Security

Sort By:
Page 48 of 50 - About 500 essays
  • Decent Essays

    Computers and Homeland Security Essay

    • 836 Words
    • 4 Pages
    • 3 Works Cited

    Computers and Homeland Security Homeland Security is one of the most important departments in the United States. The United States Department of Homeland Security job is to reduce our vulnerability to terrorism and lead a national effort to help prevent terrorist attacks on our nation (Computer Concept, pg. 50). As technology evolves over the course of time, computers end up playing a crucial role in homeland security. Computer systems are used throughout everyday

    • 836 Words
    • 4 Pages
    • 3 Works Cited
    Decent Essays
  • Decent Essays

    How the NSA and U.S. ICE Agencies Affect Digital Crime The National Security Agency (NSA) and the United States Immigration and Customs Enforcement (ICE) both play crucial roles when it comes to combating and investigating cyber crimes. The NSA’s primary responsibility is to create and maintain computer-coding systems that protect sensitive information regarding U.S. information systems (Taylor, Fritsch, and Liederbach, 2015). Along with their crucial role of protecting the United States’ sensitive

    • 1293 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    that might be engaged in activities that could cause damage to the United States and its citizens. The safety of our country against threats and actions by others is called our National Security. How does a government agency learn that other countries are carrying out actions that threaten their national security? The answers is intelligence often times we think “intelligence” means how smart we are. We even have tests that are designed to indicate the level of our intelligence. But “intelligence”

    • 1781 Words
    • 8 Pages
    Decent Essays
  • Better Essays

    II. Organizational Security Plan and Policya. Security Risks:1. Flood – Burlington, Iowa is located off of the Mississippi River and has flooded in the past. Preventative measures for flooding will include stored sandbags to be placed around the perimeter of the main office and keeping up with weather mandates for the Burlington area. 2. Power Outages – Regardless of the cause, power outages can occur at random times. A UPS device will be placed within the main office to prevent loss of power, during

    • 1465 Words
    • 6 Pages
    Better Essays
  • Better Essays

    A NATIONAL SECURITY THREAT: CYBERCRIME Monika Sharma1 and Michael Losavio2 1Department of Computer Science and Computer Engineering, University of Louisville, Louisville, KY 2Department of Justice Administration, Department of Computer Science and Computer Engineering, University of Louisville, Louisville, KY. m0shar17@louisville.edu, Michael.Losavio@louisville.edu ABSTRACT Cyberspace which is an offshoot of the development of computer and digital communication technologies, has in recent

    • 1989 Words
    • 8 Pages
    Better Essays
  • Good Essays

    and that kind of demand drives the need for data security. The scope of this memorandum is to develop a research project on the subject of cloud computing security and specifically the innovative ways developers are trying to secure data in the cloud. I will briefly describe the current cloud computing security structure and discuss measurement protocols that have been developed recently in order to test and measure the effectiveness of cloud security (Yesilyurt, et al.,

    • 868 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    [pic] HINDALCO INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION AND CHALLENGES A study by Akash Pandey - MBA (IT) Indian Institute of Information Technology Allahabad, U.P. This study is submitted in fulfillment of the requirements for the degree in Master of Business Administration from Indian Institute of Information Technology, Allahabad June 2008 [pic] INDIAN INSTITUTE OF INFORMATION TECHNOLOGY (Deemed University) Jhalwa, Deoghat

    • 6815 Words
    • 28 Pages
    Satisfactory Essays
  • Decent Essays

    Security requirements of the organization First we will ensure that the system is physically secured. The room that will house the server will be in a secured area with multi-leveled security such as a keypad and additional locks. The room will have an air conditioner to ensure that the system remains cool and secured. Once the routers have been configured and secured, the next thing we will put in place is ACL list. This list would restrict movement and access to files that are not related

    • 1030 Words
    • 5 Pages
    • 5 Works Cited
    Decent Essays
  • Good Essays

    Abstract This document reviews the over ability of the recommend product to execute our clients unique need for a Security Information and Event Monitoring solution (SIEM). The information provided comes from research of the vendor’s website, the industry leading analyses and customers review. The review is broken-down the features, capabilities, and deficiencies for the selected SIEM solution. The solution’s overall cybersecurity objects will be analyzed and compared to the needs of our client

    • 1201 Words
    • 5 Pages
    Good Essays
  • Decent Essays

    Every day in the news we hear or read about another company that has had a breach of security in their network. These breaches lead to large amounts of stolen or compromised information as well as the loss of services within that company. In many of these cases the breach could probably been prevented had the company been able to find the vulnerabilities in the network. This is where ethical hacking comes into the program. Before delving into ethical hacking we must first understand what hacking

    • 1457 Words
    • 6 Pages
    Decent Essays