This study set to establish the role of Youth participation to the good governance in Guriel District. It was guided by three specific objectives that included: the significance of
Youth involvement to the good governance. the outcome of youth’s contribution to the
good governance and, the importance of Youth’s participation to the good governance
in Guri-el district.
Data analysis using SPSS’s descriptive statistics showing that result of role of youth
participation to the good governance
Specific Objective One
Based on the findings in objective one presented that To investigate the significance of
youth’s involvement on good governance scored 53% of the respondents were strongly
agree, 22% of respondents were agree, 13% of the respondents were neutral, 6% of
respondents were strongly disagree and 3% of the respondents were disagree hence, this
figure shows that the majority of the respondents were Strongly agree.
Specific Objective Two
Based on the findings in objective two presented to discover the outcome of youth’s
contribution on good governance scored Average 51% of the respondents were strongly
agree, 25% of respondents were agree, 13% of the respondents were neutral, 6% of
respondents were strongly disagree and 3% of the respondents were disagree hence, this
figure shows that the majority of the respondents were Strongly agree
2. The history of information security begins with
computer security. The need for computer security—that
is, the need to secure physical locations, hardware, and
software from threats— during World War II when the
first mainframes, developed to aid computations for
communication code breaking,
The History of Information Security:
3. Cont………
The 1960s During the Cold War, many more mainframes
were brought online to accomplish more complex and
sophisticated tasks. It became necessary to enable these
mainframes to communicate via a less cumbersome
process than mailing magnetic tapes between computer
centers. In response to this need, the Department of
Defense’s Advanced Research Project Agency (ARPA)
began examining the feasibility of a redundant,
networked communications system to support the
military’s exchange of information.
4. Information systems security, more commonly referred
to as INFOSEC, refers to the processes and
methodologies involved with keeping information
confidential, available, and assuring its integrity.
There are four types of information security system you
should consider or improve upon:
Network Security
Cloud Security
Application Security
Internet of Things Security
Information security system.
6. Confidentiality:
When protecting information, we want to be able to
restrict access to those who are allowed to see it;
everyone else should be disallowed from learning
anything about its contents. This is the essence of
confidentiality.
Integrity:
Integrity involves maintaining the consistency, accuracy
and trustworthiness of data over its entire lifecycle.
7. Information availability is the third part of the CIA
triad. Availability means that information can be
accessed and modified by anyone authorized to do so in
an appropriate timeframe. Depending on the type of
information, appropriate timeframe can mean different
things.
Availability
8. Scope of Information Security Management:
Information security is a business problem in the sense
that the entire organization must frame and solve
security problems based on its own strategic drivers, not
solely on technical controls aimed to mitigate one type
of attack
What Is a Threat?
Threats to information systems come in many flavors,
some with malicious intent, others with supernatural
powers or unexpected surprises.
Important of Information Security
system
9. Threats are exploited with a variety of attacks, some
technical, others not so much. Organizations that focus
on the technical attacks and neglect items such as
policies and procedures
Impact of Security Breaches:
The impact of security breaches on most organizations
can be devastating; however, it’s not just dollars and
cents that are at stake.
Common Attacks:
10. Maintain Information Security in Your Office:
Examples include company phone books,
organization charts, policy manuals, calendars,
company letterhead, etc.
Maintain Information Security When Transmitting
Information: Examples of laws that may affect your
organization include the Federal Information Security
Management Act (FISMA); the European Union
Directive on Data Protection; the Health Insurance
Portability and Accountability Act (HIPAA);
Guidelines to Maintain Information
Security:
11. Software: The software component of the IS comprises
applications, operating systems, and assorted command
utilities.
Hardware :
Hardware is the physical technology that houses and
executes the software, stores and transports the data, and
provides interfaces for the entry and removal of
information from the system.
Data:
Data stored, processed, and transmitted by a computer
system must be protected. Data is often the most valuable
asset possessed by an organization and it is the main
target of intentional attacks.
Components of an Information
Security System:
12. Procedures:
Another frequently overlooked component of an IS is
procedures. Procedures are written instructions for
accomplishing a specific task.
Networks:
The IS component that created much of the need for
increased computer and information security is
networking.
Cont.………