Security Essays

Filter filter
Sort by filter
46 essay samples found
Sort by
  • Relevance
  • Newest
  • Download (max to min)
  • Download (min to max)

The Straits of Malacca

CHAPTER I INTRODUCTION Background The Straits of Malacca stretches between Peninsular Malaysia and the Indonesian island of Sumatra. The littoral states of the Straits of Malacca are Malaysia, Singapore and Indonesia. The Strait, situated between the coastline of Thailand, Malaysia and Singapore to the east and the Indonesian island of Sumatra to the west, extends […]

Pages: 56 Words: 16678 Topics: Malaysia, Military, National Security, Piracy, Research, Ship, Singapore

Japan in its Surrounding Region

CHAPTER II JAPAN IN ITS SURROUNDING REGION 2.1 Japan in the Post Cold War World When the Berlin wall fell, symbolizing the end of the Cold War, the global balance of power shifted from a tense military stand-off between the world’s two superpowers-the Soviet Union and United States- to one of American dominance. The end […]

Pages: 54 Words: 16215 Topics: Global Politics, Government, International Security, Japan, North Korea, Nuclear Proliferation, South Korea
Have doubts how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Get started

Food Security

ANALYTICAL FRAMEWORK Food security is elucidated by the IFAD/FAO as the year-round access to the amount and variety of safe foods required by all household members in order to lead active and healthy lives, without undue risk of losing such access. No country anywhere in the world is food secure on this definition. It represents […]

Pages: 14 Words: 4153 Topics: Economic Growth, Economy, Food Security, Poverty, Sustainability

Revolution in Military Affairs

CHAPTER I INTRODUCTION “The Ultimate Determinant in War is the Man on the Scene with the Gun.” Rear Admiral J. C. Wylie, USN. 1. The notion of military revolutions grew from Soviet writing of the 1970s and 1980s. Early studies talked of a “Military Technical Revolution” (MTR), which is the impact of a new technology […]

Pages: 43 Words: 12896 Topics: International Security, Military, National Security

Advantages and Disadvantages of Biometrics

ABSTRACT Organisations have goals and therefore acquire assets to ensure these goals are met and the continuity guaranteed. Financial sector while trying to promote convenient methods such as online banking and use of ATM for their customers to access their money strives to ensure only the right person has access to the account. Also, military […]

Pages: 22 Words: 6594 Topics: Fingerprint, Privacy, Research

Computers Security Business | Information Systems Dissertations

Introduction While attacks on computers by outside intruders are more publicized, attacks perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organization’s business and how their computer systems work. They have both the confidentiality and access to perform these attacks. An inside […]

Pages: 39 Words: 11616 Topics: Computer Networking, Computer Security, Cyber Security, Database, Information Security, Malware, Risk, Risk Management

Intrusion Prevention Security | Information Systems Dissertations

Introduction Intrusion detection systems (IDS) were developed in 1990’s, when the network hackers and worms appeared, initially for the identification and reporting of such attacks. The intrusion detection systems didn’t have the ability to stop such attacks rather than detecting and reporting to the network personnel. The Intrusion Prevention Systems got both characteristics i.e. threat […]

Pages: 44 Words: 13229 Topics: Computer Engineering, Computer Networking, Cyberspace, Digital Technology, Information Technology, Malware, Software

Metamorphic Viruses

Analysis and Detection Metamorphic Viruses Chapter 1 Introduction 1.1 Motivation Metamorphic Viruses are very special type of viruses which have ability to reconstruct into entirely new offspring which is completely different than the parent; Main object to use these techniques to rebuild itself is to avoid detection by Antivirus Software. Although for the time being […]

Pages: 33 Words: 9858 Topics: Computer Engineering, Computer, Computer Science, Computer Security, Computer Virus, Malware, Software

Application Network Security

2.0 CHAPTER TWO 2.1 INTRODUCTION The ever increasing need for information technology as a result of globalisation has brought about the need for an application of a better network security system. It is without a doubt that the rate at which computer networks are expanding in this modern time to accommodate higher bandwidth, unique storage […]

Pages: 24 Words: 7116 Topics: Computer Networking, Computer Security, Cyber Security, Cyberspace, Digital Technology, Information Technology, Linux, Operating System

Honeypot and Honeynet

Chapter 1 Introduction Honeynet is a kind of a network security tool, most of the network security tools we have are passive in nature for example Firewalls and IDS. They have the dynamic database of available rules and signatures and they operate on these rules. That is why anomaly detection is limited only to the […]

Pages: 31 Words: 9337 Topics: Computer Engineering, Computer Networking, Cyber Crime, Information Security, Information Technology, Linux, Network, Operating System

Information Wireless Networks

Abstract With present advances in technology, wireless networks are getting more popularity. These networks let the users the liberty to travel from one location to another without disruption of their computing services. The Ad-hoc networks, are the subset of wireless networks, let you the configuration of a wireless network without the require for access point. […]

Pages: 20 Words: 5963 Topics: Communication, Computer Networking, Digital Technology, Electronics

The Position of Cyber Crime in India

Position of Cyber Crime in India Table of Contents Introduction Impacts of Cyber Crime Perception of the Impact of Cyber Crime Negative Developments with respect to Cyber Crime Positive Developments with respect to Cyber Crime Cyber Crimes and the Issue of Evidence Cyber Crime and Jurisdiction Abstract Cyber crime is developing at a dumbfounding pace, […]

Pages: 9 Words: 2755 Topics: Crime, Crime Scene, Cyber Crime, Cyber Security, Government, India, Judgment, Justice

Artificial Intelligence – Present and Future Uses

Artificial Intelligence: Present and Future uses What is the definition of Artificial Intelligence? Lets’ break it down in to individual words to get an accurate definition. First, Artificial: made by human skill; produced by humans (https://dictionary. com). Second, Intelligence: capacity for learning, reasoning, understanding, and similar forms of mental activity; aptitude for grasping truths, relationships, […]

Pages: 8 Words: 2252 Topics: Artificial Intelligence, Hospital, Intelligence, Surgery

Army Value: Integrity

Over the decades, the seven army values have been the rock backbone of the United States army. On the other hand, the values have been the defining aspect of good soldiering as the soldiers and their leaders live by the seven core values. To simplify the vales, they are regarded using the acronym LDRSHIP which […]

Pages: 2 Words: 627 Topics: Army, Integrity, Leadership, Military, Social Institutions, Stereotypes, Value

The Case of Apple Versus the FBI

Introduction The case of FBI versus Apple Company arose as a result of the Apple tech firm declining to create new software that will unlock the iPhone of Farook and help the law enforcement agency in investigating the terrorist attack. FBI was investigating the case of Farook who killed many people, but the company refused […]

Pages: 7 Words: 1984 Topics: Apple Inc, Computer Security, Conflicts, Government, Iphone, Justice, National Security

Social Security in U.S.

Introduction Social security is a program by the federal government that provides an income source for you or your legal dependents that is children, spouse or parents if they qualify for benefits. Also, it can be defined as any of the established measures by legislation to maintain a family or individual income or to provide […]

Pages: 3 Words: 774 Topics: Economy, Government, Retirement, Social Security, Tax, United States

Anti-Aircraft

Introduction Anti-aircraft is used particularly in defense against aircraft or intended in attacking aircraft. According to North Atlantic Treaty Organization (NATO), anti-aircraft is planned to nullify or decrease the usefulness of unfriendly air action. Anti-air composed of the ground as well as air-based gun systems, beam systems, and barrage balloons. Cont Anti aircraft has the […]

Pages: 2 Words: 549 Topics: Aviation, Military, War

Legal Issues

Introduction In this watch, there was a started look through that was an aftereffect of individual affirming on the wellspring of medications and in such cases, there can be directed a pursuit without a hunt guarantee and that was what happened. A court order is a court arrange that a justice, judge or Supreme Court […]

Pages: 4 Words: 1080 Topics: Crime, Government, Justice, Police, Social Institutions, Social Networking

Network Security and Cryptography

Introduction In the 21st Century, communications become almost without the embracing of technology. The introduction of internet has made it more effective, efficient and reliable. The rate of growth today is dramatically increasing with the daily invention of new communication tools such as computers, smartphones, smart watches among others . To the pros, we have […]

Pages: 4 Words: 1150 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyber Security, Cyberspace, Malware, Network

Concerns about Genetic Engineering

There are many different beliefs about genetic engineering. To start, what genetic engineering is the changing of DNA. Genetic engineering can be done to any organism including foods and viruses. One famous genetic engineering scientists is George Church who owns his own laboratory at Harvard Medical School. A different person named Luhan Yang who is […]

Pages: 2 Words: 530 Topics: Biotechnology, Genetic Engineering, Human

Identity Theft is Relatively

Identity theft is relatively common, but with the use of the internet, the problem is increasing at higher rates. According to LifeLock.com, Nearly 60 million Americans have been affected by identity theft that is approximately 5.428 million people a year. Since the internet has become more popular and convenient for people to use, it has […]

Pages: 2 Words: 693 Topics: Identity Theft

History of Identity Theft

With advancements in technology happening annually after the digital revolution there is less privacy in the world. These advancements create a greater risk of personal information to be exploited or taken. From the years of 2010 to 2016 identity theft cost Americans one hundred twelve billion United States dollars (Crane, 2016). People lack the knowledge […]

Pages: 10 Words: 3123 Topics: Identity Theft

What is Identity Theft?

In today’s world, we are constantly using the internet to communicate, shop online, transfer funds, pay bills and almost everything else under the sun to fill our leisure time. Living in the digital age, everything we do is recorded online and makes all types of information readily available and may end up in the wrong […]

Pages: 7 Words: 2067 Topics: Identity Theft

Problem with Identity Theft

In this essay the topic will be about the problem of identity theft. The main reasoning of selecting this topic is because it is a problem that millions of people must go through every day. Identity theft is an important because it involves the way people live. Anyone can be a victim to identity theft […]

Pages: 3 Words: 902 Topics: Identity Theft

Smart about where Sensitive Business

It has already been established that identity theft is a serious problem. To understand how to fight a problem, one must first diagnose the source of the problem. Consequently, to understand how to prevent identity theft, one must first understand the methods criminals use to steal identities. The first major category for discussion involves physical […]

Pages: 6 Words: 1850 Topics: Identity Theft

Online Identity Theft

Online Identity Theft: What It Is and How It Happens written by Alison Grace Johansen is an article that provides a definition of identity theft and how it occurs. According to Johansen, identity theft occurs when a fraudster steals your identity through access to your personally identifiable information (PII) with the intent to commit fraud. […]

Pages: 5 Words: 1433 Topics: Computer Security, Crime, Fraud, Identity Theft, Privacy, Theft

The Term Identity Theft

The term identity theft isn’t new anymore as its traces go back to more than a decade now. Users are on brink of identity theft as it is increasing leaps & bounds all around the world. While there are certain preventive measures you can follow to keep your identity safe, using advanced identity protection software […]

Pages: 3 Words: 781 Topics: Computer Security, Credit Card, Cyberspace, Identity Theft, Information Technology, Privacy, Surveillance

With Increasing Threat

With increasing threat to your identity online it becomes important to place certain preventive measures to keep your identity traces safe. Here, advanced identity theft protection tools can help you monitor your identity traces online and protects you from all possible cyber threats & attacks. Let’s discuss some of these effective tools here. Advanced Identity […]

Pages: 2 Words: 739 Topics: Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Media, Identity Theft, Information Technology

Countless Illegal Activities

There are countless illegal activities that affect our lives. Most of them we can protect ourselves against more because it is easier for us to become aware that something is missing. I believe it is easier to protect ourselves against Illegal activities such as robbery, burglary than against scams and identity theft. I believe that […]

Pages: 3 Words: 972 Topics: Credit Card, Crime, Fraud, Identity Theft, Theft

Advancement of Technology

While the advancement of technology has??”for the most part??”changed modern society for the better, it has also changed several aspects of it for the worse. How? Crime. Of particular note is identity theft, which has become significantly more rampant than it has ever been due to the advent of the Internet in the modern age. […]

Pages: 3 Words: 980 Topics: Computer Security, Credit Card, Crime, Cyberspace, Fraud, Identity Theft
1 2
Didn't find the paper that you were looking for?
We can create an original paper just for you!
What is your topic?
Number of pages
Deadline 0 days left
Get Your Price