Security Essays


Job Advertisement for Security Manager

Essay Prompt Write a short job advertisement for a security manager for a major commercial company (real or imagined) and specify the qualifications, experience and management skills you require and the salary you expect to pay. Also, produce a more detailed job description which gives more information about the role and management skills required. please Continue Reading... Continue Reading...

Warriors into the Wild

calling out to him to leave the safety and security of his domestic world and embark on the adventure that lies waiting outside the human's yard. In other words, he is going on a quest. The same thing happens in other works in the fantasy genre: Harry Potter leaves his ordinary home to join the wizards' academy. The hobbits leave the Shire to take part in the adventure of the ring in Lord of the Rings. Fantasy books are all about main characters leaving ordinary, everyday surroundings and taking part in an adventure that is larger than life. In… Continue Reading...

At-will Employment and the Law

marshal employee who was essentially fired for blowing the whistle on the Department of Homeland security. As the Nevada legislature makes clear, "At-will employment is a legal doctrine that defines an employment relationship in which either the employer or employee may break off the relationship with no liability, provided that the employee has no contract for a definite term or that the employer has not recognized a labor union" (Policy and Program Report: Labor and Employment, 2016). Nevada is, in short, an at-will employment state. In Las Vegas, Maclean reported to the media that the Department of Homeland securityContinue Reading...

Research Approaches in Maritime Security

¶ … International Ship and Port security (ISPS) Code on Maritime security The study will be based on the question that "What is the impact of the International Ship and Port security (ISPS) Code on Maritime security." Answers will be sought to have this question addressed adequately. The study feels that the ISPS Code has some impacts upon the Maritime security in the world. Thus, the study seeks to uncover the various impacts that are realized by the Maritime security as offered by the ISPS. Scope The influence and functionality… Continue Reading...

Enhancing Ship and Port Security Globally

¶ … International Ship and Port security (Isps) Code on Maritime security Impact of the International Ship and Port security (ISPS) Code on Maritime security The study will be based on the question that "What is the impact of the International Ship and Port security (ISPS) Code on Maritime security." Answers will be sought to have this question addressed adequately. The study feels that the ISPS Code has some impacts upon the Maritime security in the world. Thus, the study seeks to uncover the various impacts that are realized… Continue Reading...

Impact Of Federalism on Privacy Rights

of the U.S. Constitution, especially on the Bill of Rights. In light of recent security threats, the central government has enacted legislation that seemingly infringe on the right to privacy. Moreover, there have been numerous concerns on whether federalism interferes with this constitutional right. Despite these concerns, federalism has had positive impacts on citizens' right to privacy. One of the positive impacts of federalism on privacy rights is enabling people to decide the extent with which legislation affects their privacy. Federalism has achieved this through separation of powers in which state governments decide what kind of laws they enact.… Continue Reading...

Florida Congressmen

immigrant populations of any state and voters are worried about the impact of these foreigners on jobs and their security (Mendoza 11). This legislation in particular appears to be intended to tap into this fear to the benefit of its supporters rather than having any particular benefits for constituents. In this regard, a post by Senator Rubio on his official Web site emphasizes that, "Marco opposes President Obama's attempts to close the detention facility at Guantanamo Bay and has called for terrorists captured in the fight against ISIS to be sent there" (Stand Against ISIS 4). In addition, the… Continue Reading...

International Law on Overt and Covert Interventions

conducts have become critically important to maintain international peace and security, and preventing violation and aggression. However, the principle of the international law prohibits the use of force against other state actors except where the security council authorizes the use of military force to restore the international peace or where a state uses the force as a self-defence. In the international arena, nation states have been found using the overt and covert method to exercise military interventions against other states. However, a self-defense is one of the major factors that provokes a state to exert the overt and covert… Continue Reading...

Global Governance Human Security

our increasingly active global system 2. To have the capacity to recognize, evaluate, and add represent and evolving human security concerns in the geopolitical and authority setting 3. To gain progressive academic competence in interdisciplinary research approach and policy within an array of methodologies (University of Massachusetts Boston, 2016) I have confidence that the interdisciplinary curriculum would address universal concerns from many perspectives and practical approaches. I believe the program would propose wide range of issues including arbitration, human rights, economic growth and expansion, education, health, and environment issues. The graduate program would equip me with knowledge and skills for… Continue Reading...

Muslim Americans and the Impact Of September 11th

pronounced and anti-Muslim immigration policies began to be discussed as a matter of national security.[footnoteRef:2] As -- has shown, the media has been complicit in both demonizing the Muslim community in America and promoting a view of American immigration policy that is anti-Muslim.[footnoteRef:3] This paper will show that the changes in U.S. immigration policy post 9-11 have negatively affected American Muslims in several ways as a result of inherently racist legislation specifically targeting all Muslims regardless of whether they are U.S. citizens or not. [1: Jigyasu, R. "Defining the Definition for Addressing the 'Reality'," in What is a Disaster?:… Continue Reading...

Analysis Of Honolulu International Airport

Agency, Fish and Wildlife Service, Post Office, Center for Disease Control (CDC) and Transportation security Administration. Joint Base Pearl Harbor Hickam (JBPHH) and HNL operate as a joint use facility and share runways and taxiways. At any given daytime or evening hour, an estimated 10,000 people are in the airport complex as passengers, employees or visitors. Approximately 15,000 people work at the airport every day and another 20,000 depend on the airport daily for their livelihood. HNL has a workforce of 550 employees, half of whom are custodians and maintenance personnel. The airport has its own retail stores, restaurants… Continue Reading...

Mobile Ais Security Issues

changing the way SMBs do business, and the second is the role that security plays in this. Most small businesses become interested in cloud-based solutions because of the efficiency gains, and in particular solving the pain point related to payroll, but they are concerned about security Bhansali is clear that security is an essential component for a cloud-based system, because the market demands it. Accounting data is sensitive, and companies that utilize cloud-based solutions insist that this information be protected to the highest standard. Bhansali notes that his company moved to Amazon Web Services, which has one of the… Continue Reading...

Systems Development Process

students would be to contact the company regarding such perceived vulnerabilities (Brey, 2007). security Consultants Frank Abagnale, the criminal played by Leonardo DiCaprio in the motion picture "Catch Me If You Can," ended up in prison. After he left prison, however, he worked as a consultant to many companies on matters of fraud (a) Why do these companies hire the perpetrators (if caught) as consultants? Is this a good idea? The fundamental reason why the companies employ the perpetrators as consultants is simply because they are deemed as fitting advisors. For instance, in this case, Frank Abagnale as an ex-felon… Continue Reading...

Katz V United States

objectively realized by the overall society (Iannacci, 2015). Justice White’s concurrence called for an exception linked to “national security”, to the Supreme Court ruling. Justices Brennan and Douglas also expressed a strong response in their shared concurrence. Justice Black, the only one to disagree (being forever a steadfast textualist), maintained that Amendment IV’s plain text failed to include electronic surveillance. He asserted that the Amendment didn’t create any general right to authorize the Court to freely hold all privacy-violating aspects as unconstitutional. History establishes that the freedom of reposing these powers at court is dangerous. Continue Reading...

Wandering Through the Garden Of Youth

about aging and the charms the women must use -- dresses, hair, voice -- to attain security in life; and this opera is the one that her husband Ch'ien P'eng-chic had heard her sing in when in Nanking -- and it caused him to think of her "day and night" until he finally returned and married her. It was because of this song that Ch'ien had decided to take Madame Ch'ien (Fifth Sister) as his "companion in old age" (p. 352). 3. Why is it ironic that Madame Ch'ien refuses to sing "Waking from the Dream?" a. It is… Continue Reading...

Apple Vs Federal Government

Privacy and security: Apple vs. Federal Government With increased usage of smartphones and other mobile devices, concerns over unauthorized access to private and confidential data stored in the devices have soared. In recent times, Apple Inc., one of the largest manufacturers of smartphones in the U.S. and worldwide, resorted to robust cryptographic techniques in an attempt to protect data customers store on its devices. The move has led to a fierce battle between Apple and the federal government, with the latter citing national security concerns. The government's concerns over national security have… Continue Reading...

Supreme Court

his persistent defense of Obamacare at the Court; Eric Holder, ex- Attorney General; and Jeh Johnson, Secretary of Homeland security. 4th, 5th, 6th, and 8th Amendments Impacted Scalia's relatively civil-libertarian view of Amendment IV left several observers astonished. On particular matters, the Justice backed distinct rules in favor of law enforcement (e.g., the unbiased test for justifying a stop). But with regard to defining fairness and searches, Scalia's formalism and originalism philosophies ensured he supported rules which frequently facilitated crime (Slattery, et.al, 2016). For instance, consider the subject of how a search is defined. Any object plainly visible to… Continue Reading...

Protecting Data and Health Information

clinic. They have sensitive data in the system as well from social security numbers to other identifying information like home address and telephone number. Such information in the wrong hands can lead to identity fraud. The last party that could be affected should personal data leak is the director. She could face potential legal action if the information is leaked under her supervision and guidance. In terms of risks, problems, issues, and consequences, the staffers that have their information leaked or unintentionally leak sensitive data could risk being fired, could suffer through identity fraud, and could put in danger… Continue Reading...

Leadership in the Public Sector

work for the general public. Whether it is education, healthcare, agriculture, security, defense, or corrections, public sector organizations seek to address problems that face the public. Since addressing these problems requires taxpayer resources, transparency and accountability is crucial. As custodians of public resources, public sector leaders have a responsibility to ensure the resources are utilized in an ethical manner (Dukakis, 2010). Deficiencies in transparency and accountability would mean that resources allocated to address a particular problem are embezzled or misappropriated, which may create detrimental consequences for the public. Ethical behavior also means that public leaders' decisions must prioritize the… Continue Reading...

Counter Terrorism Community Policing and Changes

department became more responsible for participating in and ensuring homeland security. While the role of police in homeland security might seem natural or obvious, diverting the attention and resources of police towards the federal concerns of homeland security can have some detrimental outcomes. One of the most important changes Javier noticed was the breakdown in the community policing model that the department had worked so hard to establish. Focusing more on counterterrorism efforts than on building relationships with community members damages the relationships between police and members of the community in serious ways. Police officers are expected to become… Continue Reading...

Crimes Against Property

making use of the internet to perpetrate these particular crimes, which can cause a threat to national security and at the same time place consumers at risk. Moreover, the augmentation of the crimes against intellectual property have been instigated by the emergence of e-commerce as well as the globalization of commerce. This is owing to the fact that it significantly altered the manner in which counterfeit products and goods reach consumers. In the contemporary, the FBI works in tandem with its different partners in law enforcement together with the private sector to deal with and percent crimes against intellectual… Continue Reading...

Two Greatest and Two Worst Presidents in Us History

the bill to the established committee with jurisdiction over the theme (e.g., homeland security or energy) (Sullivan, 2008). This is followed by a vote requiring the participation of all committee members to ascertain whether or not the bill is to be reported (i.e., sent forward for discussion in the House). A successful vote is succeeded by a committee markup session aimed at bill revision with a report composed to explain the committee's reasons for supporting the bill. This report, along with the bill, are directed to the entire chamber, after which the bill gets added to the calendar for… Continue Reading...

Torture and Interrogation Essay

reliable concealed information Concealed information is the foundation of the majority of security issues. In most cases, concealed information is a situation wherein one individual knows something that someone else does not know. Consequently, the majority of security issues could be resolved if there was a dependable method of determining those cases in which an individual was concealing information and extracting that information effectively. To date, though, there has not been a dependable method developed.1 For instance, polygraph research has been unable to achieve an accuracy level that would make the results acceptable in courtrooms in the United States… Continue Reading...

Computer Networks Are Changing

changing. There are a couple of different factors driving these changes, which generally include issues of security, privacy, regulatory concerns, and technological advancements. For the most part, these drivers are resulting in positive changes for computer networks. One of the fundamental ways in which computer networks are changing is that they are incorporating Virtual Private Networks (VPNs). VPNs provide an additional computing network inside of an external network (Monga 343). As such, they are able to buttress security while adding a layer of privacy (Rao and Kavitha 4). There are a number of intruders and hackers who are invading… Continue Reading...

Implementing Compassionate Immigration Reform

economy. Likewise, the initiatives that have been implemented by the Department of Homeland security to identify potential terrorist threats is an important addition to the immigration law mix. . References Bender, S. W. (2010, November). Compassionate immigration reform. Fordham Urban Law Journal, 38(1), 107-111. Early American immigration policies. (2017). U.S. Citizenship and Immigration Services. Retrieved from https://www.uscis.gov/history-and-genealogy/our-history/agency-history/early-american-immigration-policies. Kopan, T. (2017, August 2). How to earn 'points' to come to the US under Trump's immigration plan. CNN Politics. Retrieved from http://www.cnn.com/2017/08/02/politics/cotton-perdue-trump-bill-point-system-merit-based/index.html. U.S. population. (2017). U.S. Census Bureau. Retrieved from https://www.census.gov/ history/www/through_the_decades/fast_facts/1870_fast_facts.html.   Continue Reading...

National Security Impact Of Immigration Policy

Immigration Policies as a Tool for National security Of late, societal apprehension towards immigrants, criminal behavior, and terrorism have intensified, giving rise to concerns regarding the American migrant system’s efficacy in maintaining the safety of the nation’s people. Recent events revolving around crimes, weaponry crossing national boundaries and foreign- born people has triggered a series of reactions with the most intense ones demanding a sealing of borders, barring migration for individuals hailing from high- risk foreign territories, and putting a stop to refugee resettlement. Theory of Migration Migration represents mankind’s story from… Continue Reading...

The Us Grant Programs for Emergencies

Department of Homeland security Grants The HSGP (Homeland security Grant Program) for the fiscal year 2017 contributes significantly to NPS (National Preparedness System) implementation through promoting the creation, delivery and sustenance of key capabilities vital to the achievement of America’s NPG (National Preparedness Goal) geared at improving its security and resilience. The provision of key capabilities necessitates integrated community-wide efforts and not the sole, independent endeavors of a particular governmental level or agency. HSGP’s allowable expenses foster attempts at developing and sustaining key capabilities… Continue Reading...

Analyzing Two Global Security Organizations

A plethora of private firms around the world offer customized security and risk management services. TAL Global and the Wexford Group are two firms that offer some of the most comprehensive security and risk management services, strategies, and techniques, interfacing between public and private sector and wielding power in a wide range of jurisdictions. Wexford Group offers services including operational advising, law enforcement support, program management, risk assessment, operations and intelligence fusion, development and fielding, and also recruitment, assessment, selection, and training (RAST) support for government agencies and private industries. TAL Global offers airport and aviation… Continue Reading...

Proposed Immigration Bill

of the free, is this a vision for a new America? No, it is not. Border security and immigration control can be achieved without such draconian measures. Title I, Section E is, however, generally sound. Funds can be much better spent than on interior enforcement, but it is agreed that a pilot program for notifying immigrants their visas are about to expire is a very good idea. This is a compassionate and sensible solution to preventing overstays. Title II Regarding Title II, we agree that more robust legal pathways for immigration are necessary, sound, and sensible. The Registered Provisional… Continue Reading...

The History Of Security Measures

Introduction to security Measures The history of security is fairly lengthy. security has always accompanied organized civilizations for nearly as long as they have been extant. Initially, security was begotten from the need to protect important personages who, not infrequently, were in the private sector. Therefore, the history of security can be traced to the private security guards who were appointed to protect the Pharaohs and the rulers in Egypt. It is worth noting that these security personnel worked for those in the public sector, yet… Continue Reading...

Private Security Vs National Security

Private security The various factors that influence both the definition and the perception of private security are typically environmental but can be internal and external to the issue of security itself. In most developed nations, the state provides security forces that are paid for by tax payers (local, municipal, state and federal police, and military forces); however, private security forces, typically operated by ex-military officers who bring their training and experience into the private sector to fill gaps in the market where demand cannot be satisfied by state security apparatuses alone,… Continue Reading...

Privacy Risks and Principles

contents of the privacy statement include; scope and content, global privacy standards, collection, use and retention, choice, access, disclosure, security, important information, and questions or complaints (eBay, 2018). On the basis of my intensive review of the website’s privacy policy, I submit that the said policy is not only clear, but also reasonable and relevant to the kind of business the website carries out. Some of the statement’s most reasonable parts are: use and retention, disclosure, and security. With regard to use and retention, the website observes that the personal information it collects is used for contact purposes (i.e.… Continue Reading...

How the Internet Has Changed Society

new challenges in terms of cybersecurity, terrorism, and national security. The Impact of the Internet On Society Increased Dependency on Technology Just less than twenty years ago, only 4% of the world was online; now about 50% of the world is online (Rainie & Anderson, 2017, p. 1). The number of people using the Internet increases, although penetration is likely to be slower in developing countries with poor infrastructure development. Overall, the Internet has increased dependency on technology at almost every level of society. Governments, public utilities, and all finance and business activities now rely on the Internet, as… Continue Reading...

Crime and Security

In the Facebook v. Power Ventures case, the former brought a lawsuit against the latter, alleging violations of several Acts – specifically the Computer Fraud and Abuse Act (CFAA) as appertains to this discussion. Of concern was the move by Power Ventures to facilitate the aggregation of the social media accounts of a user such that the user could use just a single website to view activities (including messages and posts by friends) in the said social media accounts. In essence, users of the Power Ventures website, Power.com, had an option of accessing their profile on Facebook via the said… Continue Reading...

Fast Food Restaurant Security

As with many consumer-oriented businesses, fast food restaurants need to maintain a strong but unobtrusive security profile. Their structures and access points need to remain accessible while still preventing malicious behavior. This security survey of a fast food restaurant provides an example of how to perform a total security audit, identify weaknesses and risks particularly with regards to customer and employee safety, and offer suggestions for improvement. Property and Perimeter The outermost boundaries of the fast food restaurant are the limits of the company’s locus of control. There is a lot the fast food restaurant can… Continue Reading...