Consult more than 27027 documents with no limitation. Our subscription options

Theme : Security

Our documents

Filtrer par :

19 déc. 2024

Human rights and national security

Tutorials/exercises - 2 pages - Constitutional law

This document contains 15 short-answer questions on human rights and national security.

23 oct. 2024

Data Security and the Benefits for Users and Companies

Dissertation - 7 pages - Electronics, mechanics, engineering & technology

In today's interconnected digital world, data becomes the life-sustaining fluid of every part of existence, whether we are talking about individual communications or global trade. (Lopez, 2023) illustrates that, ultimately, the role of the SOC becomes a validation of the importance of...

10 déc. 2023

Proposal to Sell a Security Service

Case study - 1 pages - Economy general

We have an important client pitch coming up about our post trade services. Our platform sales group are responsible for pitching global custody, fund services, securities lending, collateral management, OTC clearing, liquidity solutions, and data analytics. These transactions are typically...

08 juin 2022

How has the Belt and Road Initiative played a part in China's cross-regional political and security relations?

Essay - 3 pages - International relations

The announcement of the Belt and Road Initiative in 2013 was meant to signal China's interest in building stronger global economic links, but it has been argued that the BRI also serves to improve Beijing's cross-regional diplomacy in other ways, including strengthening the country's...

06 nov. 2018
doc

Worldwide threat assessment of the French Directorate-General for External Security

Essay - 7 pages - International relations

- The year 2018 has been a really eventful year with unexpected changes in terms of international affairs and regional complexity. - The election of Donald Trump as President of the United States has been a game changer, discombobulating the international order as his predecessor left it. -...

08 oct. 2015
doc

History of private security : the path to professionalism in the security industry

Essay - 3 pages - Economy general

In the United States, private security started as far back as in the mid-19th century. During that time, private security personnel could only be used to fill in the gaps created by the public police forces within major cities which were just forming. Private security...

16 févr. 2015
doc

Fire and Security Monitoring System - Process Architectural Design

Case study - 6 pages - Criminal law

The fire and security monitoring system is meant to manage, and to monitor the fire security alarms in a building. In order to best understand how this system works, it is only prudent to define its design both in terms of the software and the hardware components that it is made up...

29 juil. 2015
doc

The impact of history and gothic art on peace and security

Case study - 5 pages - Arts and art history

This paper entails a collection of 10 pieces of art from Prehistory style to the Gothic style. Each of the ten pieces of art selected portrays the theme of peace and security in terms of managing conflict and violence in a turbulent world. Peace and security are critical...

27 févr. 2015
doc

Security and Risk Management - IT Database security

Case study - 2 pages - Educational studies

The IT infrastructure of the organization makes it susceptible to external intrusions. For example, there are more than 1000 access points with no security awareness programs and no deployed security software programs or reporting to protect the access points. In addition, there is...

14 oct. 2015
ppt

Export from France to Brazil : Scutum Security First

Case study - 3 pages - Business strategy

Competitive assets (certfications / AfterSales / Partners) Recognition & Expertise (partnership with bank essential for direct dredibility on the market to approach french companies with even more assets in our offer) A well targeted communication Efficient studies and recruitments Heavy...

25 mars 2015
doc

Information Security Program - Security Risk Assessment and Audit

Case study - 12 pages - Educational studies

An information security program is one of the fundamental aspects of security management that must be properly implemented to ensure that information within the computer systems are appropriately protected (Krause & Tipton, 2007). Threats to information systems include unauthorized...

15 janv. 2015
pdf

CFSP (Common Foreign and Security Policy) and Non Proliferation

Essay - 12 pages - European union

Since the end of the Cold War, the nature and origins of threats on Europe have changed. This evolution of repartition of powers in the world led some countries to develop their defence and military capabilities, whether it concerns missiles, biological or chemical weapons, or the ultimate...

08 oct. 2015
doc

Information security system management for Swift Courier Company

Essay - 40 pages - Management

This paper focuses on the information security management of Swift Courier. Swift Courier is a relatively small company deals in courier services involving the delivery of various goods and services. The company is based in Abu Dhabi and has clients across the United Arab Emirates (UAE)....

03 sept. 2014
doc

Changes Needed in Wireless Security Measures

Case study - 3 pages - Educational studies

In the recent years home wireless threats have become extremely common. In this study we are going to review the risks and types of attacks users should be aware, when using home wireless networks. We are going to determine which type of network is more secure, and how can users protect...

18 juil. 2014
doc

Tendencies towards privatization of international security management

Essay - 9 pages - Political science

In March 2004, after two foreign soldiers were found dead, the world learned that the troops deployed by the United States in Iraq did not consist solely of local soldiers. A shadow army, composed by more than 100000 contractors was there, and among them thousands of heavily armed mercenaries...

30 avril 2014
doc

Operation "Althea" in Bosnia and Herzegovine: the European security and Defence policy (ESDP) coming of age? - published: 29/09/2010

Essay - 14 pages - International relations

The European Union (EU) is a newcomer in the business of peace support operations. Of course, its members have long been involved in almost any sort of non-Article 5 (NATO/WEU) mission in the past, and they still are today. But they have usually done so under other flags than the EU one. Even if...

24 nov. 2014
doc

The impact of National Security to a Nation

Case study - 3 pages - Educational studies

National security is an extremely sensitive issue for any government. There have been various acts of crime that have led to loss of lives as well as property. However, the government has various doctrines initiated with the intent of helping to solve various crime problems. Crime...

18 oct. 2014
doc

Evaluation of the security transaction, the consistency of the portfolio construction and management with client's profile

Case study - 8 pages - Finance

This year, Pro Fund is very proud to have a new client, Mr Lucent who is 47 years old. He sold his firm during the summer and received 1,000,000€ for it. He doesn't really need this money but he wanted to have a new challenge in another sector. He wants to keep the money for the future...

14 juil. 2014
doc

The High Representative of Union for Foreign Affairs and Security Policy

Essay - 5 pages - European union

This paper will examine the new role of The High Representative of Union for Foreign Affairs and Security Policy (‘High Representative') that came into force in 2009 following the Lisbon Treaty signed in 2007. First, the historical background will be discussed followed by the...

06 oct. 2014
doc

Analyzing financial statements : security Analysis

Tutorials/exercises - 8 pages - Finance

First, let's define what the 'price to book', 'price to sales' and 'price to cash flow' are. The price to book ratio (P/B Ratio) is a financial ratio usually used to compare the stock's market value to its book value. Book value is the term used to designate the...

10 sept. 2014
doc

Is India too poor and does it have too many security problems to become a major player in international relations?

Essay - 6 pages - International relations

In the wake of the emergence of China which is gaining more and more influence at the international level; India is willing to take the same pathway in the search for an international status. As a matter of fact India possesses many assets to reach this position. It is the biggest democracy in...

16 juil. 2014
doc

What prospects for intelligence-sharing within European Security and Defence Policy (ESDP)?

Essay - 3 pages - European union

September 11, 2001 has revealed an unprecedented threat that one could define as 'hyperterrorism'. At the time, what impressed the European observers most was the unability of the US to prevent such a violent attack from happening in its territory and European leaders swore to coordinate...

17 juil. 2014
doc

Electronic commerce: security of e-commerce

Essay - 15 pages - Digital & e-marketing

E-commerce can be defined as all the electronic exchanges connected to the commercial activities. It recovers any operation of sale of goods and services via an electronic channel. Internet is thus only a support among the others of the e-commerce with, among others, the EDI (electronic data...

27 juil. 2014
doc

Likely evolution of the Security and Economic Dynamics in Central Asia

Case study - 3 pages - Educational studies

Central Asia is a region bordering China to the West, Russia to the north and finally Turkey to the South. Historically, this area has lacked strong political representation and has thus relied on powerful neighbors for all aspects of her development. This paper examines the changing dynamics in...

25 juil. 2014
doc

Short essay: Security Council Reform In The United Nations and Changing World Politics (Westview Press, 2007), the author argues that "a significant shake-up in the way the UN does business is essential" if the UN is to keep pace with changing world - published: 10/02/2010

Essay - 3 pages - International relations

The UN Secretary General, Kofi Annan, called in September 2003 for the reform of the UN Security Council (UNSC), in order to make it more effective and more representative, given the changed geopolitical realities. Diverse problems affect both the efficiency and the representative...

15 juil. 2014
doc

The external dimension of European Union immigration and asylum policies - redefining security in the European region

Essay - 7 pages - European union

In February 2003, Tony Blair proposed at the Thessaloniki Summit to create 'transit processing centres' outside the European Union (EU) frontiers in which asylum seekers would be withheld during the time their procedure was completed. Though the proposition wasn't well received at...

16 avril 2014
doc

A study on security analysis for selecting appropriate security

Case study - 79 pages - Management

An investment refers to the commitment of funds at present, in anticipation of some positive rate of return in future. Today the spectrum of investment is indeed wide. An investor is confronted with array of investment avenues. Among all investment, investment in equity is best high proportion....

16 juil. 2014
doc

The European Security and Defence Policy (ESDP) - European Union as a hard power?

Essay - 4 pages - European union

With the treaty of Maastricht's coming into force in 1993, the European Community became the European Union and the Common Foreign and Security Policy became one of the three pillars of this new Union. This step of the European construction was very important because it signified the...

18 juil. 2013
doc

Security vulnerabilities of cloud computing

Case study - 2 pages - Management

Data, for any company, is most important than anything. Companies will take a lot of security measures to ensure the data security and unwanted hacks. This is the major reason companies, which are into data sensitive fields; take a back seat when talking about the cloud computing...

06 sept. 2013
doc

The security plan: Private Doctor's office

Case study - 3 pages - Educational studies

The target area is of a private physician's practice. The location for the practice is a known urban part of town. The location of the practice has both benefits and downfalls. Since the practice is located in a very busy and highly populated section of town, the practice is well known and has...