Historical cases of terrorism

Terrorism is deeper rooted in history around the world. Based on what you have learned from Chapter 6 of our reading material this week, provide an assessment of three historical cases of terrorism. Be sure to provide the timeframe in history of each of the historical cases that you assess.
Three cases chose:

  1. Christian Crusades
  2. The Order of Assassins
  3. Modern Arab Nationalism and the Rise of Islamist Extremism
    Task 1: Create a new discussion post and reply with your answers to the Week 3 Critical Thinking Exercise questions. Your response to the exercise questions should be a minimum of 5 sentences.

Historical cases of terrorism

Terrorism is deeper rooted in history around the world. Based on what you have learned from Chapter 6 of our reading material this week, provide an assessment of three historical cases of terrorism. Be sure to provide the timeframe in history of each of the historical cases that you assess.
Three cases chose:

  1. Christian Crusades
  2. The Order of Assassins
  3. Modern Arab Nationalism and the Rise of Islamist Extremism
    Task 1: Create a new discussion post and reply with your answers to the Week 3 Critical Thinking Exercise questions. Your response to the exercise questions should be a minimum of 5 sentences.

Department of Homeland Security

create a presentation with 6-8 content slides that summarize the key attributes of your agency research during the course, plus make the additional slides indicated in the Strayer Writing Standards (SWS) PowerPoint/SlideShow Checklist.

The Strayer University Library provides an SWS Sample Slideshow and SWS Slideshow Template. Title each slide to agree with the content of the slide, and make sure your slides follow the design guidelines in the Strayer Writing Standards.

Your presentation should include the following:

Introduction: Provide detailed background information about the agency, its mission, and its goals.
Current Events: Describe three recent newsworthy events and their effect on agency public perceptions.
Leadership Influences: Assess the organizational leadership, including the impact on organizational success or failure. Assessment should be focused and detailed.
Human Resources Processes: Describe plans for hiring and retaining a diversified and inclusive workforce, with appropriate explanation.
Budget Request and Recommendations: Recommend three ways to improve the budget for the next fiscal year.
Conclusion (Looking Ahead): Recommend three ways to improve agency effectiveness. Recommendations made should be detailed and appropriate for this agency.

Data loss prevention

Data loss prevention has become prevalent in the technology world due to the rise of ransomware attacks. However, simply providing storage space to an
existing system is not enough to protect systems from the various threat actors and internal complexities an enterprise network faces.
Create a 3- to 5-minute video for cybersecurity students addressing the following:
Describe the similarities and differences between the file system structure of a Windows operating system and a Linux operating system.
Explain why you would prefer one system over the other from a business perspective.
Compare at least two storage solutions in an enterprise network.
From a Christian perspective, identify the ethical considerations of utilizing storage devices in an information technology system when cost considerations are prevalent. Explain the role ethics would play in your decision-making proces

 

 

Balancing the need for security, versus the protection of civil liberties.

 

 

 

 

 

 

The post-9/11 environment has introduced a significant debate about balancing the need for security, versus the protection of civil liberties. In the age of social media and big data, it is relatively easy for public and private organizations to obtain individual profiles from social media and from other electronic databases that are online. Additionally, the need to ensure security has given rise to a culture of security. This has sparked concerns on governmental encroachment on an individual’s right to privacy. The USA FREEDOM Act, which replaced the PATRIOT Act, gives the United States broad powers to encroach on the civil liberties of Americans.

Address the following:

Discuss the phrase, “You can never gain 100% security, but you can lose 100% of your liberty.”
What is the likelihood of the creation of a dystopian society, in the name of security, through acquiescence by the public?
Discuss some of the civil rights challenges that are posed by social media, online databases, and the use of big data tech companies versus the need to ensure individual privacy.

 

 

Border and Coastal Security

 

The goal of this paper is for you to write your opinion on Border and Coastal Security without using first or second person. This paper is your opinion, and as such, it is your job to express your thoughts in a manner that is comprehensible and clear for any and all readers. Some basic questions to think about in this paper are: How did the material on Border and Coastal Security affect you?, Did your learning about the material on Border and Coastal Security change your mind about something? If so, how. Has the material on Border and Coastal Security left you with any questions? If so, what are they. Were there any unaddressed critical issues not covered by the material on Border and Coastal Security? How will the material on Border and Coastal Security impact your future in Homeland Security? There are three components to a reflection paper. Introduction -What are you reflecting upon? Body – examines the ideas and experiences you have had in context to your topic. Be sure that each new body paragraph starts with a topic sentence. Your paper must be at least 2 pages long and no more than 3 pages so clear and concise writing is critical. Conclusion – summarize what you have learned from the material. Tell the reader how this knowledge affected your overall understanding of the subject. Describe the feeling and overall lesson that you had from the material on Border and Coastal Security. Times New Roman, 12 point, double spaced, no direct quotes, all paraphrases require a reference.