Reviewing Research and Making Connections

Reviewing Research and Making Connections

21 August 0

Reviewing Research and Making Connections Sociology 100 Ask The topic of this research was regarding personal space around the world. Researchers looked at 9,000 people in 42 countries to understand how people are effected by personal space. In gathering this information people were combined into “contact cultures” and ‘non –contact cultures”. Between these two groups […]

Read More
Using A Sociological Approach

Using A Sociological Approach

21 August 0

Using A Sociological Approach SOC 100: Intro to Sociology Learn In the article a study was conducted by students at North Carolina State University to see learn more about food deserts and people’s shopping habits. They wanted to address the rising concerns about food deserts and how the people who live there feel like they […]

Read More
Social Structure and Social Interaction

Social Structure and Social Interaction

21 August 0

Social Structure and Social Interaction SOC 100: Intro to Sociology Status Set 1.) Father- Mastered 2.) Husband- Achieved 3.) Brother- Ascribed 4.) Son- Ascribed 5.) Veteran- Achieved Roles The status that is most important to me is Father. It’s special to me because I believe its roles are more important than any other statuses roles. […]

Read More
Reviewing Research and Making Connections

Reviewing Research and Making Connections

21 August 0

Reviewing Research and Making Connections SOC 100: Intro to Sociology ASK On Sep 27th 2017 there was an article posted on the Pew Research Center website. The article asks what percent of Americans think the U.S. government is monitoring their phone calls and emails. In the study it broke down who was asked and how […]

Read More
Case Study 1: The Critical Need for Information Security

Case Study 1: The Critical Need for Information Security

21 August 0

Case Study 1 The Critical Need for Information Security SEC 402 Cyber Security The Essential Body of Knowledge Case Study 1: The Critical Need for Information Security As cyber-crimes are becoming more and more prevalent data breaches are forcing individuals and organizations to redefine and revamp their personal and information security structure. Private and public […]

Read More
The Rookie Chief Information Security Officer

The Rookie Chief Information Security Officer

21 August 0

The Rookie Chief Information Security Officer SEC 402 Cyber Security The Essential Body of Knowledge Organization Chart As a matter of record, it is widely known that information security is critical to all organizations to protect their data and continue operating. Information security is defined “as the protection of information, the system, and hardware that […]

Read More
Implementing Network and Personnel Security Measures

Implementing Network and Personnel Security Measures

21 August 0

Implementing Network and Personnel Security Measures  SEC 402 Cyber Security The Essential Body of Knowledge EQUIPMENT LIST OF NETWORK SECURITY DEVICES Today’s technology demands that all types of business organizations and companies be established via a network system. Government, and all of its agencies along with the majority of business organizations all working under unique […]

Read More
Case Study 2: Developing the Forensics, Continuity, Incident Management, and Security Training Capacities for the Enterprise

Case Study 2: Developing the Forensics, Continuity, Incident Management, and Security Training Capacities for the Enterprise

21 August 0

Case Study 2 Developing the Forensics, Continuity, Incident Management, and Security Training Capacities for the Enterprise SEC 402 Cyber Security The Essential Body of Knowledge Case Study 2: Developing the Forensics, Continuity, Incident Management, and Security Training Capacities for the Enterprise Within this case study I will attempt to determine how defined roles of technology, […]

Read More
Term Paper: Security Administrator Handbook (Intelligence Security Street Inc)

Term Paper: Security Administrator Handbook (Intelligence Security Street Inc)

21 August 0

Term Paper: Security Administrator Handbook Company/Industry: Intelligence Security Street Inc SEC 315: Security Assessment and Solutions Strayer University Table of Contents: Section 1: Main Body Introduction………………………………………………………………………….3 Network Architecture and Security Considerations……………………………3-4 Wireless Security…………………………………………………………………….4 Remote Access Security……………………………………………………………4-5 Laptop and Removable Media Security……………………………………………5 Vulnerability and Penetration Testing……………………………………………5-6 Physical Security……………………………………………………………………..6 Guidelines for Reviewing and Changing Policies………………………………….7 Section 2: […]

Read More
SEC 315 Assignment 4: Recruit Requirements

SEC 315 Assignment 4: Recruit Requirements

21 August 0

Strayer University Assignment 4: Recruit Requirements SEC 315: Security Assessment and Solutions Abstract This paper will describe the requirements for recruiting law enforcement officers such as a local police officer and state troopers based on specifically in the state of Maryland. This paper will also discuss the dissimilarities with both local law enforcement and state […]

Read More