Assignment PS 1 : Solution Essays

This is assignment is a two part questions. Each question needs to be addressed in 400-500 words.

PART1

Internal Threats and Countermeasures

Cyber-attacks  offer the ability to obliterate and interrupt an organization’s  communication channels, security data center and facility remotely.  Indeed, private and public organizations are often interlinked; hence,  data breaches effect damaging impact on the organization’s confidence in  protecting the economy and innocent citizens.   Today, there is a  crisis about organizations’ inability to resolve the age-old problem of  how to control the abuse of trust and confidence given to authorized  officials  to freely logon onto the organization’s system, Many such  officials , turn around to betray the organization  by committing  cybercrimes.

Vulnerability  stems from interactions and communications among several system  components and categorized as deficiency, weakness and security cavity  on network data center. 

To  what extent do internal threats constitute a key factor against any  organization’s ability to battle insider threats caused by people who  abuse assigned privilege?

  1. What is the most effective mechanism for organizations to combat internal threats?
  2. Why  should disgruntled employees must be trained on the danger of throwing  wastepaper and electronic media in a bin within and outside the  facility?

Internal  threats and countermeasures are isolated occurrences where most  activities involve direct connection to the Internet for global  interaction, digital communication and transmission. The preeminent  method to mitigate internal threats is to equip users with ready-to-act  traditional approach. As a result of the sophistication of our  modern-day culprits, over-all reliance on employees, increasing credo  that authorized users are predictable agent in the fight against  internal threats. ​Internal threat operators often use psychological  moralities and procedures to navigate or circumvent security  restrictions through persuasion and psychosomatic principles. Criminals  use crafty manipulation techniques to sway users into divulging  confidential information, such as, usernames, passwords, bank  information, house and office alarm codes to take control over  organizations’ security centers.  Historic channel to internal threats  and countermeasures are categorized into employee’s theft, pilferage,  embezzlement, fraud, stealing, peculation and defalcation. Most  organizations often ignore to establish and adopt on-board ecological  waste management action plans to deal with discarded materials, shredded  left-over documents, magnetic media and placing fragments in isolated  location as countermeasure process.

Today,  there is a crisis about organizations’ inability to resolve the age-old  problem of how to control the abuse of trust and confidence given to  authorized officials  to freely logon onto the organization’s system,  Many such officials , turn around to betray the organization  by  committing cybercrimes. Vulnerability  stems from interactions and communications among several system  components and categorized as deficiency, weakness and security cavity  on network data center. 

  1. To what  extent do internal threats constitute a key factor against any  organization’s ability to battle insider threats caused by people who  abuse assigned privilege?
  2. What is the most effective mechanism for organizations to combat internal threats?
  3. Why  should disgruntled employees must be trained on the danger of throwing  wastepaper and electronic media in a bin within and outside the  facility? 

PART2

Objective

The  culture of external threats and countermeasures (ETC) is an overriding  factor for public and private organizations in our generation. The ETC  consist of a set of threats such as matchless combination of  terrorizations and countermeasures. Organizations are strongly urged to  establish comprehensive mechanism to mitigate external threat and  countermeasures. However, failure to do so can lead to the creation of  adverse effects on organization’s data and assets.  In all dimensions,  external threats can exist without risk, but risk cannot exist without a  matching threat and conforming action. The ETC often derives its  strength from these four demographic factors; deterrence, detection,  denial and perimeter security.

Deterrence 

Deterrence is designated to dissuade potential violators from launching threats and criminal acts against organizations. Aura Security in  physical security is often heightened by security professional measures  such as signs placed along perimeters near openings of the facility.  Aura security strives to create strong psychological deterrent warning  offenders and keeping them away from the facility. Most deterrence has  very limited or no physical security mechanism. 

Detection

This  is an apparatus used in most facilities to detect perpetrators. They  include devices such as closed-circuit television (CCTV), intrusion  sensors, duress alarms, weapons screening imaging machines and  protective dogs.  Traditionally, these devices are installed to identify  violators upon arrival in the facility.

Denial

Deny  is crucial component of physical security items codenamed target  hardening: They include steel doors, safe deposits and frequent banks  deposits of available cash which often help to deny perpetrators access  to the facility.    

Perimeter Security

Naturally,  a building access points such as outer boundary and boundary line is  the first line of defense against perpetrators of any property. In  addition, Perimeter Security is entrenched with a psychological impact  on offenders. Two components of perimeter Security include natural and  human barriers. natural barriers are closely related to rivers, hills,  foliage, fences, and steel doors; while. human barriers include security  officers who are designated to scrutinize individuals entering and  leaving to the facility.   

Deterrence is designated to dissuade potential violators from launching threat and criminal acts against organizations. Aura Security in  physical security is often heightened by security professional measures  such as signs placed along perimeters near openings of the facility.  Aura security strives to create strong phycological deterrent warning  offenders and keeping them away from the facility. Deterrence has very  limited or no physical security mechanism and Detection apparatus  is used in most facilities to detect perpetrators. Such devices include  devices closed circuit television (CCTV), intrusion sensors, duress  alarms, weapons screening devices and protective dogs.  Traditionally,  these devices are installed to identify violators upon arrival in the  facility.

  • The  university president is very concerned about external threats. What  countermeasures such as deterrence or detection must be implemented on  campus to enhance student, faculty and staff security?

APA Formatting and plagiarism report are must.

Place your order
(550 words)

Approximate price: $22

Homework help cost calculator

600 words
We'll send you the complete homework by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 customer support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • 4 hour deadline
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 300 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
× How can I help you?