Computer security Essays

148 essay samples found

The Declaration of Independence: a History Moment

The Declaration of Independence has been justly celebrated since it was written and distributed on July 4, 1776. It is without question the most important short document in United States’ history. Yet one who reads it today cannot fail to be struck by a series of inconsistencies and even departures from morality. This paper will […]

Pages: 5 Words: 1533 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Declaration Of Independence, Digital Technology, Information Technology, Internet

America should not End Birthright Citizenship

“In the United States, birthright citizenship refers to the right of any person to acquire nationality as long as the person has been born within the territory of the state. This has become a major topic in America and the question revolves around what to do with the illegal immigrants who are already living in […]

Pages: 5 Words: 1589 Topics: Citizenship, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet
Having doubts about how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Order now

Citizenship Clause

“Birthright citizenship, which grants citizenship to anyone born in the United States, regardless of whether the individual’s parents are citizens, is a frequent topic of debate. Is the practice legal and what are the pros and cons of awarding citizenship this way? The 14th amendment to the Constitution was ratified on July 9, 1868, and […]

Pages: 8 Words: 2307 Topics: Citizenship, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

The E-Commerce and Cyber Security

The wish is the online e-commerce company that will provide the opportunity for all shoppers to find their favourite wordrobe online in all of the world. Their wardrobe could be included dresses, skirts, jeans and etc…. This company was founded in 2010 and also have the App for their over 100 million users on the […]

Pages: 2 Words: 526 Topics: Computer Networking, Computer Security, Cyber Security, Cyberspace, Information Technology, Internet

Different Methods of Cyber Criminals

Cyber criminals have changed methods through the years and have adapted to whatever security measures applied to prevent their unauthorized access to secure databases and networks. Cybercriminals are now committing their criminal activities for multiple reasons, the least of which is to prove their abilities to their peers and to the world. The methods and […]

Pages: 1 Words: 407 Topics: Communication, Computer Security, Cyber Crime, Cyberspace, Information Technology

Events Experienced by Odysseus

The Odyssey is a well-known poem written by a Greek writer Homer and is considered as one of the most ancient masterpieces of literature. The story of the poem takes place when Odysseus, the brave and strategic warrior fought in the Trojan War in Troy for ten years in Ancient Greece. While away, Odysseus faced […]

Pages: 7 Words: 2017 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Odyssey

About the Odyssey by Homer

The Odyssey by Homer, an old epic written masterpiece, that depicts several themes and surprises we as readers encountered while reading it. Few major themes that will be discussed would be first off, the role of females in the odyssey and then proceed with other aspects of the book, among are power, revenge, family, how […]

Pages: 7 Words: 2019 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Odyssey

Impacts of a Rise in Minimum Wages

Introduction The minimum wage has been, for a long time, a topic of discussion in almost all countries since it directly affects the lives of the citizens. There are arguments and counterarguments regarding the effects of the continuous rise of the minimum wages concerning the welfare of the people and the dynamics of the economy. […]

Pages: 6 Words: 1860 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Minimum Wage

About Federal Minimum Wage

Aleesa Harvey Ms. Kleinsasser Pre-AP English II 27 March 2017 Federal Minimum Wage Should Be Raised Do you want to get paid more? There has been a huge dispute between whether or not the federal minimum wage should be raised. Federal minimum wage was introduced in 1938, by Franklin D. Roosevelt, during the Great Depression. […]

Pages: 5 Words: 1592 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, Minimum Wage

Three Phases of American Revolution

What were the three phases of American revolution? What were the developments in the three phases of American revolution during the seventeenth century? How did the three phases of American revolution evolve? In 1754, war erupted on the North American continent which was known as the French and Indian War. The fighting lasted until 1763, […]

Pages: 7 Words: 2067 Topics: American Revolution, Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet

The Rise of Technologies and Cyber Threats

There is a wide range of cyber threats that happen every day, it is important that we follow all of the necessary precaution’s in order to ensure the safety of our private information including but not limited to passwords, network credentials, banking or credit card information. Malicious attacks occur more frequently than one would expect, […]

Pages: 4 Words: 1215 Topics: Computer Security, Crime Prevention, Cyber Security, Cyberspace, Information Technology, Smartphone

Cybersecurity as a Form of Digital Protection

Cybersecurity is an ever-growing form of digital protection created and used for the sole purpose of protecting confidential information against hard drive malfunctions, power outages, and adversaries. In Healthcare, it is crucial for hospitals and health providers to keep up with the security of digital health data through cybersecurity in order to comply with The […]

Pages: 2 Words: 565 Topics: Computer Security, Crime Prevention, Cyber Security, Cyberspace, Information Technology, Policy

American Federal System

Federalism exists if two levels of government have authority over the same geographic area. The Constitution set up the American federal system and has been amended twenty seven times. Powers of state government were never listed in the original constitution. The Tenth Amendment of the Constitution grants states all powers not specifically granted to the […]

Pages: 1 Words: 388 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Federalism, Information Technology, Internet

To what Extent was Greece Affected by the EU after World War II

The downfall of Greece had begun before the country itself knew it would exist. During World War II, the Greeks had to combat against the Albanians, Italians, Bulgarians and Germans. As a whole, in battling these four countries, around 85,000 Greeks were killed. In an excerpt from a speech to Reichstag on May 4, 1941 […]

Pages: 5 Words: 1559 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, World War 2

The World Growing a World War II Remembrance

When Adolf Hitler invaded Poland on September 1,1939, it would be the start of a cruel, bloody, miserable, and long war for the World. It would come with pain, loss of innocent lives, betrayal, torture, instability, attack, and pure hatred between forces. When France and Britain declared War on Germany, it would be the beginning […]

Pages: 5 Words: 1422 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, World War 2

The Crucible is an Sllegory of the Red Scare

Section I: Introduction Arthur Miller’s, The Crucible, is an allegory of the Red Scare that impacted society mentally, physically, and spiritually. The play displayed a series of abnormal occurrences that followed a similar social and political fallout that was seen prior in the seventeenth century. It was also a means to represent the ridiculous and […]

Pages: 7 Words: 1957 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Crucible

Cybersecurity Paper

With cybersecurity attacks on the rise, the ability of an organization to insure uninterrupted operations is an imperative. No longer can an organization solely rely upon software applications to identify and mitigate cyber risks. It takes a skilled team lead by an experienced manager to holistically address an organizations technology risks. The National Infrastructure Advisory […]

Pages: 3 Words: 779 Topics: Computer Security, Cyber Security, Organization, Policy, Risk

The Crucible as an Allegory of the Witch Trial

With more than 200 people accused and 20 people executed, the Salem Witch trials became a serious case that lasted throughout history inspiring authors like Arthur Miller to write a play based on this issue. Miller wrote, The Crucible as an allegory of the Witch Trials to compensate for the problems that he faced during […]

Pages: 5 Words: 1419 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Information Technology, Internet, The Crucible

Pre-Industrial Revolution

Pre- Industrial Revolution Prior to the Industrial Revolution the way most people lived in Europe was very different to how they lived post the Industrial Revolution. 9 out of 10 people lived in rural areas, there was a large mostly poor lower class, a small rich upper class and not much of a middle class. […]

Pages: 4 Words: 1314 Topics: Computer Networking, Computer Security, Crime Prevention, Cyberspace, Digital Technology, Industrial Revolution, Information Technology, Internet

In Physical Abuse

Child abuse has both short and long term effects on each child. In fact, due to these effects on each child it makes it really hard for society to understand these effects and how to deal with it on a daily basis. Child abuse is considered any act of authority or careless exposure to a […]

Pages: 5 Words: 1622 Topics: Child Abuse, Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

Gap between Health Care and Child Abuse

Disparity: The Gap between Health Care and Child Abuse The disparity gap between health care and child abuse has the potential to impact a professional’s life in an emotional way. Besides legal practices and the training undergone to protect a child from child abuse, professionals have gone through previous studies that have determined the emotional […]

Pages: 6 Words: 1693 Topics: Child Abuse, Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

Child Abuse has been a Major Problem

Child abuse has been a major problem for a long time and most people are completely unaware of this act. This act affects many children and no one really knows what goes on behind closed doors with parents and their child. This is scary to think about, but this is reality and children are put […]

Pages: 5 Words: 1536 Topics: Child Abuse, Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

The Theme of the Holocaust and the Responsibility

When we see an image in black and white, we tend to believe that such an event only occurred in a history textbook years ago. We think of wars, death, power, the absence of life, and aggression. An image in black and white can create a nostalgic mood or a hopeless feeling like the Holocaust […]

Pages: 8 Words: 2519 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Holocaust, Information Technology, Internet

Is Holocaust Denial Real?

The Holocaust was the killing and persecution of over six million Jews and other groups such as the disabled, Gypsies, Slavics, homosexuals, and Jehovah’s Witnesses. The Holocaust was performed and executed by the Nazis in the 1930s and 1940s. Although there is overwhelming evidence of the existence of the Holocaust, people still deny that the […]

Pages: 6 Words: 1762 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Holocaust, Information Technology, Internet

The Effects of Domestic Violence: Family & Society

Unspoken, destructive, and hidden from the outside world. Domestic violence. In grade school it is rarely talked about. October is Domestic Violence awareness month, yet no one said a word. In order to prevent this, we must first understand it. What is domestic violence? It is a pattern of controlling and manipulating behavior that is […]

Pages: 8 Words: 2351 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Domestic Violence, Information Technology, Internet

Substations: Smart Grid & Cyber Security Threats

Transferring from old energy network to a new technology such as smart grids. It changes the energy industry worldwide to better quality, manageability and performance. It gives us the ability to operate it by communications, monitor and control it. However, using communications in smart grid increase connectivity causing our security to be exposed and make […]

Pages: 4 Words: 1165 Topics: Computer Security, Cyber Security

Laws of Cybercrimes

Abstract This paper examines the cyber security and its challenges in current temperamental circumstance of security in present world. These day’s innovation of technology persistently developing more quickly than expected. As a public that runs on latest innovation technologies, we are likewise therefore reliant on it. Where similarly as innovation of technology brings ever more […]

Pages: 3 Words: 775 Topics: Computer Security, Cyber Security, Security

Spousal Abuse and Domestic Violence

Domestic violence or violence between intimate partners, results in the deaths of approximately four women every day and accounts for thirty-one percent of female homicides in the United States. (Mills). For a long time, domestic violence was looked at as a private and personal matter that didn’t necessarily call for police and prosecution concern. In […]

Pages: 8 Words: 2282 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Domestic Violence, Information Technology, Internet

How US Intervention in Afghanistan during the Cold War Led to the Global War on Terror

During the Cold War in the late 1970s the Soviet Union invaded Afghanistan. At the time, tensions between the Soviet Union and the US were high, and so the US was trying to combat the Soviet influence without direct military action that may result in a war between the two nuclear armed countries. The US […]

Pages: 6 Words: 1686 Topics: Cold War, Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Information Technology, Internet

Gender Roles: Attitudes and Behavior

Over the years gender roles have had specific definitions created by society. Gender roles determine how males and females should think, speak, and dress. Also, gender roles can be defined as the behaviors and attitudes expected of male and female members of a society by that society. Gender roles are already developed before you are […]

Pages: 6 Words: 1946 Topics: Computer Networking, Computer Security, Crime Prevention, Cyber Crime, Cyberspace, Digital Technology, Gender Roles, Information Technology, Internet
1 2 3 4 5
Didn't find the paper that you were looking for?
We can create an original paper just for you!
What is your topic?
Number of pages
Deadline 0 days left
Get Your Price