sample
Haven't found the Essay You Want?
For Only $12.90/page

Security Essay Topics & Paper Examples

Human Security

The article aims at bringing the important issue of Human Security to the forefront. It focuses on the urgent need to understand the concept of human security, and to develop the proposals for translating these ideas into policy practice. An attempt has been made to clarify and correlate the terms ‘human development’ and ‘human security’. The interrelation of freedom from ‘fear’ and ‘want’ is discussed and the coherence between the two has been achieved successfully. The author has emphasised on the fact that to enable a real shift in policy making, serious effort needs to be made to operationalize the term Human Security. Human security workers need to develop a holistic and human centered ethos. They need to maintain the…

Overview of the Social Security Scheme in India: ESIC Scheme

Social Security is both a concept as well as a system. It represents basically a system of protection of individuals who are in need of such protection by the State as an agent of the society. Such protection is relevant in contingencies such as retirement, resignation, retrenchment, death, disablement which are beyond the control of the individual members of the Society. Men are born differently; they think differently and act differently. State as an agent of the society has an important mandate to harmonise such differences through a protective cover to the poor, the weak, the deprived and the disadvantaged. The concept of social security is now generally understood as meaning protection provided by the society to its members through…

Electronic security

Electronic security is defined as any tool or technique that is used purposely to protect system’s information assets. E-security is very valuable element in e-commerce since it adds value to the computer network as it composed of both soft and hard infrastructure E-security has been a matter of debate and it has been scientifically argued to be of great importance to economic development as it aid efficient trade and commerce. E-security has enhanced safe transaction and this has enable customers needs to be taken care off. Through e-security market place has expand since on line is very vital in that it enable many customers to be access to safe markets.  Computer security systems enhance effectiveness, efficient, satisfaction of customers. E-security…

Homeland Security

The challenge to traditional policing issued in the 1970s has created a new concept of policing and that is the role of policing in homeland security. In the wake of the September 11 terrorist attacks in 2001, the federal government has shifted to a policy of homeland security, and part of that has incorporated local firefighters and local police agencies (Oliver & Hilgenberg, 2004). But the creation has a lot of inadequacies. First, so much confusion still abounds in terms of what homeland security means: is it simply being more watchful for suspicious activities, is it intelligence gathering on the part of patrol officers, or is it standing guard at possible terrorist targets in their jurisdictions? Another inadequacy is not…

Cloud computing

Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud…

Proprietary Versus Contract Security

As an organization grows so must the security, and it has to be on the top of the list. When considering what type of security to choose, either proprietary or contact, they need to look at the value of the organization? This value within the organization will need some sort of protection to deter theft, vandalism, and destruction. The boardroom conversation could to from, “We have nice stuff” to “How are we going to protect it.” Leadership will need to decide how they will handle the issue of protecting their items that the business owns. In the process we will need to look at the pros and cons of both proprietary and contract security. Both of them have very big…

Heart Healthy Information Security Policy

Due to personnel, policy and system changes, and audits, Heart Healthy has voluntarily updated their information security policy to be in-line with the current information security laws and regulations. Currently Heart-Healthy Insurance, a large insurance company, plans to review and provide recommendations for an updated information security policy in the area ‘s of: 1. Current New Users Policy – The current new user section of the policy states: “New users are assigned access based on the content of an access request. The submitter must sign the request and indicate which systems the new user will need access to and what level of access will be needed. A manager’s approval is required to grant administrator access.”(Heart-Healthy Insurance Information Security Policy) 2….

Video Surveillance

Security and safety concerns are increasing with the changing lifestyles, expanding urbanization, increasing crime rate, and above all increasing terrorism across the globe. With latest advances in the technology, the significance of security and surveillance systems have changed as people are realizing the benefits derived from it. According to the latest IMS Research report, worldwide market for video surveillance equipment will grow more than 12 percent in 2012 despite the weak and uncertain economic environment. The global market will be driven by strong demand for video surveillance solutions in the BRIC (Brazil, Russia, India and China) countries. Over the past few years, video surveillance technology has evolved from being just a security tool to a tool for monitoring things like…

Definition of Cloud Computing

“What is your definition of cloud computing and how does it impact your business?” Cloud computing has been around for a while. It has been lurking in the ICT industry in smaller forms and companies have generally been using the service internally without realizing it. Only a few years ago, the sudden realization that cloud computing can save an organization massive operational costs came to the fore. Organizations were getting bigger and the cost of doing business was becoming expensive. Organizations that were expanding globally, i.e. beyond their country’s borders were discovering that the infrastructure costs per country varied and in some instances were none-existent as the country did not have the buying power to procure the latest infrastructure. This…

Assessments Package

The paper is based upon the self assessment online training. Throughout I will explain what changes the exercise has done to the view I had prior and the view I have after. Although in I think that becoming a case manager is a hard job and requires specific personality traits. I will write about the position of a case manager and what roles and duties the job requires. I will discuss the viewpoints on ethical principles, professional responsibilities, how my viewpoints had changed after the online training, and the self-awareness I have gained that could prepare myself for a case management role. View Changes on Ethical Principles The ethical obligations of the privacy for consumers and his or her protection…

Feasibility Study

As a student of Human Resource Development Management we are curious on how the security agencies deploy the employees. We’ve seen lots of security guards, almost all private agencies have their security personnel and we are aware that each gathered it from different agencies. The strategies on how they recruit employees that they are deploying. A security agency is an organization which conduct intelligence activities for the international or local security of the nation, state or organization. They are the domestic cousins of the foreign intelligence agency. NAME OF THE PROPOSED BUSINESS The proponents decided to name the business Security Net Agency; this was actually inspired by our group in the class which is SN or Saucer Net. We came…

Government Enforced Cyber Security, a Public Good?

We all know that cyber security is something of great importance to anyone trying to protect their network assets, customer assets, and personal assets. The list of possible risks associated with neglecting to practice good cyber security are endless, and the dangers lurking out in cyber space too numerous to imagine anyone who is controlling any type of company network to ignore; but the question here is whether or not the government should become the cyber security enforcer not only within in its own government sector but also within the private sector as well as a public good. Before we get into the discussion of whether or not the government should play this role, I believe we should have a…

Riordan Manufacturing Security Policy

Smith Systems Consulting has been hired to evaluate and consult on the creation of a new information technology security policy to span the complete enterprise infrastructure. This document will serve as a recommendation for Riordan Manufacturing as it pertains to the enterprise wide information security strategy. Riordan Manufacturing currently has three locations within the United States and one location in Hangzhou, China. All of these locations have been evaluated and are considered part of the enterprise security policy. The review of the current information technology security policy was conducted based on the idea of improvement with respect to current technology trends and best practices. An evaluation of the enterprise infrastructure as a whole, as it pertains to information technology security,…

Role of Federal Agencies

The threat has reached the point that given enough time, motivation, and funding, a determined adversary will likely be able to penetrate any system that is accessible directly from the Internet. It is difficult to state with confidence that our critical infrastructure—the backbone of our country’s economic prosperity, national security, and public health—will remain unscathed and always be available when needed. The recent security breach by unauthorized intruders into the parent company of NASDAQ is an example of the kind of breaches directed against important financial infrastructure and illustrates the difficulty of determining clear attribution. As we would in response to any such breach, the FBI is working to identify the scope of the intrusion and assist the victim in…

Security Assessment and Recommendation

I have been charged with the task of identifying potential security weaknesses and recommending solutions for Quality Web Design (QWD). The project was completed in two phases. The first phase of the project specifically identified and defined two potential security weaknesses: software and policy. The second phase recommends solutions to these potential weaknesses. I chose a scenario that outlines specifics of the organization’s type of business, business processes, assets, services, and security controls. It is crucial for any organization to take necessary steps in securing their business’ assets, and customer’s data. Furthermore, it is also important for these security measures to be effective, and thoroughly planned. It is as equally important, in this interconnected and high-tech world, for corporations to…

Collective Security

Collective security has been both supported and criticised as a method of preventing the outbreak of war. It’s an idea that has been around for centuries but it wasn’t until post World War I when it was truly utilized. Throughout my paper I will discuss in further detail what is meant by collective security and how the theory of collective security has been implemented. I will discuss the criticisms of collective security and what conditions help it succeed. I will go into additional detail upon the prospects of collective security with modern challenges such as terrorism, civil wars, and secessionist revolts. What is Collective Security? Collective security originated from former President of the United States of America Woodrow Wilson (Krause,…

Common Network Vulnerabilities

“Businesses, governments, and other organizations face a wide array of information security risks. Some threaten the confidentiality of private information, some threaten the integrity of data and operations, and still others threaten to disrupt availability of critical systems” (Sullivan, 2009). Since such security risks are always going to present in the cyber world, businesses and organizations need to fully be aware of any vulnerabilities in their systems. The initial realization of any organization’s vulnerability can only first be understood through the knowledge of what vulnerability means. A vulnerability is a security weakness but not a security threat. It is what needs to be assessed in order to examine an organization’s network. One of the main network vulnerabilities facing IT managers…

Military Accountability

Purpose: to provide a refresher on property accountability and an awareness of Army physical security. Agenda Government Property Accountability Equipment Sensitive Items Weapons Physical Security Government Property OCIE Your personal equipment Unit/Section Equipment Tentage, Radios, Vehicles, Anything Green Vehicle BII Driver or TC responsible for Accountability Clothing Record (DA 3845 and Electronic) Used for OCIE Hand Receipt (DA 2062) Used for equipment Sensitive Items Cannot be lost Report immediately to the chain of command if missing Comsec equipment Weapons Certain Technology SINCGARS NBC Alarms, NVG’s Weapons Individuals issued arms are responsible for their security at all times. Each issued weapon will be carried on the person at all times. Weapons will not be entrusted to the custody of another person….

Sample Thesis

Surveillance Camera are video cameras used for the purposed of observing an area. They are often connected to a recording device, IP network, and/or watched by a security personnel/law enforcement officer. Video Surveillance Systems consist of cameras placed in areas where they can monitor activity as it takes place. These cameras may include features like pan, tilt, and zoom; may be placed in outdoor or indoor locations; and may include infrared recording options. Most cameras are used with recording systems, either VCR’s or digital recorders. Using a digital recorder is the preferred option for easy storage, easy recall, and easy viewing over different monitors. The first Video Surveillance System was installed by Siemens AG at Test Stand VII in Peenemunde,…

Hotel Security

“Charles Goslin, Vice President of International Operations for Duos Technologies, Inc., is an international expert in security threat and risk assessment. He developed his extensive security experience as a veteran operations officer for 27 years with the Central Intelligence Agency. He is skilled in developing and executing programs targeting terrorism, espionage, weapons proliferation, and other select U.S. national security objective. He brings a unique, ground-level perspective to security challenges that can only come from a lifetime spent mitigating risk, in all its forms, while living and working abroad. His most recent assignment, before joining Duos, was as a senior advisor to the Regional Joint Terrorism Task Forces (JTTF) in the U.S. In addition to Mr. Goslin’s current work with international…

Security Survey

A security survey at Reedy Recovery Company was conducted on September 15, 2011 by Amy Reedy who was invited and retained by DeVry University for a security assessment. Information in the report was obtained from James Write, Executive Vice President and Chief Financial officer, and Rhonda Forbes, Facilities Manager, personal observations were done by James Write during the inspection of the DeVry facility. The intentions of this report are a detailed audit of all security aspects and phases of the Reedy Recovery Company. Our company will review and evaluate areas and activities that are considered most vulnerable to theft and safety risks. It is not the intentions of Reedy Recovery Company or the writer of this report to evaluate DeVry’s…

Mitigating Computer Fraud in the Online Environment

Crime on the Internet is creating stunning losses for people as well as organizations of all kinds (Internet Crime Complaint Center, 2009; Mensch & Wilkie, 2011). The necessity to inform and educate faculty, staff, and students of the diversity of threats and methods to protect and mitigate organizations and individuals from these threats is practically a moral imperative. People who lack the fundamental skills and knowledge to safeguard themselves and the institutions they attend or work for, cost those institutions and themselves billions of dollars every year, and the cost is rising (Custer, 2010; Internet Crime Complaint Center, 2009). This lack of fundamental skills and knowledge paired with the overall lack of education and information security by a preponderance of…

Biometrics

Biometric Recognition or Biometrics refers to the automatic identification of a person based on intrinsic physical or behavioral traits. It requires physically present at the point of identification. Identification based on biometric techniques lessen the need to remember a password or carry a token like a physical ID. Various biometric traits are being used for real-time recognition, the most popular being face, iris and fingerprint. However, there are biometric systems that are based on retinal scan, voice, signature and hand geometry. First, a user must be enrolled in the system so that his biometric template or reference can be captured. This template is securely stored in a central database. The template is used for matching when an individual needs to…

The Problem of Globalization and Human Security

Globalization is a wide-spread phenomenon that continues to affect or impact the social, political, cultural, and economic aspect of each and every society. It has literally transformed and altered the manner wherein individuals go through their everyday lives. Globalization is a scenario that cannot be fully ignored for it has serious implications and consequences. This explains why such topic has been an all-time favorite in many heated debate and discussions. Experts and various members of the academe have been arguing whether globalization yields to positive or negative results—whether such should be welcomed whole-heartedly or whether drastic measures should be taken to prevent greater degrees of political and economic disasters. The reason behind globalization’s controversy is that it affects not just…

Security Site Survey

The security survey at National Defense Solutions was conducted on May 14, 2009 by Tarquin Shipman who was retained by Devry University for this purpose. Information set forth in this report was obtained Michelle Castro, Executive Vice President & Chief Financial Officer, and from Terrence Graham, Facility Manager, and from personal observations from Tarquin Shipman during the inspection of this facility. This report is intended as a detailed audit of all the phases of the National Defense Solutions operations as well as a review and evaluation of those areas and activities most vulnerable to theft or safety risk. Neither the National Defense Solutions organization nor the writer of this report is in a position to evaluate the integrity of the…

The Role of Information Security Policy

The failure of organizations to implement a comprehensive and robust information security program can mean the untimely demise for some and costly setbacks for others. At the heart of information security is security policy. Without security policy there can be no security program. Without people, security policies would not exist. They would not be written, implemented, and enforced. Security policies and the adoption of standards provide many benefits as shall be discussed in this paper. Further is discussed how information in systems often falls under different classifications to reflect a degree of sensitivity and how this relates to an organization’s security policy. 1.0 Security Policy and Standards. See more: My parents my role model. 1.1 Defining Information Security Policy Conklin…

Network Security

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for…

Homeland Security

Homeland Security is a cabinet level agency in the federal government. Its birth came after the terrorist attacks on September 11th, 2001. Its main goals were to deter terrorism on U. S. soil and the safety of the American infrastructure. It has been reported many times the trouble this department is having getting off the ground. “Hardly a day goes by without some fresh report on a contract gone bad, a new technology that does not work, a new Coast Guard cutter that is not seaworthy, or more cargo that slips through port without inspection” (Light, 2007). Every year new assessments of the department including Congress, the 9/11 Commission and the departments own inspector general gives it low grades for…

Multi-Layered Security Plan

Protecting sensitive or confidential data is paramount in many businesses. In the event such information is made public, businesses may face legal or financial ramifications. At the very least, they will suffer a loss of customer trust. In most cases, however, they can recover from these financial and other losses with appropriate investment or compensation Having information of different security levels on the same computer systems poses a real threat. It is not a straight-forward matter to isolate different information security levels, even though different users log in using different accounts, with different permissions and different access controls (Red Hat, Inc. 2006). Below I have listed the IT infrastructure of Richman Investments along with recommendations in each infrastructure on levels…

Vulnerable Areas of Industrial Security

In the transportation industry such as airport, train, or ships there are many vulnerabilities that can be faced if security measures are not foreseen. These industries can be victims of sabotage, espionage, or lack of security process which would result in the industry loss of product. Sabotage such as terrorism will exist in transportation industries if the operations of the merchandise are not carried out to protocol. Espionage from competitor transportation industries can leak the company’s operations and be a risk for theft. Employee theft can be just as detrimental to the industry as outside theft. Some of the vulnerabilities and countermeasure will be mentioned in this review of different transportation industries. Sabotage can be issues related to terrorism in…