Computer security

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 38 of 50 - About 500 Essays
  • Improved Essays

    Harlen Coben’s, “The Undercover Parent”published March 16th, 2008 in the New York Times, suggests that spyware should be put on kids computers to monitor what they are doing. Coben uses mostly unofficial stories to support his thesis. The authors reason to write the article was probably was probably due to a personal experience or the uproar in internet usage. Also i believe the intended audience is parents of kids who use the internet. I strongly disagree with Coben’s argument. Being brought up…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    NSA Spying On People

    • 840 Words
    • 4 Pages

    reason finding an article using a simple google search is difficult, because you will never know if the article you are looking at is spreading misinformation, biased views, or even plagiarism. On a controversial issue such as the NSA, (National Security Agency) a government agency created to conduct surveillance on people, the issue of misinformation and bias becomes relevant in an abundance of sources checked. The first website that appears when you do a normal Google search for ‘NSA spying…

    • 840 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    When conducting an experiment to test the hypothesis on whether talking on a cell phone impair ones driving abilities, there are various areas of discussion to consider. Why is a control condition important in testing this hypothesis, how should subjects be assigned to conditions, and how can the researchers design the experiment so that the only difference between both conditions is the use of a cell phone? A controlled condition is anything that can affect the data collected from an…

    • 445 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Apple Security Attack

    • 680 Words
    • 3 Pages

    customer gratitude and support. On December 2nd, 2015, a terrorist attack in San Bernardino occurred, effecting Apple’s company entirely (Waddell). Apple was asked to pull down a security wall on their devices to help with the investigation through the shooters IPhone 5C. However, Apple should not have to risk the security and safety imposed on their devices for the investigation of the San Bernardino attacks. The core issue is concerning a wall that secures all Apple devices with a personal…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    What is the DMRP? DMRP is an approved program with a proven and effective process for removing and tracking discrepant materiel from Air Force (AF) supply. The intent of DMRP is to provide AF level support to ensure a closed loop reporting process for removing and tracking discrepant materiel from AF supply. DMRP is responsible for the following: – AF closed loop reporting process – Maintain a single point of entry for discrepant materiel notices – Address suspect materiel, suspect…

    • 351 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Isn´t the security of U.S. citizens more important than the privacy of phones? Syed Rizwan Farook was one of the shooters in December 2015 during the San Bernardino shootings. The FBI wanted to unlock his phone in order to find out more information about the shooting and to discover the other individuals that were part of it. The FBI took his phone to Apple and the Apple members refused to unlock the phone. That started a huge controversy of security vs. privacy. Security is more important than…

    • 690 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    The article Human Intelligence Collection talks about how HUMINT operations are conducted and its motives behind it. Whether it is personal greed, ideology or revenge against their mother country it will cause exceptionally grave damage to the country. It mentions a few countries such as Soviet Unit, West Germany, and China how they conducted HUMINT operations. The article elaborates intelligence source was collected from emigrate, use of sex to gain secrets, defectors during the Cold War…

    • 329 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Running A Chainsaw

    • 274 Words
    • 2 Pages

    Running a chainsaw safely is of utmost importance. The last thing in the world that you're going to do is a chainsaw accident. These powerful devices are very uncompromising in human flesh, and it would be a shame to see what they will do to your hand, leg or face. However, there are two things that you should definitely be sure to do with your chainsaw on a regular basis. The first is this, make sure the chain has always experienced a strong chain. A boring chain saw chain can mean that in…

    • 274 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    note of, is the possibility of Akbar not only being brought up on fraudulent wiretapping charges. The authorities also have to opportunity to charge Hammad Akabr and other commercial spyware makers alike, with “file conspiracy charges under the Computer Fraud and Abuse Act or use the Stored Communications Act, in situations where stolen data isn’t intercepted in real time. However Zetter also explains how criminal liability and consequences for the sellers of spyware depend on the overall…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Our recommendation to the National Security Council is to pursue Policy #4, using a honeynet to trap attackers and provide attribution. This technical solution is far more covert than our other alternative policies. It allows us to obtain knowledge about hackers’ methods and means of attack during their attempts to infiltrating sensitive data. Most importantly, it could potentially provide irrefutable evidence for attribution. This evidence enables the US to impose harsher sanctions without fear…

    • 381 Words
    • 2 Pages
    Improved Essays
  • Page 1 35 36 37 38 39 40 41 42 50