Computer security Essays

149 essay samples found

Cyber Security Threats on the State Level

This paper examines two notable events of cyber warfare and security in our current age (the Stuxnet attack on centrifuges, and the Petya ransomware affecting citizens and governmental agencies), as well as examines how these attacks shape foreign and domestic policies and procedures. By examining the extent of the damage of these two attacks, I […]

Pages: 7 Words: 1988 Topics: Computer Security, Crime Prevention, Cyber Security, Cyberspace, Information Technology, National Security, Policy, Security

The Department of Homeland Security

The Department of Homeland security was created exclusively to make sure that the U.S. is a safe country to live in. The departments’ main purposes are to pass laws, come up with new policies, fight crime and prevent terrorist activities. Extra roles are securing the country’s immigration and border, counterterrorism, responding to disaster and recovery […]

Pages: 6 Words: 1899 Topics: Computer Security, Crime, Criminal Law, Hate crime, Justice, Law Enforcement, National Security
Having doubts about how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Order now

Security of Blockchain Technology

The blockchain is said to be an indestructible digital ledger that can be formulated to record essentially anything of value. Some people believe that it is one of the greatest achievements since the internet due to the data being stored using sophisticated math and innovative software. It is the underlying technology to what is commonly […]

Pages: 2 Words: 565 Topics: Blockchain, Computer Security, Policy

What is Blockchain?

When people hear the word blockchain, they may often think of bitcoin or cryptocurrency. This is a common connection that people are likely to make resulting from the impact and popularity bitcoin has accomplished. Blockchain is actually the underlying technology for bitcoin and the many other blockchain technology/products. The term blockchain is commonly defined as […]

Pages: 9 Words: 2583 Topics: Blockchain, Computer Security, Policy

The Internet of Things: Wireless Network of Uniquely Identifiable Connected Devices

Problem: The Internet of Things (IoT) may be defined as a wired or wireless network of uniquely identifiable connected devices which can process data and communicate with each other. Reinfurt (2016) discussed many different types of IoT devices such as service gateways, device shadows, rule engine, device wake up, all of which have challenges and […]

Pages: 6 Words: 1937 Topics: Computer Networking, Computer Security, Information Technology, Internet, Internet Of Things

Research on Self-driving Cars

I am doing my research on self-driving cars. A self-driving is basically just a car that drives itself. It is a car or truck in which human drivers are never required to take control to safely operate the vehicle. Also known as autonomous or “”driverless”” cars, they combine sensors and software to control, navigate, and […]

Pages: 1 Words: 433 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Self Driving Cars

Just Mercy: Justice in American

The book “”Just Mercy”” focuses on justice in American. The book is writing by Bryan Stevenson a guy who graduated from college with a degree in philosophy then later figured out philosophy wasn’t really too much for him so he deiced to go to law school to focus more of the racial in the justice […]

Pages: 3 Words: 987 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Just Mercy

The Real Issue Behind Cyber-Security

The steady trend towards digitalization has been occurring for a long time, and as of lately, a new type of crime market has risen alongside digitalization. In recent years, companies all over the world have been affected by some form of cybersecurity issue whether that be attacks to infrastructure or momentary paralyzation of the company […]

Pages: 4 Words: 1229 Topics: Computer Security, Crime Prevention, Cyber Security, Cyberspace, Information Technology, Policy

Cyber Security Threats in Healthcare

With cyber-attacks over the course of 2018 targeting one of the largest industries in the United States – the healthcare industry – it’s time to hone in on protecting patient and institutional information with a more focused approach to cyber-security. Compared to other industries, most healthcare organizations are underinvested in cybersecurity and spend roughly half […]

Pages: 5 Words: 1429 Topics: Cloud Computing, Computer Networking, Computer Security, Crime Prevention, Cyber Security, Cyberspace, Health Care, Information Technology

Cybersecurity for a Successful Acquisition Report

The act of conducting a policy gap analysis is crucial in determining any missing overlap or technical deficiencies when planning to join the IT architecture and network topologies of two or more companies. During the acquisition process, the policies of either party will be examined in order to confirm current software updates and patches, proper […]

Pages: 4 Words: 1270 Topics: Computer Security, Cyber Security, Information Technology

Cyber Security for the Average American

According to statistics, the average American spends 10 hours per day using technology. Whether it be a cellphone, tablet or laptop, that’s more than 40 hours a week online. We think that we’re safe, but part of living in this 21st century is understanding that our so-called private information can easily accessed by the wrong […]

Pages: 6 Words: 1813 Topics: Computer Security, Cyber Security, Cyberspace

Defining Cybersecurity Law

INTRODUCTION In “Defining Cybersecurity Law”, by Jeff Kosseff, the author appears to be more concerned with improving cybersecurity law than he is with defining it. In this paper, I will give a brief summary and critique of the four substantive sections of this article. I will end with a brief mention of aspects of cybersecurity […]

Pages: 8 Words: 2373 Topics: Computer Security, Cyber Security, National Security, Policy, Privacy, Security

About Cybersecurity

I believe everything that is created by man can also be destroyed by it. Humans have proved to be the most intelligent species in this world. We have created the technology that appears to be smarter than the human brain but if it overpowers the human intelligence it can be destroyed as well. Internet works […]

Pages: 5 Words: 1550 Topics: Computer Networking, Computer Security, Cyber Security, Cyberspace, Information Technology, Internet

The Story of Walter McMillian in Just Mercy by Bryan Stevenson

The story of Walter McMillian in Just Mercy by Bryan Stevenson is the one that I found the most intriguing. Bryan, who was the attorney on Walter’s case, was young and just starting his career. He first encountered Walter while he was on death row (20). He had spoken to other inmates on death row […]

Pages: 4 Words: 1084 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Just Mercy

Cyber Security for our Generation

Some of the biggest threats to ordinary people’s security often go unnoticed. Some of the biggest threats to our national security often go unnoticed. These threats often are not publicized, and no emphasis is given to them. These are some of the biggest threats that people face in our generation. The shocking part about these […]

Pages: 11 Words: 3209 Topics: Communication, Computer Security, Cyber Security, Cyberspace, Facebook, Information Technology, Internet, Security, Terrorism

How Pervasive is the Internet in your Life?

Q.1 How pervasive is the internet in your life? How much do you think society has come to depend on the Internet? Answer: When it comes to how pervasive the internet is in current life, my answer is that the internet has almost influenced each event of our daily life every day. Of course, we […]

Pages: 5 Words: 1510 Topics: Computer Security, Cyber Security, Industrial Revolution, Internet

Specific Penalties for Hacking in Criminal Law

Abstract Regardless of the way that hacking is a generally utilized term, it is yet not lawfully settled. In addition, the meaning of the idea of hacking has been sent in a wide assortment of routes in national writing. This equivocalness has prompted different symptoms. As of late in the United States, changes overall referred […]

Pages: 9 Words: 2722 Topics: Computer Security, Crime, Criminal Law, Information, Justice, Prison, Punishment

The Effects of the Epidemic Childhood Obesity

Childhood obesity has become a growing epidemic in more than just the U.S. However, over the past three decades, childhood obesity rates have tripled in the U.S. and today, the country has some of the highest obesity rates in the world: One out of six children is obese, and one out of three children is […]

Pages: 8 Words: 2437 Topics: Childhood Obesity, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

Globalization for Multinational Corporations

Multinational corporations influence and affect the independence of a developing nation. In other words, they don’t give the nation an opportunity to think for them and instead would force upon policies that are in their best interest in order to make investments and then later profits. One such example of this can be East India […]

Pages: 2 Words: 531 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Globalization, Information Technology, Internet

Health Care Cyber Security

Healthcare is an industry section that has turned out to be unstable and basic in this expanding computerized view. This requires an association’s data security program to be legitimately organized as there is no edge for the blunder, which could without much of a stretch mean an actual existence and-passing situation. This article advances both […]

Pages: 1 Words: 279 Topics: Computer Security, Cyber Security

Is there an Ethical Dilemma with Athletes being Paid to Go to College?

College athletes receive money from revenue streams created through scholarship money, but I guess we need to wonder is it enough for what they need. The NCAA has explicit rules that prevent players from accepting bribes or incentives to play different sports and any payment made to the players has been viewed as a moral […]

Pages: 8 Words: 2368 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Should College Athletes Be Paid

An Opposition to Paying Student Athletes

Introduction Intercollegiate athletics have grown popular among Americans over the last few decades. It has caused an increase in revenue for the National Collegiate Athletic Association (NCAA). Despite the rise of revenue, the NCAA prohibits athletes playing sports on the collegiate level from receiving any compensation from sports agents, merchandizers, advertisements, agencies and other non-school […]

Pages: 8 Words: 2255 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Should College Athletes Be Paid

Treatment for down Syndrome

Abstract As stated by the Centers for Disease Control and Prevention, roughly one in every 700 infants in the United States are born with Down Syndrome. This condition continues to be the most common chromosomal disorder. Each year, about 6,000 babies are born with Down Syndrome. In most cases Down Syndrome occurs when an individual […]

Pages: 6 Words: 1722 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Down Syndrome, Information Technology, Internet

The Stress of Life

Introduction We spend much of the beginning of our life in school, whether we go to a public, private or homeschool, for most of us what we learn and experience during our time in school is meant to help us for when we go out into the big wide world. But during those last few […]

Pages: 6 Words: 1798 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Stress

Martin Luther King, Jr: a True Servant Leader

Servant Leadership is a key component in the world today. We had the opportunity to read Greenleaf’s The Servant as Leader. Throughout this book a servant leader is described as being a servant first, then a leader. There are several servant leaders in our world, but the first individual that came to mind was Martin […]

Pages: 5 Words: 1464 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Martin Luther King

Importance of Cyber Crime Management

It is the main motive of state and central government to identity theft, the network intrusions and software piracy. It is a criminal activity, it begun when the hackers starts illegally accessing high level networks. The paper which gives the elaborated form of information regarding cybercrime and security measures including the prevention how to deal […]

Pages: 5 Words: 1412 Topics: Computer Security, Crime, Cyber Crime, Cyberspace, Research

Cybersecurity Issues in Societal Perspective

E-governance and Cybersecurity Documents issued by a country’s government provides a personal identity to an individual. Driver’s licenses, social security numbers, tax identification numbers, and various other entitlement documents are used on a regular basis by people to demonstrate their identity and authorization for various opportunities. Because these documents form the basis for all subsequent […]

Pages: 1 Words: 444 Topics: Computer Security, Cyber Security, Policy

Aristotle Quiz

According to Aristotle, while the house changing from non-being to being was discrete, the change in the quality of its elements was continuous and spanned a period of time. Aristotle argues that a change from being to non-being and vice versa, referred to simply as a change, is different from a change in the quality […]

Pages: 1 Words: 409 Topics: Aristotle, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

Cybercrimes: an Unprecedented Threat to the Society

What is a Cybercrime? Cybercrime, or computer-oriented crime, is the crime that involves computer and its network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrimes can be defined as: “Offences that are committed against individuals or groups of individuals with a criminal motive to […]

Pages: 7 Words: 2184 Topics: Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Information Technology

Substance Abuse Related to Depression

Depression is a mental health disorder that affects the mental state wellbeing of a person. It is a mental illness very commonly found in an adult age groups. Whereas, excessive use or depending on addictive substances such as alcohol and drugs refers to Substance abuse (web). The statistics of people diagnosed with depression and substance […]

Pages: 6 Words: 1684 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Substance Abuse
1 2 3 5