Security Essays (Examples)

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

… seriously. As more and more of the world becomes dependent upon cyber infrastructure for the maintenance of other systems, the complexity of the security services of a country grows and intensifies. Is it possible therefore that there is an overreliance upon technology and that this overreliance can … food shortages, businesses closed, and crime broke out with gangs roving from place to place to try to find resources for themselves.
Energy security is needed to support the lives of people who depend upon electricity for work and livelihood. Everyone from farmers to accountants will use … patients and students supported. If the energy system is compromised, hospitals are unable to provide adequate healthcare. If a country has no energy security, it cannot provide all the services required by people when they are most needed—i.e., in a time of attack.
Even though most of …
Even though most of the……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Acquisition Process In Action At The Department Of Energy

Pages: 10 (2943 words) Sources: 8 Document Type:Research Paper Document #:56403146

… major program that has been managed, via the acquisition process, over the past decade, by the Department of Energy at the Y-12 National Security Complex. A description of the demolition project is followed by a discussion concerning the acquisition process that was used to guide the process. … conducted by the U.S. Department of Defense (DOE) in its Alpha 5 project. The stated mission of the DOE is “to ensure America’s security and prosperity by addressing its energy, environmental and nuclear challenges through transformative science and technology solutions” (About DOE, 2020, para. 1).
With more … September 11, 2001. Maintaining the DOE’s far-flung network of facilities demands ongoing attention, though, including one its most important resources, the Y-12 National Security Complex. According to the description provided by the DOE, “The Y?12 National Security Complex is a premier manufacturing facility dedicated to making our nation and the world a safer……

References

References

About DOE. (2020). U.S. Department of Energy. Retrieved from  https://www.energy.gov/about-us ,

About Y-12. (2020). U.S. Department of Energy. Retrieved from  https://www.y12.doe.gov/  about.

Birchfield, J. W. & Albrecht, L. (2012). Successful characterization strategies for the active high risk Y-12 National Security Complex 9201-5 (Alpha-5) Facility, Oak Ridge, TN - 12164. United States.

Recovery cleanup project at Y-12. (2010). U.S. Department of Energy. Retrieved from  https://www.energy.gov/orem/articles/recovery-cleanup-project-y-12-leaves-alpha-5-empty-feeling .

Standard review plan: Acquisition strategy review module. (2010, March). Washington, DC: Office of Environmental Management.

Supplement analysis for the site-wide environmental impact statement for the Y-12 National Security Complex (DOE/EIS-0387-SA-02). (2018, May). U.S. Department of Energy. Retrieved from  https://www.energy.gov/sites/prod/files/2018/05/f51/EIS-0387-SA02-2018_0.pdf .

Teamwork successfully brings down the Alpha 5 Annex. (2018). U.S. Department of Energy. Retrieved from

Studyspark

Study Document Study Document

Firewalls And Filtering

Pages: 4 (1317 words) Sources: 4 Document Type:Research Paper Document #:22384393

Cyber security tendencies have evolved into systems that are used for data security, mostly for big corporations which can afford the service. System vulnerability is one of the major concerns of organizations getting web servers, firewalls … for big corporations which can afford the service. System vulnerability is one of the major concerns of organizations getting web servers, firewalls and security measures for their data. Technology companies burn the midnight oil trying to provide the highest level of security to databases, and a breach of security can be deemed a lapse by the technology company or that their security measures being ineffective. Hackers might send unauthorized packets of data including network inhibitors that might stall the ABC servers which contain online payment … servers which contain online payment processing and customer data.
The best firewall recommended for this system is the next-generation system equipped with sophisticated security protocols for the……

References

References

Anderson, R. O. (1997). EMERGING CHALLENGE: SECURITY AND SAFETY IN CYBERSPACE. In R. O. Anderson, In Athena's Camp: Preparing for Conflict in the Information Age (pp. 231–252). RAND corporation.

Martin C. Libicki, L. A. (2015). The Efficacy of Security Systems. In L. A. Martin C. Libicki, The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23-40). Santa Monica: RAND Corporation.

Mays, J. (2018, September 24). Understanding Load Balancing for Web Servers. Retrieved from Liquid Web:  https://www.liquidweb.com/kb/understanding-load-balancing/ 

Thu, A. A. (2013). Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. International Journal of Computer Applications, 9-13.

Studyspark

Study Document Study Document

FBI Drugs And WMDs

Pages: 11 (3378 words) Sources: 13 Document Type:Research Paper Document #:66505511

… against America. As the primary research question of this study is “In what ways can the nonproliferation regime connect and collaborate with homeland security as a way to improve counterterrorism strategy?” this literature review will focus on identifying sources that can help to answer that question, including … weapons to military forces in the 1990s.”[footnoteRef:3] Yet, it was 9/11 that truly introduced the intensely broadened scope, especially with regards to homeland security.[footnoteRef:4] The origins of the strategy can ultimately be found in the Gulf War crisis of 1991, under the George H. Bush Administration—and its … specific mechanisms to plan and execute operational responses to the threat or use of weapons of mass destruction, whether diplomatic initiative, foreign assistance, security assurances, covert action, or military retaliation.”[footnoteRef:9] The emphasis on covert action is particularly of importance insofar as the FBI is concerned. The infiltration … that it does not take……

References

Bibliography

Arnold, Aaron and Daniel Salisbury, “The Long Arm,” Belfer Center, 2019. https://www.belfercenter.org/publication/long-arm

Carter, Ashton B. "Overhauling counterproliferation." Technology in Society 26, no. 2-3 (2004): 257-269.

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. “Combating Proliferation of Weapons of Mass Destruction,” Washington, D.C., 1999.

FBI. “COINTELPRO.”  https://vault.fbi.gov/cointel-pro 

FBI Counterproliferation Center. “About.”  https://www.fbi.gov/about/leadership-and-structure/national-security-branch/fbi-counterproliferation-center 

Fischer, Rowena Rege. “Guide to the Study of Intelligence: Counterproliferation,” Journal of U.S. Intelligence Studies 21, no. 1 (Winter 2014-15), 78-82.

Liow, Joseph Chinyong. "The Mahathir administration's war against Islamic militancy: operational and ideological challenges." Australian Journal of International Affairs 58, no. 2 (2004): 241-256.

Manchikanti, Laxmaiah, Jaya Sanapati, Ramsin M. Benyamin, Sairam Atluri, Alan D. Kaye, and Joshua A. Hirsch. "Reframing the prevention strategies of the opioid crisis: focusing on prescription opioids, fentanyl, and heroin epidemic." Pain physician 21, no. 4 (2018): 309-326.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage … on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage, acceptability, proposition, state behavior, cyberattack, relationship, … existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage, acceptability, proposition, state behavior, cyberattack, relationship, intelligence gathering, national security.
Introduction
Cyberspace has become an important element ins the operations of any given country because of today’s information age. The significance……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384


2.3.3 Hybrid Cloud 9
2.4 Effectiveness of Cloud Computing 9
2.4.1 Cost-Savings 9
2.4.2 Remote Accessibility 10
2.4.3 Scalability and Flexibility 11
2.4.4 Security 11
2.4.5 Energy Efficiency 11
3 Methodology 12
3.1 Research Approach and Design 12
3.2 Data Collection Sources & Selection Plan 12
3.3 … can preclude an accounting organization’s capability of conducting business operations productively, cloud computing can facilitate a greater level of control and data backup, security accessibilities and also enables the accounting enterprises in business diversification. Numerous accounting organizations are shifting towards cloud computing owing to the reason that … is the service provider that is fully liable for the construction of the servers and the storage centers, networking services, and installation of security and computer firewalls, and also physical data spaces and centers that are situated within the organizational buildings. Some of the renowned IaaS service ……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

… (HIS) that meets current Health Information Technology for Economic and Clinical Health (HITECH) Act and the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy regulatory requirements. To this end, a discussion and analysis of health information systems, a description concerning how a system will affect … and compatibility of disparate health information systems is the use of middleware. For example, Shahmoradi and Habibi-Koolaee (2016) report that:
Standards on terminology, security and data exchange play a critical role to integrate health information systems and provide interoperability across heterogeneous systems. Middleware is a tool to ……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Studyspark

Study Document Study Document

The FBI Counterproliferation And Weapons Of Mass Destruction

Pages: 6 (1839 words) Sources: 8 Document Type:Research Paper Document #:33590628

… second such directive the Administration had issued. The Quadrennial Defense Review in 2010 emphasized on how WMD’s proliferation was a threat to global security. In April of the same year, the Administration unclassified the Nuclear Posture Review for the first time and it was released alongside the … These attacks have the potential to cause a lot of social and economic disruption and lead to the infection of humans…[break]…domestic and international security. Going forward, there is need for a more collaborative effort between all concerned agencies that stresses on consistency in both policy and actions. … by non-state actors (Jennings 2013, 6).
Methods of Evaluation
There is need to put in place frameworks that can integrate domestic and international security efforts more effectively. To this end, there will be a policy analysis to identify the alternatives and options available. The data for this … alternatives and options available. The……

References

References

Busch, Nathan, and Joyner, Daniel (ed). 2009. “Introduction: Nonproliferation at a Crossroads.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Athens, GA: The University of Georgia Press.

Reiss, Mitchell. 2009. “Foreword.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Edited by Nathan Busch, and Daniel Joyner. Athens, GA: The University of Georgia Press.

Cameron, Gavin, Pate, Jason & Vogel, Kathleen. (2001). “Planting Fear: How Real is the Threat of Agricultural Terrorism?” Bulletin of Atomic Scientists, 57(5), 38-44.

Jennings, Elain. 2013. U. S. proliferation policy and the campaign against transnational terror: Linking the U.S. non-proliferation regime to homeland security efforts. Master’s Thesis. Naval Postgraduate School.

Levi, Michael. 2009. “On Nuclear Terrorism.” Cambridge, MA: Cambridge University Press.

Mauroni, Albert. J. 2010. “A Counter-WMD Strategy for the Future.” Parameters, 58-73.

Ogilvie-White, Tanya. 2008. “Facilitating Implementation of Resolution 1540 in South- East Asia, and the South Pacific.” In Implementing Resolution 1540: The Role of Regional Organizations. Edited by Lawrence Scheinman. New York: United Nations Institute for Disarmament Research.

Pilat Joseph F. 2009. “Dealing with Proliferation and Terrorism.” In Combating Weapons of Mass Destruction: The Future of International Nonproliferation Policy, edited by Nathan E. Busch and Daniel H. Joyner. Athens, GA: University of Georgia Press.

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

… economic threats.
Preventing and detecting insider threats is one of the core aspects of the ONCIX strategy. As a new premier counterintelligence and security agency in the U.S. government, ONCIX needs a strong understanding of how to identify and deter insider threats. According to its strategy, “the … and of monitoring for the sake and safety of the operation.
Question 2: Generate a plan which embeds effective counter-intelligence procedures to enhance security in one of the areas of recurring weakness: Inadequate Vetting; Employment Disgruntlement; Apathy / Reticence towards spendthrifts; Tolerance of alcoholics.
Effective counter-intelligence procedures … spendthrifts; Tolerance of alcoholics.
Effective counter-intelligence procedures include taking the offense and being proactive rather than reactive. Thus, the best way to enhance security in one of the areas of recurring weakness, such as tolerance of alcoholics, is to create an organizational culture that is prohibitive of … on both sides of the……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Federal Reserve Operations And Market Impact

Pages: 4 (1239 words) Sources: 4 Document Type:Essay Document #:28039044

...Security What tools are used by the Federal Reserve to implement monetary policy?
Monetary policy refers to the actions undertaken by the Federal Reserve, which is the central bank, to control credit and its flow within the United States economy. Significantly, what occurs with money and credit influences interest rates and also the performance of the nation’s economy as a whole (Federal Reserve Education, n.d).
The Federal Reserve presently utilizes numerous tools in the implementation of monetary policy about its statutory obligation to nurture maximum employment and stability in prices. The following are the tools:
1. Open market operations (OMO)
The Fed carries out OMO in domestic markets. The terminology open market implies that the Federal Reserve does not decide on its own concerning the kind of securities dealers it will carry out business with on a certain day. Instead, this choice emanates from an open market whereby the different securities……

References

References

Brandl, M. (2020). Money, banking, financial markets & institutions. New York: Cengage Learning.

Federal Reserve Education. (n.d). Monetary Policy Basics. Retrieved from:  https://www.federalreserveeducation.org/about-the-fed/structure-and-functions/monetary-policy 

Federal Reserve. (2017). Monetary Policy Tools. Retrieved from:  https://www.federalreserve.gov/monetarypolicy/bsd-monetary-policy-tools-201711.htm 

Lumen Learning. (n.d). Macroeconomics: How a Central Bank Executes Monetary Policy. Retrieved from:  https://courses.lumenlearning.com/suny-macroeconomics/chapter/tools-of-monetary-policy/ 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".