Security essay

Filter filter
Sort by filter
46 essay samples is found
Sort by
  • Relevance
  • Newest
  • Download (max to min)
  • Download (min to max)

Eliminate nuclear weapons

Face it. The world is not perfect. Never has been, never will be. Then there were nuclear weapons, and it just got worse. The U.S nuclear weapons policy should be to get rid of nuclear weapons entirely because they create tension between countries, they are expensive, and they are way too destructive. For starters, having […]

Pages: 2 Words: 679 Downloads: 6 Date added: 2019/11/07
View full sample

Can Having Nuclear Weapons Be Ethical in a Global Community

This planet is home to 195 countries with hundreds of different traditions, customs and beliefs but even with all this diversity there is a sense of global community (1). The global community is a concept where every person is part of the global economy, where human rights are protected for all people, and where people […]

Pages: 10 Words: 2938 Downloads: 4 Date added: 2019/11/07
View full sample
Have doubts how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Get started

Nuclear weapons should be banned

Nuclear weapons to this day still pose a direct threat to us and other countries. It’s almost inhumane on how countries have to compete each other to see who can be more intimidating. ,when it’s clear as day that these weapons are causing fear into the hearts of other countries. These weapons require no military […]

Pages: 1 Words: 385 Downloads: 1 Date added: 2019/08/16
View full sample

Factors of Influence Nuclear Weaponry

Once the United States initiated the nuclear age with attacks of Hiroshima and Nagasaki with nuclear weapons, various states have acquired, or attempted to acquire, the capability to deploy a nuclear weapon. Most notable of these nations is the former Soviet Union, who functioned as the main nuclear adversary of the United States throughout much […]

Pages: 7 Words: 1956 Downloads: 9 Date added: 2019/11/07
View full sample

Nations’ right to own nuclear weapons

Nuclear weapons are one of the most destructive, if not most destructive forms of technology on the planet. The right to own these horrific weapons has become a controversial question since their creation. Nations across the world see significance in owning nuclear weapons for many reasons (Greif). They can use them as a means of […]

Pages: 5 Words: 1420 Downloads: 7 Date added: 2019/11/07
View full sample

Should Women Be In Combat Roles?

1998, Canada and Sweden became the first countries to allow women in modern combat roles. Often men are capable of doing things that women aren’t and visa versa, by mandating a certain number of women on each board, California is stating that they don’t believe women are capable of earning a seat at the table […]

Pages: 4 Words: 1329 Downloads: 9 Date added: 2019/08/15
View full sample

Nuclear war and Religion

The big bang of the atomic bomb has caused mix emotions with in the various religious communities. The thinking process behind the atom bomb on Hiroshima has argued the it was warfare with the suicide of Japanese soldiers. Some are elated that the actions of launching the bomb quickly ended the war. Some Catholics opposed […]

Pages: 3 Words: 760 Downloads: 6 Date added: 2019/08/16
View full sample

Should Military Women be Allowed in Combat?

Issue: Should Military Women be Allowed in Combat? Background: From 1775-1917, women were only aloud to be laundresses, nurses, cooks, and part of administrations. Within the last two years of WWI women were finally permitted to join the military. During 1917 and 1918, around 23,000 women joined as nurses, translators, phone operators, and other support […]

Pages: 1 Words: 313 Downloads: 3 Date added: 2019/08/15
View full sample

Women in Combat in USA

Women have faced discrimination in the United States for decades. Fighting for women’s rights has been a struggle that some of the most important women in the U.S. have had to face. Discrimination in politics, labor, society and even in past wars has been a controversial issue. Women are known to have served in war […]

Pages: 8 Words: 2306 Downloads: 2 Date added: 2019/08/15
View full sample

Online Identity Theft

Online Identity Theft: What It Is and How It Happens written by Alison Grace Johansen is an article that provides a definition of identity theft and how it occurs. According to Johansen, identity theft occurs when a fraudster steals your identity through access to your personally identifiable information (PII) with the intent to commit fraud. […]

Pages: 5 Words: 1433 Downloads: 7 Date added: 2019/11/15
View full sample

About Nuclear Weapons

Warfare has been around since the beginning of time, sadly it is a part of human nature. There are many types of warfare, one being traditional warfare, where huge armies opposed each other using swords, shields, and many other weapons. Warfare has changed through the ages though, along with technology, therefore, presenting another type of […]

Pages: 3 Words: 759 Downloads: 1 Date added: 2019/08/16
View full sample

Women in Combat-Arms: A Case for the Status Quo Ante

Women in Combat-Arms: A Case for the Status Quo Ante Combat-arms units that are mixed-gender perform worse than all-male units by almost every metric. This is a factual, but controversial statement. Despite the controversy, it should be kept in focus throughout any discussion of gender-integration of combat-arms units. It is an uncontroversial statement to say […]

Pages: 5 Words: 1352 Downloads: 7 Date added: 2019/08/15
View full sample

Smart About Where Sensitive Business

It has already been established that identity theft is a serious problem. To understand how to fight a problem, one must first diagnose the source of the problem. Consequently, to understand how to prevent identity theft, one must first understand the methods criminals use to steal identities. The first major category for discussion involves physical […]

Pages: 6 Words: 1850 Downloads: 10 Date added: 2019/12/04
View full sample

What is identity theft?

In today’s world, we are constantly using the internet to communicate, shop online, transfer funds, pay bills and almost everything else under the sun to fill our leisure time. Living in the digital age, everything we do is recorded online and makes all types of information readily available and may end up in the wrong […]

Pages: 7 Words: 2067 Downloads: 9 Date added: 2019/12/04
View full sample

History of Identity Theft

With advancements in technology happening annually after the digital revolution there is less privacy in the world. These advancements create a greater risk of personal information to be exploited or taken. From the years of 2010 to 2016 identity theft cost Americans one hundred twelve billion United States dollars (Crane, 2016). People lack the knowledge […]

Pages: 10 Words: 3123 Downloads: 5 Date added: 2019/12/04
View full sample

Network Security and Cryptography

Introduction In the 21st Century, communications become almost without the embracing of technology. The introduction of internet has made it more effective, efficient and reliable. The rate of growth today is dramatically increasing with the daily invention of new communication tools such as computers, smartphones, smart watches among others . To the pros, we have […]

Pages: 4 Words: 1150 Downloads: 2 Date added: 2018/12/30
View full sample

The Case of Apple versus the FBI

Introduction The case of FBI versus Apple Company arose as a result of the Apple tech firm declining to create new software that will unlock the iPhone of Farook and help the law enforcement agency in investigating the terrorist attack. FBI was investigating the case of Farook who killed many people, but the company refused […]

Pages: 7 Words: 1983 Downloads: 8 Date added: 2018/12/15
View full sample

Artificial Intelligence – Present and Future Uses

Artificial Intelligence: Present and Future uses What is the definition of Artificial Intelligence? Lets’ break it down in to individual words to get an accurate definition. First, Artificial: made by human skill; produced by humans (https://dictionary. com). Second, Intelligence: capacity for learning, reasoning, understanding, and similar forms of mental activity; aptitude for grasping truths, relationships, […]

Pages: 8 Words: 2252 Downloads: 6 Date added: 2017/09/11
View full sample

The Position of Cyber Crime in India

Position of Cyber Crime in India Table of Contents Introduction Impacts of Cyber Crime Perception of the Impact of Cyber Crime Negative Developments with respect to Cyber Crime Positive Developments with respect to Cyber Crime Cyber Crimes and the Issue of Evidence Cyber Crime and Jurisdiction Abstract Cyber crime is developing at a dumbfounding pace, […]

Pages: 9 Words: 2755 Downloads: 1 Date added: 2017/06/26
View full sample

Information Wireless Networks

Abstract With present advances in technology, wireless networks are getting more popularity. These networks let the users the liberty to travel from one location to another without disruption of their computing services. The Ad-hoc networks, are the subset of wireless networks, let you the configuration of a wireless network without the require for access point. […]

Pages: 20 Words: 5963 Downloads: 1 Date added: 2017/06/26
View full sample

Honeypot and Honeynet

Chapter 1 Introduction Honeynet is a kind of a network security tool, most of the network security tools we have are passive in nature for example Firewalls and IDS. They have the dynamic database of available rules and signatures and they operate on these rules. That is why anomaly detection is limited only to the […]

Pages: 31 Words: 9337 Downloads: 4 Date added: 2017/06/26
View full sample

Application Network Security

2.0 CHAPTER TWO 2.1 INTRODUCTION The ever increasing need for information technology as a result of globalisation has brought about the need for an application of a better network security system. It is without a doubt that the rate at which computer networks are expanding in this modern time to accommodate higher bandwidth, unique storage […]

Pages: 24 Words: 7116 Downloads: 3 Date added: 2017/06/26
View full sample

Metamorphic Viruses

Analysis and Detection Metamorphic Viruses Chapter 1 Introduction 1.1 Motivation Metamorphic Viruses are very special type of viruses which have ability to reconstruct into entirely new offspring which is completely different than the parent; Main object to use these techniques to rebuild itself is to avoid detection by Antivirus Software. Although for the time being […]

Pages: 33 Words: 9858 Downloads: 2 Date added: 2017/06/26
View full sample

Intrusion Prevention Security | Information Systems Dissertations

Introduction Intrusion detection systems (IDS) were developed in 1990’s, when the network hackers and worms appeared, initially for the identification and reporting of such attacks. The intrusion detection systems didn’t have the ability to stop such attacks rather than detecting and reporting to the network personnel. The Intrusion Prevention Systems got both characteristics i.e. threat […]

Pages: 44 Words: 13229 Downloads: 10 Date added: 2017/06/26
View full sample

Computers Security Business | Information Systems Dissertations

Introduction While attacks on computers by outside intruders are more publicized, attacks perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organization’s business and how their computer systems work. They have both the confidentiality and access to perform these attacks. An inside […]

Pages: 39 Words: 11616 Downloads: 10 Date added: 2017/06/26
View full sample

Nuclear weapons in the world

Nuclear weapons should be entirely removed from all countries because it doesn’t help anybody in anyway. The only outcome of using nuclear power is death and destruction. The negative effects of nuclear weapons go on and on. The death toll of this power would be in the millions and everyone that was involved in the […]

Pages: 3 Words: 887 Downloads: 2 Date added: 2019/08/16
View full sample

Advantages and Disadvantages of Biometrics

ABSTRACT Organisations have goals and therefore acquire assets to ensure these goals are met and the continuity guaranteed. Financial sector while trying to promote convenient methods such as online banking and use of ATM for their customers to access their money strives to ensure only the right person has access to the account. Also, military […]

Pages: 22 Words: 6594 Downloads: 7 Date added: 2017/06/26
View full sample

Revolution in Military Affairs

CHAPTER I INTRODUCTION “The Ultimate Determinant in War is the Man on the Scene with the Gun.” Rear Admiral J. C. Wylie, USN. 1. The notion of military revolutions grew from Soviet writing of the 1970s and 1980s. Early studies talked of a “Military Technical Revolution” (MTR), which is the impact of a new technology […]

Pages: 43 Words: 12896 Downloads: 2 Date added: 2017/06/26
View full sample

Food security

ANALYTICAL FRAMEWORK Food security is elucidated by the IFAD/FAO as the year-round access to the amount and variety of safe foods required by all household members in order to lead active and healthy lives, without undue risk of losing such access. No country anywhere in the world is food secure on this definition. It represents […]

Pages: 14 Words: 4153 Downloads: 3 Date added: 2017/06/26
View full sample

Japan In Its Surrounding Region

CHAPTER II JAPAN IN ITS SURROUNDING REGION 2.1 Japan in the Post Cold War World When the Berlin wall fell, symbolizing the end of the Cold War, the global balance of power shifted from a tense military stand-off between the world’s two superpowers-the Soviet Union and United States- to one of American dominance. The end […]

Pages: 54 Words: 16215 Downloads: 2 Date added: 2017/06/26
View full sample
1 2