SEARCH RESULTS

YOU WERE LOOKING FOR :international security

Essays 841 - 870

Need a Brand New Custom Essay Now?  click here
Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

Biggest Hacking in U.S. History

Just before Thanksgiving 2013, malware was installed on Target's security and payments system that was designed to capture all the...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

UN Resolution on Libya 1973, The German Abstention

This research paper/essay pertain to the reasons why Germany abstained in regards to UN Security Council Resolution 1973, which pe...

Computer Vulnerabilities in the Energy Industry

Cyber security is an important issue within the energy sector. The Stuxnet targeting of Iranian nuclear facilities demonstrated th...

Discussion Questions on Network Security

In a paper of five pages, the writer looks at network security. A variety of topics are addressed via discussion questions. Paper ...

Security Measures in Operating Systems

In a paper of twelve pages, the writer looks at security measures for operating systems. A variety of such measures are compared a...

Discussion Questions on Cyber Security

In a paper of four pages, the writer looks at cyber security discussion questions. Topics such as spyware and adware are addressed...

Website Development and Security

In a paper of six pages, the writer looks at secure website development. Issues such as cookies, SSL, and SQL security are analyze...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Legality of Computer Ethics

In a paper of five pages, the writer looks at legal issues of computing. Ethics and security issues are examined as well. Paper us...

Homeland Security Issues

In a paper of five pages, the writer looks at Homeland Security issues. Different research questions are proposed on the basis of ...

CHS Cybersecurity

This report discusses the need for the Department of Homeland Security to refocus its resources to include fighting cyber threats....

Department of Homeland Security - Ethical Violations

In a paper of three pages, the writer looks at the Department of Homeland Security. Instances of ethical breaches are explored. Pa...

Patriot Act and New Department

The Department of Homeland Security was signed into law in 2002, a year after the 9/11 attacks on America. Prior to that, the Patr...

Application of an Outline

This essay indicates how the use of an outline aided in the creation of an essay that pertains to the Department of Homeland Secur...

Social Security Privatization - The Debate

In a paper of seven pages, the writer looks at Social Security privatization. The paper presents arguments against privatization. ...

Security Trade-Offs and Liberty

In a paper of three pages, the writer looks at security and liberty. The relationship between the two is examined. Paper uses thre...

Security Topics

In a paper of four pages, the writer looks at discussion questions related to security. Terrorism is also considered, as well as t...

Cyber Security and the Human Element

In a paper of four pages, the writer looks at the human element in cyber security. Steps for drafting an effective approach to pol...

Human Rights And The Use Of International Legal Institutions

upon this perpetual effort has been marred by those whose self-proposed mission is to make sure only certain people are privileged...

Sovereignty: What It Means In Today's Global Society

in world politics illustrates how such groups form out of a need to "right" perceived wrongs. Since they believe their duty is to...

The Corning Glass Building

up the vast majority of a skyscrapers outer structure with glass serving only as a compulsory component that equaled but a fourth ...

What Is the Global Political Economy?

definition are most important, politics or economics, can be very difficult. Jeffrey Freiden a professor with Harvard University, ...

The Status of Refugee under International Law

This international law paper is written in two parts. The first section examines international conventions, primarily the 1951 Co...

Questions on Currency Exchange Rates

the currency, convertibility and stability of that currency (US Department of Treasury, 2012). At the current time the currency do...

The Culture and Operation of the Special Court in Sierra Leone

The Sierra Leone Special Court is an Ad Hoc court set up to hear the cases of those most responsible the atrocities in the Sierra ...

The International Business Environment

and issues such as the GDP, market size as well as disposable income potential aggregate demand in the economy are likely to be co...

Response to Security Council Statement that US War in Iraq is Illegal

treaties such that an "affected party" can take action. The U.S. argued that it was specially affected because it was quite likely...

Security on the Web

people "with malicious intent" (Novogrodsky, 2006). If the information is innocuous, this may not be a problem, but it can be trou...