Security Essays

The essays below were written by students to help you with your own studies.

Security Essays Page 1

Oklahoma City Bombing and Development of Government Security
16th Mar 2021
Introduction: The Oklahoma City bombing on April 19th, 1995 was the causal factor that prompted the introduction of a standardized minimum physical security requirement for all non-military, federally owned, leased and occupied buildings and installations across government....

The United States Federal Government’s Use of Cyber Operations
16th Mar 2021
Introduction: To determine where cyber operations are beneficial or harmful, we must first know what they are. According to James E. Cartwright, General of the United States Marine Corps, cyber operations are defined as “the employment of cyber capabilities where the primary purpose is to achieve objectives in or through cyberspace. ...

Development of Systems Security Policy (SSP)
16th Mar 2021
Introduction: The Systems Security Policy (SSP) identifies security objectives, defines roles and responsibilities, prescribes network security measures, identifies contingency and emergency plans, specifies training requirements, and establishes incident and vulnerability reporting....

Technical Brief on Cyber Security
3rd Dec 2020
Introduction: One of the most challenging components of cybersecurity is the continually evolving world of undertrained staff. The conventional way has been to concentrate resources on essential structure elements and defend against the most significant known threats...

Is Privacy Still Private?
3rd Dec 2020
Introduction: “Privacy is not something that I'm merely entitled to, it's an absolute prerequisite” (Marlone Brando). The citizens of Oceania are under constant surveillance; the Party wants to make sure they are following all the rules....

Overview of Boko Haram: History, Impact and Methods
3rd Dec 2020
Introduction: The paper is aimed at highlighting the way Boko Haram dramatically evolved deprived of undertaking fierce attacks. In 2002, the organization was established by the group commander, Yusuf....

Comparison between Homeland Security and Homeland Defense
3rd Dec 2020
Introduction: This paper will explore published articles discussing missions, tasks, operations, and areas of responsibility for homeland security and homeland defense. The similarities between the two will be highlighted and discussed as well...

An Overview of the National Infrastructure Protection Plan
24th Nov 2020
Introduction: Before the horrific terrorist attacks on September 11, 2001, the United States did not have a full governmental infrastructure plan. Once Al Queda showed that they can use aircraft as weapons to destroy important critical infrastructure the President and the Whitehouse sprang into action....

Comparison between Realist and Liberal Views on Security
24th Nov 2020
Introduction: This essay shall attempt to answer the question on whether one tends to favour a realist or a liberal vision of security? This will be done by providing a brief description of both theories and their limitations before a conclusion to answer the question....

Hezbollah: Training and Funding Methods
18th May 2020
Introduction: The purpose of this paper is to examine a terrorist organization that is likely to conduct an attack within the United States. This paper will analyze the terrorist group Hezbollah and its fundin...

Advantages and Disadvantages of RFID Tags on Students
18th May 2020
Introduction: Advantages and Disadvantages of RFID Tags on Students To tag school children with RFID chips is uncommon, but not new.  Schools have been implementing RFID tags for what appears to ...

Computer Forensics Investigation Plan
18th May 2020
Introduction: Table of Contents Executive Summary Introduction Organization Overview Problem Statement Purpose Digital Forensic Method & Approach ...

Manufacturing Processes for Plastic Bottle Caps
18th May 2020
Introduction: INTRODUCTION A bottle cap is used to seal gap of a bottle. Usually brand name of company which invents bottle come on the top of bottle. Bottle caps were initially intended to be squeeze...

Forensic Analysis of WhatsApp on Android
18th May 2020
Introduction: Abstract WhatsApp is the most popular messaging applications available for smartphones in the world. It boasts 1.3 billion active monthly users, 1 billion of which are active every singl...

Cybersecurity and the World Today
18th May 2020
Introduction:  Cybersecurity is an important part of our everyday lives in some aspect even if we do not realize that it is in play.  From banking to surfing website on your personal computer there a...

Improved Information Sharing for Cyber Threats
18th May 2020
Introduction: Abstract This paper discusses the need for improved information sharing amongst industries for the continued prevention of cyber threats and improved threat intelligence. This will speci...

Security Audit for Botox Pharmaceutical Company
18th May 2020
Introduction: Allergan is a pharmaceutical company which is the biggest provider of Botox.  Since becoming the biggest provider of this product, there are always ethical issues not only within the organiz...

Robert Bowers’ Reasoning for Terrorism
18th May 2020
Introduction: Understanding the psychological and behavioral factors of individuals who are prone to committing acts of terrorism could be the key to learning how to minimize the receptivity of these individua...