This website uses cookies to ensure you have the best experience. Learn more

Security Essay

287 words - 2 pages

Personal Responsibility Essay
Personal Responsibility

Albertis McCray

Gen Ed 200


John Bachofer III

Personal Responsibility Essay

Personal Responsibility is taking accountability for all your thoughts, feelings and actions. Understanding personal responsibility is taught from elementary school all the way through college. As an adult going back to school, understanding personal responsibility is the key to successfully obtain your ...view middle of the document...

Adult students attending college tend to have a better understanding of personal responsibility. For example, (Allen, 1993), ‘Adult students are focused on their careers, and they want assignments and that are career relevant.” They realize that study time is important while balancing many roles; they want to know what is expected of them. It is critical that they get feedback early in the term. Early feedback allows adult students to understanding the sacrifices that have to be made while attending college. Kutner (1992), “Develop a workable schedule that gives you personal time, and reserves times for you and your family.”

Sitting down with your family and developing a plan is extremely beneficial to everyone. Personally responsible students understand to achieve a balanced plan; it will require discipline, and patience. So how do we balance college and a family? Sit down and develop a timeline of your daily schedule for a week. This will help you develop a clear picture of where you are wasting time. When creating a plan however, you should ensure you allow time for yourself, your family, and school. Try to achieve balance with your plan, ensuring there is enough time to spend with your family.

Other Papers Like Security

Computer Security Essay

1909 words - 8 pages Computer Security Protecting Your Computer System Do’s and Don’ts Abstract This paper explores the computer security process of preventing and detecting unauthorized use of computers. I will also discuss: A. The prevention measures (do’s and don’ts) to help you stop unauthorized users (also known as “intruders”) from accessing any part of your computer system. B. Detections methods that help you to determine whether or not

Security Notes Essay

1168 words - 5 pages area or a region assignment, the next 2 digits a group and the last 4 a serial number….I will then have the coding for a social security number. Now they are just digits but it is how I interpret those digits’ in the context that are around them. * Information Security * So, information security is the protection of information, i.e. the protection of the contents of the information. But why do we need to protect it in an enterprise

Network Security

585 words - 3 pages Network Security Practices and Policies 3.1 Intro A. Regulation 1.To be a good reg, must be measurable by a metric 2. Security and privacy regs issued and quick pace to keep up with technology 3. Used to prevent misuse, mishandling, and misappropriation of sensitive info B. Private vs Gov -When private sector fails, then government is called in to regulate C. 4 areas

Security Report

598 words - 3 pages hackers are becoming more creative on the way they hack onto companies’ secured network. Hackers go through tremendous amounts of time in order to get to a secured network in order to get the information they are seeking or just to go through private information for their own personal gain. Secured networks are set up throughout organizations to minimize the possibility of a cyber attack from occurring along with other security measures to

Security Analysis

2397 words - 10 pages Security Analysis and Investment Management Unit-1 INVESTMENT * Investment means conversion of cash or money into a monetary assets or a claim on future money for a return. * Investment is the employment of funds on assets with the aim of earning income or capital appreciation. * Financial investment is the allocation of money to assets that are expected to yield some gain over a period of time. * In its broadest sense, on

Web Server Security And Database Server Security

2494 words - 10 pages Web Server Security and Database Server Security Databases involve distributed updates and queries, while supporting confidentiality, integrity, availability, and privacy (Goodrich, & Tamassia, 2011). This entails robust access control as well as tools for detection and recovering from errors (2011). When database information is masked, there is still a possibility of an attacker garnishing sensitive data from additional database

Preventing Security Breaches

354 words - 2 pages Preventing Security Breaches BIS 221 November 18, 2014  My group discussed what it is that businesses can do to help prevent security breaches inside their companies. We consulted with an article at “Business News Daily” and decided that the two most important things that a company can do to prevent these security breaches is to do proper training and to have physical security measures present. Throughout my history of working with

Information Security For Managers

2401 words - 10 pages Assignment 2 Information Security for Managers Submitted By: Student Number: Submitted Date: January 22, 2009 Table of Contents 1. Information Security Policy (Word Count = approx. 1000) 3 1.1 Security: 3 1.2 Policy: 3 1.3 Information Security Policy and its importance: 4 1.4 Policies, Procedures, Practices, Guidelines 5 1.5 Example of good policy statement 6 1.6 Possible structure of information

Homeland Security Research Design

2565 words - 11 pages Homeland Security Research Design Chris Hix HSM421: Research & Analysis in Homeland Security Professor:  Kenneth Jenkins March 7, 2016 Homeland Security Research Design The United States has invested heavily in maintaining cyber security and border security in the homeland. Federal, State, and Local level initiatives have been implemented to escalate enforcement undertakings in communities across the country. These efforts are

Introduction To Network Security

428 words - 2 pages security 5. Confidentiality: Information should only be accessible to its intended recipients. Integrity: Information should arrive the same as it was sent. Availability: Information should be available to those authorized to use it. 6. The CIA triangle is still used because it addresses the major concerns with the vulnerability of information systems 7. Availability: Authorized users can access the information Accuracy: free from

System Security Plan

1354 words - 6 pages Name: Professor’s name: Course: Date: Introduction System security plan document describe all the possible system security control measures, their application status and how they are implemented. It can therefore facilitates the implementation of security processes by guiding the individual involved in this process

Related Essays

Security Management Essay

258 words - 2 pages Security and Management week 1 conference 1 Since 9/11 security has moved from the periphery to the center, with the Government, Private Organizations, and individual citizens placing more emphasis on the need for Security. Security services today are sophisticated and complex it involves the use of criminal and civil law, investigations, policy formulation, psychology, and sociology just to name a few. The most important purpose of

Security Threats Essay

2408 words - 10 pages Security Threats & Vulnerabilities As information technology grows also does the need to protect technology or information on the system. Before we can protect the information on a system we need to know what to protect and how to protect them. First must decide what a threat to our system is. A Security threat is anything or anyone that comprise data integrity, confidentiality, and availability of a system. Another security issue for

Security Threats Essay

786 words - 4 pages PC Security Threats DeVry University Professor Andino SEC 280: Principles Info Sys Security Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. The Internet continues to grow exponentially which I believe makes us less secure since there is more to secure. Information security is concerned with three main areas

Information Security Essay

255 words - 2 pages is intellectual property (IP)? Is it afforded the same protection in every country of the world? What laws currently protect IP in the United States and Europe? 12. How does the Sarbanes-Oxley Act of 2002 affect information security managers? 13. What is due care? Why should an organization make sure to exercise due care in its usual course of operations? 14. How is due diligence different from due care? Why are both important? 15. What is a