"Information technology in homeland security" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 18 of 50 - About 500 Essays
  • Good Essays

    Phase 5 INDIVIDUAL PROJECT Kenneth Vaughn Colorado Technical University CJUS254-1404-01: Introduction to Homeland Security Professor Sinan Khan November 10‚ 2014 The Department of Homeland Security as a whole is responsible for securing our nation and ensuring the safety of all the citizens that make the United States its home. This mission has become more important since the September 2011 attacks that brought this nation into a devastating period. It was after these attacks that

    Premium United States Department of Homeland Security United States United States Coast Guard

    • 907 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Introduction The Federal Air Marshals are considered to be one of the Department Homeland Security. Throughout history they have been know for keeping passengers on airliners safe from hijackers. Many how question do we still need air marshals with improved security on aircraft and at airports many question the effectiveness of the air marshals. Even though they go through intensive training they have been involved in some controversies that have put the program under the scope even with their

    Premium September 11 attacks Al-Qaeda World Trade Center

    • 953 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Linux Security Technologies John Pierce SELinux (Security Enhanced Linux) is a mandatory access control in the Linux kernel that was originally developed by NSA (National Security Agency) with direct contributions provided by Red Hat Enterprise Linux (RHEL) via the Fedora Project. In the day and age of identity theft and attempted sabotage from terrorists against our country‚ it should be very apparent why an organization like NSA had such an interest in heading up development of a more

    Premium Fedora File system Access control

    • 1126 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Assignment #4 Internet Technology‚ Marketing‚ and Security | Dr. Marilyn Carroll | | | 6/8/2012 | Internet Technology‚ Marketing‚ and Security The corporation I decided to discuss for this assignment is Staples; it’s the world ’s largest office products company and a trusted source for office solutions. Staples provide products‚ services and expertise in the categories of office supplies‚ technology‚ furniture‚ Copy & Print‚ and cleaning and breakroom

    Premium Security Internet marketing Computer security

    • 1943 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data‚ the extra information - which has to go somewhere - can overflow into adjacent buffers‚ corrupting or overwriting the valid data held in them. Although it may occur accidentally through programming error‚ buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks‚ the extra data may contain codes designed to trigger specific actions

    Premium Programming language Computer program E-mail

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Homeland Security Integrative Project Leone‚ Tom-James June 11‚ 2013 Abstract Having well-developed protocols on issues of security‚ as well as utilizing such well-developed protocols as part of a strategy in attending to security issues‚ and periodically reviewing such utilized security protocols as time passes-by in order to increase efficiency is the most enduring way to keep enriching the practices of ‚ and in strengthening US homeland security. Due to lack of a single security

    Premium United States Department of Homeland Security United States Security

    • 2640 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    Sap Information Security

    • 600 Words
    • 3 Pages

    • Provided end-to-end SAP solutions‚ implemented SAP software’s such as SAP R/3 and coordinated execution and operation. • Integrated between business needs and the technology – Designed system strategy • Evaluated customer’s needs‚ defined and installed new values‚ implemented changes‚ planned different transition and tested functionality in order to fulfill organization needs. • Documented test cases‚ managed changes and addressed costs to organization • Trained users‚ prepared training materials

    Premium SAP AG

    • 600 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    VPN connectivity troubleshooting checklist 1. Users can’t access file servers If the user can access the file server using an IP address but not a name‚ then the most likely reason for failure to connect is a name resolution problem. Name resolution can fail for NetBIOS or DNS host names. If the client operating system is NetBIOS dependent‚ the VPN clients should be assigned a WINS server address by the VPN server. If the client operating system uses DNS preferentially‚ VPN clients should be assigned

    Premium Network address translation Virtual private network IP address

    • 1528 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Role of Information Technology in Business Since we live in the “information age‚” information technology has become a part of our everyday lives. It plays a key role in today’s business environment. Many companies greatly rely on computers and software in order to provide accurate information to effectively manage their business. It is becoming increasingly necessary for all businesses to incorporate information technology solutions to operate successfully. The fundamental reasons for the popularity

    Premium Computer Communication Information technology

    • 716 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Communication & Information Technology Paper University of Phoenix HCS/320 Health Care Communication Strategies Kathrine Crawford June 6th‚ 2010 Communication & Information Technology Wireless Technology has brought communication and information technology to a new level with more advancements emerging everyday. Wireless technology has changed the face and day to day operations of health care and promises better‚ faster‚ and more reliable care at a reduced cost. Wireless technology allows nurses

    Premium Health care Illness

    • 728 Words
    • 3 Pages
    Powerful Essays
Page 1 15 16 17 18 19 20 21 22 50