"Security guard" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 43 of 50 - About 500 Essays
  • Good Essays

    Security plays a significant role in today’s corporations and mitigating risks to a company’s most valuable asset‚ data‚ is important. With data breaches‚ such as the one experienced by Target‚ the Department of Homeland Security as well as the Internal Revenue System‚ it is becoming increasingly obvious that no one is immune. Securing data is complex and with the advent of cloud services where information is now gathered and stored in various locations throughout the globe‚ securing that data

    Premium Security Information security Computer security

    • 1286 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    NATIONAL SECURITY STRATEGY PRINCIPLES OF NATIONAL SECURITY 11/3/2013 PRINCIPICLES OF NATIONAL SECURITY The National Security Strategy of the Republic of South Africa is a system of state policy aimed to guarantee state‚ public‚ and individual security‚ sustainable development and the maintenance of the South African identity. It is implemented through the development and execution of a unified state policy based on an all-inclusive system of democratic values for all spheres

    Premium National security International security South Africa

    • 3053 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Crime and Security

    • 1407 Words
    • 6 Pages

    Slide 2:  What is Cybercrime? Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs Cybercrime is nothing but where the computer used as an object or subject of crime Online activities are just as vulnerable to crime and can compromise personal safety just as effectively as common everyday crimes. Lawmakers‚ law enforcement‚ and individuals need to know how to protect themselves and the persons for which they are responsible.

    Premium Computer Computer security Malware

    • 1407 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    ABSTRACT WHAT WAS DONE: The issue-specific security policy was the main focus for this research paper. An analysis of the policy itself was conducted and also a set of guidelines were developed that comply with this policy. The components of the policy and how organisations would use them were looked into. The reason for choosing the issue-specific security policy was because it was the least investigated yet potentially the most important policy of all three key policies. The purpose of the

    Premium Information security Policy Security

    • 3522 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    of governance in the security sector is being addressed in the context of rebuilding Afghanistan is‚ I believe‚ a reflection of two important shifts in development thinking over the last decade. First‚ it is now widely acknowledged that without a safe and secure environment‚ there can be neither sustainable‚ poverty reducing economic and social development nor political development. Additionally‚ there is growing appreciation of the fact that sound governance of the security sector is critical to

    Premium Security National security Police

    • 6608 Words
    • 27 Pages
    Powerful Essays
  • Better Essays

    of Security and Privacy on the Internet issue. The term "information" now is more used when defining a special product or article of trade which could be bought‚ sold‚ exchanged‚ etc. Often the price of information is higher many times than the cost of the very computers and technologies where it is functioning. Naturally it raises the need of protecting information from unauthorized access‚ theft‚ destruction‚ and other crimes. However‚ many users do not realize that they risk their security and

    Premium Internet Computer security Security

    • 1544 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Contents Newspaper Articles on Information Security Threats 2 Methods of Spreading Awareness 3 Potential Threats 5 Classified Letter 6 References 9 Newspaper Articles on Information Security Threats The number of articles found‚ discussing and reporting the threat to information security were four. A brief summary of each is given as follows: The first article was the threat posed due to the malware viable and distributed on the internet. The social networking websites and other free sources

    Premium Security Computer security Information security

    • 2132 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    inclusive security posture. • Investigation: Management give directions by specifying the goals‚ processes and the expected outcomes of the project and the costs of the project. At the end of that phase you must have a feasibility study document. • Analysis: The analysis in the secSDLC is when project manager or the team analys the existing security policies‚ identifying current threats and attacks and also Identifying‚ assessing and evaluating level of risk within the organizations security. •

    Premium Security Information security Computer security

    • 638 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    and worms are growing more pervasive and damaging‚ and ABC Heathcare’s stakeholders are demanding more flexible access to their systems. The healthcare industry is experiencing significant regulatory pressures that mandate prudent information security and systems management practices. Furthermore‚ the continued pressure to reduce cost requires that management focus on streamlining operations‚ reducing management overhead and minimizing human intervention. The regulatory focus at ABC Healthcare

    Premium Security Computer security Information security

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Linux Security Technologies John Pierce SELinux (Security Enhanced Linux) is a mandatory access control in the Linux kernel that was originally developed by NSA (National Security Agency) with direct contributions provided by Red Hat Enterprise Linux (RHEL) via the Fedora Project. In the day and age of identity theft and attempted sabotage from terrorists against our country‚ it should be very apparent why an organization like NSA had such an interest in heading up development of a more

    Premium Fedora File system Access control

    • 1126 Words
    • 5 Pages
    Powerful Essays
Page 1 40 41 42 43 44 45 46 47 50