Tag: security

Why has the United Nations failed in its central task of maintaining peace and security since 1990? Essay

Why has the United Nations failed in its central task of maintaining peace and security since 1990? Essay

Introduction

This paper will discuss that, despite keeping peacebuilding, peacemaking and conflict resolution as primary agendas of the UN, there is still a general perception that UN peace and security missions are not successful, especially since 1990. Section I will discuss the definition and concepts of peacekeeping manifested through United Nations Agenda for Peace after 1990. Section II will provide arguments about the reasons behind the failure of United Nations activities for maintaining peace and security. Section III will highlight examples of different United Nations peace and security missions like Bosnia, Sri Lanka and Afghanistan to supplement the arguments.

Read More Read More

Security Policies That Can Help Mitigate Risks And Threats In Ecommerce Essay Sample

Security Policies That Can Help Mitigate Risks And Threats In Ecommerce Essay Sample

… further determine what information cannot be uploaded or downloaded to the system, the appropriate times for accessing the system, and areas of the system that are off limits to certain users (such as administrative areas). Certain information, for example, may need to be stored on a separate server due to …

Read More Read More

Security Policies That Can Help Mitigate Risks And Threats In Ecommerce Essay Example

Security Policies That Can Help Mitigate Risks And Threats In Ecommerce Essay Example

… further determine what information cannot be uploaded or downloaded to the system, the appropriate times for accessing the system, and areas of the system that are off limits to certain users (such as administrative areas). Certain information, for example, may need to be stored on a separate server due to …

… will then grant access privileges by modifying system security settings. When control is not centralized, departments can have conflicting policies based on differing needs and agendas. Clearly defined and enforceable policies are key to effective prevention, as statistics show that a significant percentage of intrusion comes from within the organization …

Read More Read More

Eu Foreign Policy Essay Sample

Eu Foreign Policy Essay Sample

… EU, to guarantee wealth on the continent, and to encourage peace, democracy and development within the international community.
In the late 1800s, British foreign policy was also one of aggressive imperialism. No longer dominating the sea and faced with increasing hostilities between France and Russia in the 1890s, British foreign policy makers sought an alliance with the German Empire. Today, GB occupies a powerful role in the EU and is closest of all EU countries in the relationship with the U.S. and an understanding of U.S. policy. Following 9/11, the country demonstrated strong support of American initiatives …

Read More Read More

Middle East and International Security Essay

Middle East and International Security Essay

The situation in the Middle East region has influenced security issues in most parts of the world. Whatever happens in this region at any particular time is likely to have a greater impact in several parts of the world. When this part of the world is experiencing upheavals almost every part of the world feels the effects of such a conflict. Most of the conflicts that are being experienced in most parts of the world have in one way or another some connections with the situation in Middle East. The Middle East crisis between the Palestine and Israel on one hand and the Arabs on the other has been in existence for over half a century. This region has never experienced peaceful moment for a long period; war has been the order of the day as the two sides battle it out for reasons which do not seem end. The security situation in this region has impacted the international security. It has given rise to international problems which are currently facing the world. It seems the issues of Middle East crisis have affected almost every region of world.

Read More Read More

Border Security Measures and Guantanamo Prison: Answers to Questions

Border Security Measures and Guantanamo Prison: Answers to Questions

Border Security Measures

Without doubt, the issue of illegal immigrants crossing the border from Mexico to the United States is a widely discussed topic. In relation to this, physical means of preventing the entry of illegal immigrants have been placed throughout the border to keep track and ensure that attempted cases of illegal entry are dealt with. Specifically, the means of prevention include pedestrian fences, designation of thousands of patrols and guards, and other devices to keep watch of the areas wherein cases of illegal immigrant entry are highest (U.S. Department of Homeland Security [USDHS], 2007). Definitely, such methods result in both positive and negative implications. On the positive side, there has been lower counts of recorded cases of individuals attempting to cross the border; in fact, a 20% reduction in terms of apprehended individuals by the border patrol has been noted (USDHS, 2007). On the negative side though, individuals still attempt to enter the United States through more dangerous routes leading to even more deaths (Hing, 2006).

Read More Read More

Encryption And Hash Algorithms Essay Sample

Encryption And Hash Algorithms Essay Sample

… offer better encryption by using fast-packet rekeying to change encryption keys frequently. However, security may still be compromised even though it may be harder to do so since there is less traffic with identical keys. The 802.11b standard requires the use of the Remote Authentication Dial-In User Service server for authentication and uses Extensible Authentication Protocol and Transport Layer Security data communication protocols to prevent man-in-the-middle attacks that attempt to bypass authentication. But, the most serious security threat is password theft. Handheld devices do not offer adequate password security and these devices are frequently lost or stolen.
Companies will need to do two things to supplement the security of 802.11b. First, they need to use either a VPN or hardware aggregation devices for encryption. Small wireless LANs can take advantage of VPNs that offer IPsec or PPTP encryption. A wireless LAN client transmits encrypted data through the access point to a VPN concentrator that decrypts the data and passes it onto the wired network. This approach is too expensive and complicated for larger wireless LANs. Hardware aggregation devices scale better than VPNs and interoperate with more wireless equipment. These devices sit between wireless …

Network Security and Telecommunications Essay

Network Security and Telecommunications Essay

Network security is one of the most important technological issues plaguing companies in the world of today. Network security includes provisions and strategic initiatives taken to safeguard and protect information as well as the network based communication and data sharing system from malevolent attacks from hackers as well as those with malicious intent from inside and outside the organization. In order to implement network security, policies and guidelines are developed which are implemented by the network administrators. The protection measures are taken against incidents or likelihood of unauthorized access, and the inefficiency of the network, the data, as well as its related resources.

Read More Read More

New Source of Security Issues Essay

New Source of Security Issues Essay

The economic crisis, the uncountable natural disasters, human corruption and government collapses have lead to the failure of many states in the world nowadays. The foreign policy magazine issues every month a failed state index listing the names of the countries that are doing very bad on the global scene. The first places to be associated with the word crisis and collapse would be the ones that are so dominantly present in the political scene and media, places like Afghanistan and Somalia. However there are many other countries whose domestic trouble could follow the United States back home.

Read More Read More

Automated Accounting Information Systems Essays

Automated Accounting Information Systems Essays

… communication or modifies parts of the communication, sometimes called alteration)
Intercepting communications can have many adverse ramifications for a company. Internal communications can contain information regarding trade secrets, product secrets, competitive secrets, strategy and tactics, marketing plans, productions plans, and more. If this information is leaked to competitors and/or …

Read More Read More