Andy Mc-Nab's Firewall Summary

Decent Essays
Journal #1
In the first few Chapters of my book, Andy Mc-Nab's Firewall. The Story is a little hard to figure out at first but from what I've gathered it's about a man by the name of Nick Stone. He is an ex-SAS agent working for British Intelligence that's desperate for cash even its doing the right or wrong mission. It takes place in Helsinki, Finland 6th of December 1999. Our story in the book begins with Nick with a group of Russians. The setting was gloom, At first I thought they were pulling off a heist but near chapter 2 they talked about their objective. Their mission was to capture a man named Val. It's a unknown reason why however he is very important and he's being paid allot to do it. However the Job turns into a "gang fuck" which

Related Documents

  • Decent Essays

    Logical security : Logical security consists of software safeguards for an organization's systems including user identification and password access, authentication, access rights and authority levels. These measures are to ensure that only authorized users are able to perform actions or access information in a network. Access control mechanism: As part of access control mechanism we are using MAC (mandatory access control mechanism) where users do not enjoy the privileges of deciding who can access their files. Here the operating system is the decision maker overriding the user’s wishes.…

    • 345 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    In the novel Phantom Tollbooth by Norton Juster tells of a world where people literally eat their words. If I had to eat my own words after I said them, then I would be very selective with what I said. I would say, “one small chicken taco made with shredded chicken, a flour tortilla and shredded mexican cheese, three small peeled uncooked carrots and two small ripe red strawberries.” I chose this because I try to eat healthy so I would be sure to have fruits and vegetables.…

    • 129 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The quote, “So many things are possible just as long as you don’t know they are possible” by Norton Juster, means that if you believe something is impossible, you work harder to make the action possible. For example, writing an 80 page essay may seem impossible now, but people who think it is impossible now, will work harder to make sure they write the essay someda. People who know it is possible may not work as hard to achieve the goal. This is just a “theoretical” example, but there are many examples throughout Norton Juster’s book, “Phantom Tollbooth” and throughout the world’s history.…

    • 374 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Snc's Security Case Study

    • 250 Words
    • 1 Pages

    SNC established security prior to brief. SNC was unable to provide the accurate Azimuth in the allotted time. SNC provided a disjointed and incomplete order. SNC started with a vague Orientation. SNC confused the fire team leaders when he blended the information together and failing to state, "Concept of Operations, Scheme of Maneuver, and Tasks".…

    • 250 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    is committed to maintaining our excellent reputation and conducting our mission in a manner that will protect and minimize impact to human health, natural resources and the environment. Our goal is to sustain mission capability while integrating excellent environmental practices, improvements, and compliance to laws and regulations applicable to our mission. This goal extends throughout the 169th Fighter Wing and the tenant units assigned to McEntire JNGB. Protecting the environment at McEntire JNGB is everyone’s daily responsibility regardless of military, civilian, contractor status or position, rank, salary or experience. Together we can execute our mission successfully while minimizing the effects of our operations on the environment.…

    • 324 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This is a true crime novel done in English on paper book and is also available on eBook. This book retails for about $7.00 from most book distribution retailers. Some of the names was changed to protect the identity of the individuals connected to the story.…

    • 1457 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    A lot of big companies like Yahoo!, the New York Times, Target, JP Morgan and Staples have all been the victims of cyber attacks. You might be thinking that it could never happen to a smaller organization, but a lot of smaller organizations have less security than what these mega corporations have. Every business, it does not matter the size, can be vulnerable to DNS hacking. While a lot of smaller companies do not get targeted because they fly under the radar, there is a belief that cyber criminals will target anything with a DNS vulnerability as technology advances. How can you stay safe?…

    • 396 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    One of the strengths of researching IPV is that there is a good amount of research available on the subject, but the research is geared towards heterosexual male abuses female circumstances leading directly to one of the weaknesses within this area. Although the male abuses female circumstance makes up the majority of couples, men are not immune from being victims of abuse and neither is either party in a same-sex relationship. Another strength in this area of study is that there is a lot of awareness around what makes someone become an abuser. With that insight, we can move toward some working on preventative methods for those who are the most at risk. We are a long way from that, but…

    • 252 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The second concern is the RMF and how protecting the network makes it difficult to introduce a cyber environment simulation. Risk Management Framework is the unified information security framework for the entire federal government with the goal to improve information security and strengthen risk management processes (Department of Defense [DoD], 2014). It protects networks and systems from outside vulnerabilities through implementation and constant assessment of security controls. Through the assessment and authorization process, an authorizing official authorizes each network (DoD, 2014).…

    • 641 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ambr Alert Research Paper

    • 754 Words
    • 4 Pages

    Mayrene Slatton-McCoy September 18, 2017 Comp. 1 5th Hour Exemplification Essay AMBER Alert Effectiveness Amber Rene Hagerman was nine years old when she was abducted while riding her bike in 1996. Without luck of finding her, her family and the Federal Bureau of Investigation (FBI) found her dead five days later. In honor of Amber, the AMBER Alert child abduction prevention system was activated (Peters). There is quite a bit of debate on whether the system is effective or not.…

    • 754 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    L. R's GFTA-3 Summary

    • 452 Words
    • 2 Pages

    L.R.’s GFTA-3 results indicate that he produced 20 errors. When compared to other children his age, this score converts to a standard score of 81 with a percentile rank of 10. L.R’s errors are within lower range when compared to children of his chronological age. Based on the findings of the GFTA-3, L.R. presents with an articulation disorder, characterized by final consonant deletion, vocalization, gliding of liquids, omissions, and consonant cluster reduction. Oral Motor Function…

    • 452 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Interdiction. United States of America is a place to visit it is awesome place if you live some were else instead of U.S.A but if you do live in the use and if you already live there you still have more place to visit there .There is 52 states in the U.S.A. History .The United States or North America some people call its was founded by a The Native of Americans but the first states found In the United States was on December 8 ,1787 it was Delaware it was the first place were the colony’s went but then the colony’s such as the 13 colonies were Virginia, George ,North and South Carolina ,new York ,Mass ,N.H, Penn .In 1607 in Jamestown Virginia was the first build but still unknown state they went over to the united states for gold but did…

    • 1098 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Renegade Dreams Analysis

    • 1693 Words
    • 7 Pages

    Most of Fontenelle children were either incarcerated or affected injured by drugs and violence. However, gang violence is a theme that is much more explicitly discussed in Renegade Dreams. The gang’s own foundational belief that the unity of the gang depends on the obligation to repay every debt with violence is another “wire” that traps people in a cage of violence. Frye claims that one caught in this “booby trap” of obstacles, “You can’t win. You are caught in a bind, caught between systematically related pressures” (Frye 3).…

    • 1693 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    SDN are next generation networks. They provide high flexibility, reliability, and security. The main difference between SDN and the traditional network is separation of control and data plane. In SDN, only the controller has the decision-making capabilities. Whereas switches are responsible for traffic forwarding.…

    • 710 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ruth Starkman, while teaching a “Great Books” course in a Shanghai middle school over the summer, had come encounter with “CyberSlacking”. Starkman has taught all over the world. She has taught everything from high level college students, to primary school students in Asia. As an educator and global activist, Starkman is well aware of the benefits that technology has within schools. Starkman confesses in her article, “…I continue to allow devices for numerous reasons:…

    • 546 Words
    • 3 Pages
    Improved Essays