
History and Impacts of 9/11
Example essay. Last modified: 8th Feb 2020
Embracing Complexity It was a typical day for Mrs. Harner at Souderton Area High School when she turned on CNN 10 for her students. A few minutes in, one of her coworkers abruptly entere...
History and Origins of ISIS
Example essay. Last modified: 11th Feb 2019
Since the last United States (US) presidential elections, there has been a raise in hate speech and crimes, frequently by right-wing parties and often directed towards Muslims, there has also been an...
History of Border Patrol in the US
Example essay. Last modified: 19th Feb 2019
Introduction Turn on the television today and one of the stories popular in the media is President Trump’s border wall which is aimed at curbing crimes. One of the crimes in question is illegal ...
Homeland Security Emergency Management Mitigation, Preparedness, Response, and Recovery
Example essay. Last modified: 18th May 2020
Abstract Preparedness is a state of readiness. Preparedness is the most important part of emergency management. This paper will explore the four phase of homeland security emergency mana...
Homeland Security Responses to Chemical, Biological, Nuclear, and Explosive Terrorism
Example essay. Last modified: 8th Feb 2020
Extremism is a concern that extends back to theological times. During the course of olden times, extremist has been involved in acts of ferocity to advance governmental causes, such as conquering...
How Can States Respond Effectively to Cyber-attacks Originating Beyond Their Own Borders?
Example essay. Last modified: 18th May 2020
How can states respond effectively to cyber-attacks originating beyond their own borders? Compare and evaluate the responses of two or three different governments. The three states that ...
How Deradicalization Impacts Terrorist Groups
Example essay. Last modified: 15th Feb 2019
How can the intelligence community use deradicalization to impact the effectiveness of Hezbollah? The intelligence community is vital to building cohesive infrastructure and peaceful societies. ...
Human Security in the Balkans
Example essay. Last modified: 8th Feb 2020
Since the fall of the Soviet Union, Eastern and Central Europe have gradually become westernized. One of the biggest sites where westernization is occurring is of the former Yugoslavia, which had...
Identifying & Mitigating Wi-Fi Eavesdropping
Example essay. Last modified: 23rd Sep 2019
Security Report: Identifying & Mitigating Wi-Fi Eavesdropping Introduction As much as we enjoy our interminable connectivity over Wireless networks, i...
Impact of Satellites on Cyber Threats
Example essay. Last modified: 8th Feb 2020
Technology has experienced an exponential growth beyond the imaginations of most of us. It’s part and parcel of our daily lives. This evolution has led to an even heavier dependence on space a...
Impact of Social Media on Surveillance Culture
Example essay. Last modified: 4th Mar 2019
Evaluating the Impact of Online Social Networking on Surveillance Culture Online networking sites such as YouTube, Twitter, Facebook or Instagram are being used immensely as of late. Their prevale...
Impact of Surveillance on the Individual
Example essay. Last modified: 23rd Sep 2019
While there is an implicit assumption in the literature that surveillance has ‘impacts on the individual … surveillance studies have not yet developed a take on the surveilled subject’...
impacts of the War on Terror on the Policing of US Borders
Example essay. Last modified: 21st Nov 2017
“Some nations need to be more vigilant against terrorism at their borders if they want their relationship with the U.S. to remain the same” (Former Secretary of State Colin Powell, September 20th...
Importance of Timely Dissemations in Information Sharing
Example essay. Last modified: 8th Feb 2020
Timely Intelligence Dissemination Abstract The intelligence, information sharing, and timely dissemination within the intelligence community provide necessary methods to allow e...
Improved Information Sharing for Cyber Threats
Example essay. Last modified: 18th May 2020
Abstract This paper discusses the need for improved information sharing amongst industries for the continued prevention of cyber threats and improved threat intelligence. This will speci...
Improving Risk Management in Departmnet of Defense Government Contracting
Example essay. Last modified: 23rd Sep 2019
IMPROVING RISK MANAGEMENT IN DEPARTMNET OF DEFENSE GOVERNMENT CONTRACTING: ESTABLISHING A CYBER SECURITY GRANT PROGRAM I. Introduction II. Background: The Current Cybersecurity...
Information Security
Example essay. Last modified: 1st Jan 2015
Introduction The requirements of information security with in an organization have undergone major changes in the past and present times. In the earlier times physical means is used to provide securit...
Information Warfare Attack Vectors and the Influence upon Democratic Elections
Example essay. Last modified: 8th Feb 2020
Abstract The purpose of this study is to determine if there are effective information warfare strategies capable of influencing voters and whether specifically Twitter can use those stra...
Intelligence Analysis Project: Online Persuasion Tactics by Terrorist Groups
Example essay. Last modified: 8th Feb 2020
Executive Summary The Internet has readily become one of the most widely accepted forms of modern technology, due to its universal applicability and the abundance of information pl...
Intelligence and National Security: Article Review
Example essay. Last modified: 23rd Sep 2019
Introduction: For the week five assignment a review of the following two articles was performed. Article 1, comes from the journal Intelligence and National Security. This a...
Intelligence Cycle in Counter Terrorism
Example essay. Last modified: 23rd Sep 2019
Introduction Now more challenges are confronting the Intelligence Community (IC) than ever before. In some cases, the IC struggles to use their most key component to recognize and anal...
Intrusion Detection Systems in Security
Example essay. Last modified: 21st Apr 2017
Abstract Modern world provide the latest system of internet which is disputing for the security of information systems. The defense of information is becoming the part and parcel for internet day by d...
Investigation into Cyber Security Countermeasures
Example essay. Last modified: 18th May 2020
Investigation into cyber security countermeasures Introduction Data security and morals has been seen as one of the chief regions of concern and enthusiasm by scholastic analyst...
Investigation of the Satanic Temple
Example essay. Last modified: 18th May 2020
A description strategy will show the contour this agenda shows how each of the above six modules put together creating who are The Satanic Temple. The Satanic Temple based on the ...
Irish Legislation and how it relates to the Role of Door Personnel
Example essay. Last modified: 23rd Sep 2019
Irish Legislation and how it relates to the Role of Door Personnel Introduction: Day after another Door Security personal taking a big role impacting our daily life so ensurin...
Is Mass Surveillance Unethical?
Example essay. Last modified: 4th Mar 2019
Surveillance is no different from the casual practice of people watching, but instead of being a casual practice that might occur at one park, or at one restaurant, mass surveillance is sustained ove...
Is Privacy Still Private?
Example essay. Last modified: 3rd Dec 2020
“Privacy is not something that I'm merely entitled to, it's an absolute prerequisite” (Marlone Brando). The citizens of Oceania are under constant surveillance; the Party wants to make sure they are following all the rules....
Is Terrorism a Serious Threat to International and National Security?
Example essay. Last modified: 8th Feb 2020
The threat of international terrorism has affected global security in different ways as scholars and governments have responded to the challenge by taking concrete steps to conceptualize and ulti...
Issue of Military Force in Counter-Terrorism
Example essay. Last modified: 18th May 2020
The use of military force in counter-terrorism is controversial because it can result in adverse political, strategic, and ethical consequences.[1] Various counter-terrorism strategies have been ...
Issues of Controlling State Borders
Example essay. Last modified: 8th Feb 2020
Can states really control their borders? In the current era of economic globalisation, and the increase of the flow of trans-border trade between sovereign states has bec...
Jurisdictions and Functions of the FBI
Example essay. Last modified: 18th Feb 2019
The criminal justice system consists of several government agencies whose work is to track, capture, and punish criminals. These agencies each have their roles, responsibilities, and jurisdictions wh...
Legal Measures Against Cyber Crimes
Example essay. Last modified: 8th Feb 2020
A Leash on Persistent Threats Legal measures against cyber crimes With the revolutionary growth in the number of ICT service providers and users, this globally-interconnecte...
Limitations of Access Control Lists in Network Security
Example essay. Last modified: 13th Jul 2018
On the Limitations of Access Control Lists (ACL’s) in Network Security In basic security parlance, the Access Control List (ACL) directly determines which parties can access certain sensitive areas...
Main Security Threats in the 21st Century
Example essay. Last modified: 18th May 2020
As the world is living in the 21st century and it is growing faster, where the number of threats is also increasing faster. Due to the numerous security threats, it is necessary for a human to pr...
Managing Intelligence in National Security
Example essay. Last modified: 13th Jul 2018
At which stage of the ”intelligence cycle” is failure most likely to occur, and why? The most common, traditional paradigm for managing intelligence ‘flow’ is a cycle of four componen...
Manufacturing Processes for Plastic Bottle Caps
Example essay. Last modified: 18th May 2020
INTRODUCTION A bottle cap is used to seal gap of a bottle. Usually brand name of company which invents bottle come on the top of bottle. Bottle caps were initially intended to be squeeze...
Mental Health and Lone Actor Terrorism
Example essay. Last modified: 8th Feb 2020
Abstract The growing threat of lone actor terrorism in the United States is increasing. Lone actors have been shown to be more likely diagnosed with a mental disability than the general ...
National and International History and Evolution of the Private Security Industry
Example essay. Last modified: 23rd Sep 2019
The National and International History and Evolution of the Private Security Industry Introduction: The term and the concept of private security is oftentimes considered to be ...
National, International History and Evolution of Security
Example essay. Last modified: 23rd Sep 2019
The National, International History and Evolution of Security Introduction The purpose of this document is to complete the Security and Guarding assignment on “The National and Internatio...
New Theoretical Approaches Around the Concept of National Security
Example essay. Last modified: 16th Mar 2021
The leading purpose of this essay is to seek a viable disentanglement to the concept of Security through the analysis of the empirical concerns it historically implies....
Oklahoma City Bombing and Development of Government Security
Example essay. Last modified: 16th Mar 2021
The Oklahoma City bombing on April 19th, 1995 was the causal factor that prompted the introduction of a standardized minimum physical security requirement for all non-military, federally owned, leased and occupied buildings and installations across government....
Operation Buckshot Yankee
Example essay. Last modified: 13th Jul 2018
Operation Buckshot Yankee: The Primary Point of Weakness By Jeffrey Higa Abstract Operation Buckshot Yankee is a catastrophic event that was a turning point in cyber security for the U.S. governme...
Overview of Boko Haram: History, Impact and Methods
Example essay. Last modified: 3rd Dec 2020
The paper is aimed at highlighting the way Boko Haram dramatically evolved deprived of undertaking fierce attacks. In 2002, the organization was established by the group commander, Yusuf....
Overview of Insider Trading
Example essay. Last modified: 10th Jan 2018
Insider trading is the trading of a corporation’s stock or other securities (e.g. stock options or bonds) by individuals related to the company with potential access to non-public information about ...
Position Paper on Strategy Options in Vietnam
Example essay. Last modified: 23rd Sep 2019
Position Paper on Strategy Options in Vietnam 1. The latest attacks on our troops and the rapid deterioration in the security situation in Vietnam made the White House (WH) administrati...
Primacy: The Real Protection from Cyber Attack
Example essay. Last modified: 8th Feb 2020
The “sum of all fears” for the American nation for the last five decades was the nuclear weapon detonating on American soil. The threat was then replaced by the terrorist goal of bringing ter...
Proactive Network Defence Techniques in Security Attacks
Example essay. Last modified: 13th Jul 2018
1. Introduction Network Security in the twenty-first century is one of the critical aspects for the effective management and protection of the enterprise data alongside its sustained operations (Stal...
Psychological Aspects of Cybersecurity
Example essay. Last modified: 4th Oct 2017
Human Factors, Threats, Culture and Liability: Psychological Aspects of Cybersecurity Introduction In today’s society, cyber intrusion and attacks is becoming more prevalent. No one really knows the...
Recruiting Local Nationals in Expatriate Security Companies
Example essay. Last modified: 13th Jul 2018
Title Sustained outbreaks of violence in different areas of the world have opened up extensive opportunities for specialised security companies. One of the greatest challenges facing expatriate secur...
Recruitment Methods of ISIS
Example essay. Last modified: 11th Feb 2019
Abstract This paper covers a small area of topics on the infamous organization, the Islamic State of Iraq and Syria (ISIS). These topics include: a brief history of the organization, who ISIS is r...
Report of Computer Forensics Investigation Plan
Example essay. Last modified: 20th Aug 2021
The report aims to include computer forensics investigation plan for the organization to understand the issue and also covers security policy for the organization....
Review of Supervisory Control and Data Acquisition (SCADA) Networks
Example essay. Last modified: 18th May 2020
Abstract Supervisory Control and Data Acquisition (SCADA) networks are used across the globe to manage commercial and industrial control systems connected to energy, water and telecommun...
Risk Assessment and Management of the Giants Stadium
Example essay. Last modified: 8th Feb 2020
1. Introduction The purpose of this report is to critically analyse and evaluate the risk management of the venue, the Giants Stadium. This paper will also suggest recommendations to en...
Risk of Cyber Warfare Attack on Power Grids
Example essay. Last modified: 8th Feb 2020
In today’s society, we have become accustomed to the advancing of new technology in order to keep up with our everyday lives. It is almost impossible to function in the world today without the ...
Robert Bowers’ Reasoning for Terrorism
Example essay. Last modified: 18th May 2020
Understanding the psychological and behavioral factors of individuals who are prone to committing acts of terrorism could be the key to learning how to minimize the receptivity of these individua...
Role of Security in the United Kingdom
Example essay. Last modified: 29th Mar 2019
The concept of security is not a new one; scholars have catalogued its emergence from as far back as the Neolithic Revolution where the establishment of permanent settlements naturally led to the gro...
Role of US Military in Gulf of Tonkin Incident
Example essay. Last modified: 4th Oct 2017
Military Intelligence Organizations They do it by performing an analysis and assessment of the available data which they gathers from wide range of sources, guiding and directing the commanders to ma...
Russia's Approach to Cyber Warfare
Example essay. Last modified: 12th Feb 2019
Policy Briefing on the Imminent Russian Cybersecurity Threat: The Need For Action Against Russian Cybercrimes In recent years, Russia has found a reliance on using cyberwar and crimes as a tactic ...
Securing the United States and Mexico Border
Example essay. Last modified: 18th May 2020
Abstract The purpose of this paper is to provide a comprehensive look into the efforts of Congress, the Department of Homeland Security, and United States Customs and border protection (...
Securitization Theory for Refugees
Example essay. Last modified: 10th Apr 2019
“Increasingly refugees and Internally Displaced Persons are regarded as harbingers of insecurity, rather than victims of it” – Discuss with reference to two case studies. In an interview wit...
Security Assessments and Response Plan for Bank
Example essay. Last modified: 18th May 2020
SECURITY ASSESSMENT AND RESPONSE PLAN FOR THE UNIVERSITY BANK HEADQUARTERS COMPLEX (UBHQ) Introduction Purpose Risk Management is the systematic process of identifying...
Security Audit for Botox Pharmaceutical Company
Example essay. Last modified: 18th May 2020
Allergan is a pharmaceutical company which is the biggest provider of Botox. Since becoming the biggest provider of this product, there are always ethical issues not only within the organiz...
Security Challenges Posed by Economic Espionage
Example essay. Last modified: 8th Feb 2020
The monetary intelligence is one of the most vital belongings of a nation. The treasured thoughts and improvements are those which generates huge profit and wonderful services and products....
Security information and event management
Example essay. Last modified: 1st Jan 2015
Introduction: Security Information and Event Management (SIEM) automates incident identification and resolution based on built in business rules to help improve compliance and alert staff to critical ...
Security models
Example essay. Last modified: 1st Jan 2015
EXECUTIVE SUMMARY One of the most essential part of securing access to data, information, security, as well as computer organization is by having security policy. A computer security policy consis...
Security Preparation in Shopping Malls
Example essay. Last modified: 4th Oct 2017
Security Plan Paper Security preparation is essential to maintain a flourishing business. Some shopping center otherwise wholesale store has a more appropriate outline of security to function appropri...
Security System Development for Casino
Example essay. Last modified: 18th May 2020
1. Summary: The Horizon Casino is largest attraction hub for people nowadays, so owner decides to renovate the place for security and safety purposes. The m...
Self-Identity and the Relationship to Human Secuirty and Terrorism
Example essay. Last modified: 8th Feb 2020
TERRORISM, IDENTITY, AND HUMAN SECURITY Introduction In contemporary discourses of terrorism, it appears that little can be done in response to the curtail the effects of ...
Should Police be Allowed to Use Crime Predictive Technology?
Example essay. Last modified: 23rd Sep 2019
Weapons of Math Destruction To what extent, does Cathy O’Neil in Chapter 5 of Weapons of Math Destruction argue that police should be allowed to use crime predictive technologies for ...
Should We Privilege Digital Privacy Over National security?
Example essay. Last modified: 27th Jul 2021
I will be speaking on whether or not we should consider privacy over national security from the perspective of the European Union....
Social and Legal Issues Concerning WikiLeaks
Example essay. Last modified: 11th Apr 2019
INTRODUCTION WikiLeaks is an international non-profit organization that publishes leaks and secrets from different sources. The history of the organization tells that over past eleven years it has...
Strategies for Terrorism Investigation
Example essay. Last modified: 4th Oct 2017
Terrorism and its investigation Counter terrorism could be characterized as the strategies and procedures that a legislature, military or insights org actualize to anticipate or counter terrorism (Le...
Symmetric Encryption Schemes
Example essay. Last modified: 1st Jan 2015
2.1 Symmetric Encryption Schemes: With symmetric-key encryption, the encryption key can be calculated from the decryption key and vice versa. With most symmetric algorithms, the same key is use...
Systems Security Policy (SSP) for a Coast Guard Network
Example essay. Last modified: 27th Jul 2021
This security policy provides minimum-security measures for computer systems, and for systems interfacing with Coast Guard networks....
Technical Brief on Cyber Security
Example essay. Last modified: 3rd Dec 2020
One of the most challenging components of cybersecurity is the continually evolving world of undertrained staff. The conventional way has been to concentrate resources on essential structure elements and defend against the most significant known threats...
Terrorism: Definition, History and Solutions
Example essay. Last modified: 13th Jul 2018
TERRORISM: AN EXPLORATION OF ITS DEFINITION, HISTORY, AND POSSIBLE SOLUTIONS “Terrorism upsets people. It does so deliberately. That is its point, and that is why it has engrossed so much of our a...
Terrorist Prevention Programs in Homeland Security
Example essay. Last modified: 8th Feb 2020
Abstract This essay will explain how Homeland Security and the nine main components of the Terrorist Prevention system that are emplaced, have change the perception of national sec...
The Brazilian Federal Data Processing Service
Example essay. Last modified: 28th Jul 2021
Edward Snowden who released files showing that the United States was collecting intelligence on Brazil’s business one such as Petrobras. This company generates a major source of revenue for the government, and the National Security Agency (NSA) was collecting data on their private network...
The Concept of 'New Terrorism'
Example essay. Last modified: 10th May 2019
Does it make sense to talk about ‘new terrorism’? How might this matter for counterterrorism policy? The perception of terrorism was completely transformed following the 2001 World Tra...
The Importance of Cybersecurity in Law Firms
Example essay. Last modified: 18th May 2020
The purpose of ethics is to provide tools to help discern what people should do and how they should behave. In the legal field, this tool guides legal professionals to ensure that they are all do...
The Interdependencies of Three of the Critical Infrastructure Sectors
Example essay. Last modified: 18th May 2020
The Interdependencies of Three of the Critical Infrastructure Sectors The transportation systems sector, financial services sector, and the healthcare and public health sector have...
The National and International History and Evolution of the Private Security Industry
Example essay. Last modified: 16th Mar 2021
On this assignment I will discuss the National and International evolution of the Private Security, the fundamentals laws and what impact it has had on society....
The National and International History of the Private Security Industry
Example essay. Last modified: 23rd Sep 2019
The National and International History of the Private Security Industry Introduction In this assignment I will be discussing the internatio...
The United States Federal Government’s Use of Cyber Operations
Example essay. Last modified: 16th Mar 2021
To determine where cyber operations are beneficial or harmful, we must first know what they are. According to James E. Cartwright, General of the United States Marine Corps, cyber operations are defined as “the employment of cyber capabilities where the primary purpose is to achieve objectives in or through cyberspace. ...
Threats to Aviation Security in Australia
Example essay. Last modified: 23rd Sep 2019
This paper will aim to identify the current threats that exist to aviation security in Australia today and identify the risk mitigation strategies in place to alleviate the identified threats. S...
Threats to Homeland Security
Example essay. Last modified: 8th Feb 2020
Abstract The Department of Homeland Security was created in the aftermath of September 11th terrorist attacks, ensuring the citizens of the United States they are doing something a...
Transport Layer & Network Layer Protocols Attack
Example essay. Last modified: 13th Jul 2018
Chapter 1: Introduction 1.1: Background Data Communication technologies and the underlying protocols in the twenty-first century is one of the critical elements that acts as the backbone for electron...
Understanding the Role of a 21st Century Corporate Security & Risk Manager
Example essay. Last modified: 18th May 2020
Understanding the Role of a 21st Century Corporate Security & Risk Manager A brief comparison of the role of a Security and Risk Manager in the 21st century as opposed to that of the...
United States Border Protection: Comparisons with Germany
Example essay. Last modified: 8th Feb 2020
Executive Summary The United States has been protecting the nations to prevent illegal entry of immigrants, weapons, drugs, and contraband in order to protect homeland security and e...
Vancouver Olympic Games 2010 Security
Example essay. Last modified: 8th Feb 2020
The international Olympic Games are international is a competition hosted by different countries around the world for expert athletes in their respective fields of sport. The very first Oly...
Whistleblowing: Types and Justifications
Example essay. Last modified: 11th Apr 2019
Introduction Whistleblowing is the act of an attempt by an employee or former employee to confess the malpractice or iniquity in or by an organisation. Nowadays, many companies have produced their...
Tip: If you can't find what you are looking for, try shortening your search phrase. E.g. "CSR"