Security Analysis Essays (Examples)

1000+ documents containing “security analysis”.
Sort By:
By Keywords
Reset Filters

Example Essays

Essay
Security Analysis' Has Been Current for More
Pages: 2 Words: 635

Security Analysis' has been current for more than 60 years. Graham and Dodd are not only astute observers but also veterans in the field of investing. They have seen investment markets and businesses plunge and raise themselves and have observed investor's behavior under all conditions.
Although their books are classics, Graham and Dodd manage to write in a clear and contemporary style that is just as applicable today as it was then. They provide details and techniques for achieving success as investors as well as the responsibilities of businesses to be transparent about the affair of their businesses for shareholders and potential investors.

The brunt of the book, however, is its timeless advice to students that careful assessment and review of balance sheets is the essence and key to success in investment.

The fact that Buffet writes that he has been following their "road map" for 57 years and that this is…...

mla

Reference

Graham, BG & Dodd, DL. Security Analysis: Principles and techniques. McGraw Hill, 2010.

Essay
Security Analysis in the UK
Pages: 8 Words: 2541

Security eport
In the present day, organizations are reliant on information in order to continue being relevant and not become obsolete. To be specific, organizations are reliant on the controls and systems that have been instituted in place, which provide the continuing privacy, veracity, and accessibility of their data and information (Lomprey, 2008). There is an increase and rise in threats to information contained within organizations and information systems (Lomprey, 2008). There is also a rise in the intricacy of such systems and information, which places emphasis on the importance for organizations to understand and gain an understanding of how to better safeguard their information as well as information systems. As stated by Briggs (2005), globalization has instigated the world to become a global village. This, in turn, has increased the level of complexity and intricacy of the information security aspect of the organizations across the world. There is greater need…...

mla

References

Alfawaz, S. M. (2011). Information security management: a case study of an information security culture (Doctoral dissertation, Queensland University of Technology).

Ashenden, D. (2008). Information Security management: A human challenge? Information security technical report, 13(4), 195-201.

Briggs, R. (2005). Joining Forces From national security to networked security. DEMOS.

Chang, S. E., Ho, C. B. (2006). Organizational factors to the effectiveness of implementing information security management. Industrial Management and Data Systems, 106 (3): 345-361.

Essay
Security Analysis in the UK
Pages: 8 Words: 2542

Corporate Security Challenges
Critically discuss the assertion by Briggs and Edwards (2006, p.21) that corporate security departments face the same challenges as any other business function: "they must keep pace with their company's changing business environment and ensure that how they work, what they do and how they behave reflect these realities

The world has become a global village through globalization. Business undertakings have come to be more and more intricate. This in turn has altered and transformed the structure and the strides being taken in the corporate realm (Tipton and Krause, 2003). This is owing to a number of aspects. To start with, the inundation of traditional markets is causing organizations to move towards risky directions. For instance, in the contemporary, the advancement of business strategies, such as having offshore companies, enable the management of organizations from afar (McGee, 2006). In addition, the rise of accountability of organizations through corporate social…...

mla

References

Albano, G. L., Calzolari, G., Dini, F., Iossa, E., & Spagnolo, G. (2006). Procurement Contracting Stategies. Available at SSRN 908220.

Briggs, R. and Edwards, C. (2006). The Business of Resilience: Corporate Security for the 21st Century. London: Demos.

Brooks, D. J. (2013). Corporate Security: Using knowledge construction to define a practising body of knowledge. Asian journal of criminology, 8(2), 89-101.

Cavanagh, T. E. (2005). Corporate Security Measures and Practices: An overview of security management since 9/11. New York: The Conference Board.

Essay
Security Overview Businesses Today Are
Pages: 13 Words: 3366

(Gartenberg, 2005)
Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify.

The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture and what therefore can be relatively easily changed. Matz (2010) summarizes the ways in which organizational culture both supports an organization and can blind the individuals in it to ways in which their actions may no longer be as effective as they once were:

… the essence of organisational cultures consists of a set of 'unspoken rules' that exist without conscious knowledge of the members of the organisation. Over time the invisibility of the attributes at the deepest level of the…...

mla

References

Dalton, D.R. (2003). Rethinking Corporate Security in the Post 9/11 Era, New York: Butterworth-Heinemann

Deal, T.E. & Kennedy, a.A. (1982). Corporate Cultures: The Rites, and Rituals of Corporate Life, London: Penguin.

Gartenberg, M. (2005). How to develop an enterprise security policy.  http://www.computerworld.com/s/article/98896/How_to_develop_an_enterprise_security_policy .

Johnston, L. & Shearing, C. (2003). Governing Security: Explorations in Policing and Justice. London: Routledge.

Essay
Security Measures and Security
Pages: 6 Words: 1951

Security Measures
The hotel industry has experienced the need to enhance security of guests in the recent past given the increased security threats/attacks in the modern business environment. The increased focus on enhancing security in the hotel industry has represented a major shift from the serious neglect of various security responsibilities that characterized this industry in the past. According to Fischer, Halibozek & Walters (2013), hotel managers, particularly security managers, are faced with the need to enhance their security measures because of the numerous safety concerns in this sector such as potential terrorist attacks. In light of modern security concerns, there is need to adopt a comprehensive approach towards improving hotel security. This paper provides a plan for improving hotel security during ground breaking, grand opening, and across daily operations. The discussion is based on plans to construct the newly approved John Jay Hotel on 59th Street in New York City.

Security…...

mla

References

Bennett, F.L. (2007). The management of construction: a project lifecycle approach. Third Avenue, NY: Taylor & Francis Group.

Fischer, R.J., Halibozek, E.P. & Walters, D.C. (2013). Introduction to security (9th ed.). Waltham, MA: Butterworth-Heinemann.

Heibutzki, R. (n.d.). Safety and Security Tips for Hotel Management. Retrieved June 28, 2017, from  http://work.chron.com/safety-security-tips-hotel-management-7983.html 

National Counter Terrorism Security Office. (n.d.). Counter Terrorism Protective Security Advice for Hotels and Restaurants. Retrieved from Association of Chief Police Officers website:  https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/374923/Hotels_Restaurants_Reviewed.pdf

Essay
Security Awareness the Weakest Link
Pages: 30 Words: 8202


To offer an information security awareness training curriculum framework to promote consistency across government (15).

Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not about training but rather designed to change employee behavior" (105).

A program concerning security awareness should work in conjunction with the information technology software and hardware JCS utilizes. In this way, it mitigates the risks and threats to the organization. Security awareness is a defensive layer to the information system's overall security structure. Although not a training program, per se, security awareness does provide education to the end users at JCS, regarding the information security threats the organization faces, and the…...

mla

References

"An Introduction to Computer Security: The NIST Handbook." National Institute of Standards and Technology, SP 800-12, (Oct 1995). Web. 24 Oct 2010.

Anti-virus Guidelines. The SANS Institute, 2006. Web. 24 Oct, 2010.

Culnan, M., Foxman, E., & Ray, A. "Why IT Executives Should Help Employees Secure their Home Computers." MIS Quarterly Executive 7.1 (2008): 49-56. Print.

Desktop Security Policies. The SANS Institute, 2006. Web. 24 Oct, 2010.

Essay
Security Manager Leadership Analysis & Assessment of
Pages: 7 Words: 2003

Security Manager Leadership
Analysis & Assessment of Main Management Skills of Security Managers

The role of security managers and their progression to Chief Information Security Officers (CISO) in their careers is often delineated by a very broad base of experiences, expertise, skills and the continual development of management and leadership skills. The intent of this analysis and assessment is to define the most critically important management skills for security managers, including those most critical to their setting a solid foundation for attaining a senior management as a CISO in an enterprise (Whitten, 2008). What most differentiates those who progress in their careers as security managers to CISOs is the ability to interpret situations, conditions, relative levels of risk while continually learning new techniques, technologies and concepts pertaining to security and leadership. Those that attain CISO roles progress beyond management and become transformational leaders of the professionals in their department. It is the…...

mla

References

Beugr, C.D., Acar, W. & Braun, W. 2006, "Transformational leadership in organizations: an environment-induced model," International Journal of Manpower, vol. 27, no. 1, pp. 52-62.

Francis, D. 2003, "Essentials of International Management: A Cross-cultural Perspective," Technovation, vol. 23, no. 1, pp. 85-86.

Krishnan, V.R. 2004, "Impact of transformational leadership on followers' influence strategies," Leadership & Organization Development Journal, vol. 25, no. 1, pp. 58-72.

Purvanova, R.K. & Bono, J.E. 2009, "Transformational leadership in context: Face-to-face and virtual teams," Leadership Quarterly, vol. 20, no. 3, pp. 343.

Essay
Security Issues Creating a Site
Pages: 17 Words: 4754


Even though there is always some form of a risk involved in the coding technique together with the deployment methods of a website, some technologies such as PHP and MySQL form some of the worst aggravators of online website security. The loopholes that exists in the use of these technologies results in some of the worst hack attacks and security breaches ever experienced in the field of web design. The internet is bustling with a lot of activities. Some of the activities that are officiated over the internet are very sensitive due to both the nature of the information exchanged or even the information stored in the database.

It is paramount that websites be provided with secure and personalized databases. One inevitable fact however is that once a site is deployed on the internet, it becomes a resource to be accessed by everyone as postulated by Kabir

Secure website development is of…...

mla

Bibliography

Bloch, M (2004). "PHP/MySQL Tutorial - Introduction." ThinkHost. .

Friedl, J (2002). Mastering Regular Expressions, Second Edition. Sebastopol, CA: O'Reilly & Associates Inc., 2002.

Kabir, MJ (2003) Secure PHP Development: Building 50 Practical Applications.

Indianapolis, in: Wiley Publishing, Inc.

Essay
Security Risk Assessment the Steps
Pages: 2 Words: 676

The same does apply to security metrics such that these metrics establish the performance within the organization and the effectiveness of the organization's security.
The purpose of Risk Analysis is to spot and find security risks in the current framework and to resolve the risk exposure identified by the risk analysis. The type of security risk assessment for an organization is a function of a number of available assessments. However, the most important security protocol is to protect the organizations assets. Therefore, the most important security risk assessment for this purpose is the penetration testing proceeded by the vulnerability scan (Landoll, 2006). Protection of assets is of primary concern. Assets include both physical and non-physical assets. Non-physical assets are defined as assets that are not tangible. The Security Audit is indeed imperative, as is the Ad Hoc testing and Social Engineering test.

Annotated ibliography

Campbell, G. (2010, What's state-of-the-art in security metrics?…...

mla

Bibliography

Campbell, G. (2010, What's state-of-the-art in security metrics? Security Technology Executive, 20(9), 19-19. Retrieved from  http://search.proquest.com/docview/823012983?accountid=13044 

Campbell (2010) delves into the newest technologies currently used in security technology. Contract security guards, he contests, account for more than $16 billion in the United States, employing more than public law enforcement. Campbell proposes musing metrics developed for the senior management team as well as providing a methodology on how to determine a particular metrics application.

Institute For Security And Open Methodologies (ISECOM) Security Metrics -- Attack Surface Metrics.

The ISECOM provides information regarding the rav and its application as a metric in security protection. The attack surface metric aspect is the focus of the metrics developed and is the specific activity of the rav.

Essay
Security Issues of Online Communities
Pages: 60 Words: 15576

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community.
For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are: (1) a minimum level of interactivity; (2) a variety of communicators; (3) a minimum level of sustained membership; and (4) a virtual common-public-space where a significant portion of interactive computer mediated groups occur (Weinreich, 1997). The notion of interactivity will be shown to be central to virtual settlements. Further, it will be shown that virtual settlements can be defined as a cyber-place that is symbolically delineated by topic of interest and within which a significant proportion of interrelated interactive computer…...

mla

Bibliography

Al-Saggaf, Y. & Williamson, K. Online Communities in Saudi Arabia: Evaluating the Impact on Culture Through Online Semi-Structured Interviews. Volume 5,

No. 3, Art. 24 - September 2004

AnchorDesk Staff. (2000). Sign of Trouble: The Problem with E-Signatures.

Retrieved April 9, 2005, from ZDNet AnchorDesk Web site: zdnet.com.com/AnchorDesk/4630-6033_4204767.html?tag=printhttp://reivews-

Essay
Security Sector Reform
Pages: 5 Words: 2212

Security Sector eform
Overview of the relevant arguments regarding Security Sector reform

The objective of security sector reform has to take care of the threats to the security of the state and the safety of its citizens. These arise often from the situation within the state and military responses may not be suitable. This leads on to an analysis of the government. The second article talks in a wider, more theoretical and less action oriented tone. It says that "existing constitutional frameworks have been used to maintain status quo than promote change." This much is certainly true and it is true not only of the countries with a security problem, but also of even United States wherein recently a justice of the Supreme Court was appointed, though she had no experience of being a judge, but she was a friend of the Chief Executive of the country. There are and will always…...

mla

References

Anderson, Major Will. Wiring up Whitehall: Ensuring Effective Cross -- Departmental

Activity. Journal of Security Sector Management. Volume 3 Number 3 -- June 2005. Retrieved from CFTOKEN=57506392 Accessed 6 October, 2005http://www.jofssm.org/issues/jofssm_0303_AndersonW_Wiring_up_whitehall_2005.doc?CFID=939029&

Ball, Nicole. Enhancing Security Sector Governance: A Conceptual Framework for UNDP. 9

October, 2002.   Accessed 6 October, 2005http://www.undp.org/bcpr/jssr/4_resources/documents/UNDP_Ball_2002_SSR%20Concept%20Paper.pdf 

Essay
Security Failures and Preventive Measures Summary of
Pages: 3 Words: 1054

Security Failures and Preventive Measures
Summary of the Case

The Sequential Label and Supply company is a manufacturer and supplier of labels as well as distributor of other stationary items used along with labels. This company is shown to be growing fast and is becoming highly dependent on IT systems to maintain their high end inventory as well as the functioning of their department.

The case started with the inception of a troubled employee who called up the helpdesk agent to resolve the issue he is facing. Likewise, other employees start calling in to launch similar complaints. Later, the technical support help desk employee, while checking her daily emails, accidentally opened an untrusted source file sent from a known work colleague. This led to a number of immediate problems in her network computer which led to her being not able to access the information over the network and the call management software that…...

mla

References

Baker, W. (2007). Is information security under control?: Investigating quality in information security management, Security & Privacy, retrieved October 14, 2011 from  http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4085592 

Chapin, D. (2005). How can security be measured, information systems control journal, retrieved October 14, 2011 from http://naijaskill.com/cisa2006/articles/v2-05p43-47.pdf

McAdams, A. (2004). Security and risk management: a fundamental business issue: all organizations must focus on the management issues of security, including organizational structures, & #8230;, Information Management Journal, retrieved October 14, 2011 from http://www.freepatentsonline.com/article/Information-Management-Journal/119570070.html

Essay
Security Assessment Is Done to
Pages: 3 Words: 1108

This leaves those clients that are inside unsupervised while the guard is outside. There is also a lack of signage inside displaying rules and regulations along with directions. This propagates a lot of unnecessary questions being asked of the surety officer on duty. In order to alleviate these issues it would be essential to place distinct parking signage outside in order to help facilitate clients parking in the correct spaces. It is also necessary to place directional signage within the facility along with general rules and policies. All of these signs together would cost approximately $1,000 to install.
The last security issue that needs to be addressed is that of the security information processes that is in place. As each client arrives at the facility, their license plate numbers are recorded and they are then assigned a number. They are seen by the appropriate medical personnel based upon the order…...

mla

References

Conducting a Security Assessment. (2009). Retrieved May 25, 2009, from Processor Web site:

 http://www.processor.com/editorial/article.asp?article=articles%2Fp2808%2F30p08%2F30p08.asp 

How to Conduct an Operations Security Assessment. (2009). Retrieved May 25, 2009, from eHow.com Web site: http://www.ehow.com/how_2060197_conduct-operations-security-assessment.html

Methadone Maintenance Treatment. (2009). Retrieved May 25, 2009, from Drug Policy Alliance

Essay
Security Components of a Retail
Pages: 5 Words: 1733


eferences

Best practices in encryption. (2008). nuBridges.com. [Online]. Available: http://www.nubridges.com/keymanagement1/.

Bryan, H. (2001). eply to David Scott and C. Scott Shafer, recreational specialization: AC critical look at the construct. Journal of Leisure esearch, 33(3), 344.

By the numbers. (2008). Bass Pro-Shops. [Online]. Available: http://vocuspr.vocus.com/vocuspr30/Newsroom/ViewAttachment.aspx?SiteName=basspro&Entity=PAsset&Atta chmentType=F&EntityID=112488&AttachmentID=7f9f9eb0-2281-4066-b382- c00619b835c8.

Company overview. (2008). Bass Pro-Shops. [Online]. Available: http://www.onlinepressroom.net/basspro/.

Gerstein, D.M. (2005). Securing America's future: National strategy in the information age. Westport, CT: Praeger Security International.

Hepner, . (2001, July 6). A surge in growth for county. The Washington Times, 8.

Michman, .D. & Greco, a.J. (1995). etailing triumphs and blunders: Victims of competition in the new age of marketing management. Westport, CT: Quorum Books.

Mueller, G. (1998, December 2). it's easy to find the right gift - Just read on. The Washington Times, 5.

Privacy and security statement. (2008). Bass Pro-Shops. [Online]. Available: http://www.basspro.com/webapp/wcs/stores/servlet/PageDisplayView?langId=-1&storeId=10151 & cataloged=x&section=MyAccount&pagename=PrivacyPolicySummaryDisplay.

Schlosser, E. (1998). The bomb squad: A visit with the members of a police unit whose work load…...

mla

References

Best practices in encryption. (2008). nuBridges.com. [Online]. Available: http://www.nubridges.com/keymanagement1/.

Bryan, H. (2001). Reply to David Scott and C. Scott Shafer, recreational specialization: AC critical look at the construct. Journal of Leisure Research, 33(3), 344.

By the numbers. (2008). Bass Pro-Shops. [Online]. Available:   chmentType=F&EntityID=112488&AttachmentID=7f9f9eb0-2281-4066-b382- c00619b835c8.http://vocuspr.vocus.com/vocuspr30/Newsroom/ViewAttachment.aspx?SiteName=basspro&Entity=PRAsset&Atta 

Company overview. (2008). Bass Pro-Shops. [Online]. Available:  http://www.onlinepressroom.net/basspro/ .

Essay
Security of Health Care Records
Pages: 2 Words: 620

" (Harman, Flite, and ond, 2012) the key to the preservation of confidentiality is "making sure that only authorized individuals have access to that information. The process of controlling access -- limiting who can see what -- begins with authorizing users." (Harman, Flite, and ond, 2012) Employers are held accountable under the HIPAA Privacy and Security Rules for their employee's actions. The federal agency that holds responsibility for the development of information security guidelines is the National Institute of Standards and Technology (NIST). NIST further defines information security as "the preservation of data confidentiality, integrity, availability" stated to be commonly referred to as "the CIA triad." (Harman, Flite, and ond, 2012)
III. Risk Reduction Strategies

Strategies for addressing barriers and overcoming these barriers are inclusive of keeping clear communication at all organizational levels throughout the process and acknowledging the impact of the organization's culture as well as capitalizing on all the organizational…...

mla

Bibliography

Harman, LB, Flite, CA, and Bond, K. (2012) Electronic Health Records: Privacy, Confidentiality, and Security. State of the Art and Science. Virtual Mentor. Sept. 2012, Vol. 14 No. 9. Retrieved from: http://virtualmentor.ama-assn.org/2012/09/stas1-1209.html

Kopala, B. And Mitchell, ME (2011) Use of Digital health Records Raises Ethical Concerns. JONA's Healthcare Law, Ethics, and Regulation. Jul/Sep 2011. Lippincott's Nursing Center. Retrieved from:   P85 P86 P87http://www.nursingcenter.com/lnc/cearticle?tid=1238212#P77 

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now