"Security posture" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 37 of 50 - About 500 Essays
  • Powerful Essays

    Linux Security Technologies John Pierce SELinux (Security Enhanced Linux) is a mandatory access control in the Linux kernel that was originally developed by NSA (National Security Agency) with direct contributions provided by Red Hat Enterprise Linux (RHEL) via the Fedora Project. In the day and age of identity theft and attempted sabotage from terrorists against our country‚ it should be very apparent why an organization like NSA had such an interest in heading up development of a more

    Premium Fedora File system Access control

    • 1126 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Food Security Bill

    • 2560 Words
    • 11 Pages

    Revised food bill will have wider reach The bill was truncated from the NAC version at the first stage when the government finalized it and then the parliamentary standing committee went along similar lines and recommended further paring down of the benefits. Sources said concerns were raised by the Congress leadership about reducing existing benefits under the Antodaya Anna Yojana to the 2.5 crore poorest families as well as the recommendation of the standing committee to remove the Integrated

    Premium Poverty Food security Rural

    • 2560 Words
    • 11 Pages
    Good Essays
  • Good Essays

    TJX security breach

    • 801 Words
    • 4 Pages

    the failure points in TJX’s security that requires attention (including‚ but not limited to: People‚ Work Process‚ and Technology)? After analyzing the Ivey case on TJX data fiasco‚ I would say there were three major failure points that caused this $168MM financial hit to the corporation. • Technology: it is obvious that TJX had several technology deficiencies mainly driven by systems limitations and vulnerability. For example‚ inadequate wireless network security allowed the hackers to attack

    Premium Information security Computer security Security

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Portfolio Project Michael Harker ITS350-1 Information Systems and Security Colorado State University Global Campus Dr. Elliott Lynn 09/01/2013 Summary and Explanation of Proposals In order for ZXY Inc. to make sure that their entire organization is secure‚ some proposals have been put into place to protect the company. The company needs to make sure that the network‚ their employee’s‚ company devices‚ and communications are secure from the outside world. The proposals that have been put

    Premium User E-mail Access control

    • 3217 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Food Security in India

    • 1639 Words
    • 7 Pages

    Food security in India The focus on accelerated foodgrains production on a sustainable basis and free trade in grains would help create massive employment and reduce the incidence of poverty in rural areas. INDIA AT present finds itself in the midst of a paradoxical situation: endemic mass-hunger coexisting with the mounting foodgrain stocks. The foodgrain stocks available with the Food Corporation of India (FCI) stand at an all time high of 62 million tonnes against an annual requirement of

    Premium Poverty Agriculture Food security

    • 1639 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Proprietary Versus Contract Security Proper security measures play a huge role in the successful operation of an organization. As the security manager for a company that manufactures high-tech components for an international automobile manufacturer I have been tasked with finding new personnel to ensure security measures are met. There are two different types of security I can choose from; proprietary and contract security. I have done extensive research on the two‚ to help me make the correct

    Premium Security Security guard

    • 1248 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Proprietary versus Contract Security Timothy W. Hall SEC/320 18 February 2013 Jeff Horn As an organization grows so must the security‚ and it has to be on the top of the list. When considering what type of security to choose‚ either proprietary or contact‚ they need to look at the value of the organization? This value within the organization will need some sort of protection to deter theft‚ vandalism‚ and destruction. The boardroom conversation could to from‚ “We have nice stuff” to

    Premium Security guard Security

    • 1284 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    genuine security from staged countermeasures done to pacify the public. Living in a modern society where technology made it possible to do almost anything‚ how are we to know which security measures are real or not? Security is both a feeling and a reality‚ and they’re different. You can feel secure even though you’re not‚ and you can be secure even though you don’t feel it. A renowned expert of Security Theater‚ Bruce Schneier coined the term “Security Theater”. This term refers to security measures

    Premium Security Computer security United States

    • 1783 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Theses: Although the attack on the World Trade Center was a devastating and traumatizing event‚ it created lasting effects on air travel‚ Homeland security‚ and The Patriot Act by fortifying the United States’ security. I. Before the attack on the nation on September 11th‚ airport security was not as it is today; airlines have become stricter and now requires to follow a number of steps for individuals to be able to travel. A. Traveling to foreign lands quickly became more difficult because of

    Premium Terrorism September 11 attacks United States

    • 528 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Understanding Internet Security What you need to protect yourself online. Understanding Internet Security What you need to protect yourself online. Table of Contents SECTION ONE—Internet Security: What it is and why you need it • You and your family are at risk of virtual attacks .....................................................................1 • Understanding how the Internet works and the security threats you face....................................1 • What’s a nuisance‚ what’s

    Premium Internet Computer software Computer

    • 4315 Words
    • 18 Pages
    Satisfactory Essays
Page 1 34 35 36 37 38 39 40 41 50