This is assignment is a two part questions. Each question needs to be addressed in 400-500 words.
PART1
Internal Threats and Countermeasures
Cyber-attacks offer the ability to obliterate and interrupt an organization’s communication channels, security data center and facility remotely. Indeed, private and public organizations are often interlinked; hence, data breaches effect damaging impact on the organization’s confidence in protecting the economy and innocent citizens. Today, there is a crisis about organizations’ inability to resolve the age-old problem of how to control the abuse of trust and confidence given to authorized officials to freely logon onto the organization’s system, Many such officials , turn around to betray the organization by committing cybercrimes.
Vulnerability stems from interactions and communications among several system components and categorized as deficiency, weakness and security cavity on network data center.
To what extent do internal threats constitute a key factor against any organization’s ability to battle insider threats caused by people who abuse assigned privilege?
What is the most effective mechanism for organizations to combat internal threats?
Why should disgruntled employees must be trained on the danger of throwing wastepaper and electronic media in a bin within and outside the facility?
Internal threats and countermeasures are isolated occurrences where most activities involve direct connection to the Internet for global interaction, digital communication and transmission. The preeminent method to mitigate internal threats is to equip users with ready-to-act traditional approach. As a result of the sophistication of our modern-day culprits, over-all reliance on employees, increasing credo that authorized users are predictable agent in the fight against internal threats. Internal threat operators often use psychological moralities and procedures to navigate or circumvent security restrictions through persuasion and psychosomatic principles. Criminals use crafty manipulation techniques to sway users into divulging confidential information, such as, usernames, passwords, bank information, house and office alarm codes to take control over organizations’ security centers. Historic channel to internal threats and countermeasures are categorized into employee’s theft, pilferage, embezzlement, fraud, stealing, peculation and defalcation. Most organizations often ignore to establish and adopt on-board ecological waste management action plans to deal with discarded materials, shredded left-over documents, magnetic media and placing fragments in isolated location as countermeasure process.
Today, there is a crisis about organizations’ inability to resolve the age-old problem of how to control the abuse of trust and confidence given to authorized officials to freely logon onto the organization’s system, Many such officials , turn around to betray.
ICT role in 21st century education and it's challenges.
This is assignment is a two part questions. Each question needs to b.docx
1. This is assignment is a two part questions. Each question needs
to be addressed in 400-500 words.
PART1
Internal Threats and Countermeasures
Cyber-attacks offer the ability to obliterate and interrupt an
organization’s communication channels, security data center
and facility remotely. Indeed, private and public organizations
are often interlinked; hence, data breaches effect damaging
impact on the organization’s confidence in protecting the
economy and innocent citizens. Today, there is a crisis about
organizations’ inability to resolve the age-old problem of how
to control the abuse of trust and confidence given to authorized
officials to freely logon onto the organization’s system, Many
such officials , turn around to betray the organization by
committing cybercrimes.
Vulnerability stems from interactions and communications
among several system components and categorized as
deficiency, weakness and security cavity on network data
center.
To what extent do internal threats constitute a key factor
against any organization’s ability to battle insider threats
caused by people who abuse assigned privilege?
What is the most effective mechanism for organizations to
combat internal threats?
Why should disgruntled employees must be trained on the
danger of throwing wastepaper and electronic media in a bin
2. within and outside the facility?
Internal threats and countermeasures are isolated occurrences
where most activities involve direct connection to the Internet
for global interaction, digital communication and transmission.
The preeminent method to mitigate internal threats is to equip
users with ready-to-act traditional approach. As a result of the
sophistication of our modern-day culprits, over-all reliance on
employees, increasing credo that authorized users are
predictable agent in the fight against internal threats. Internal
threat operators often use psychological moralities and
procedures to navigate or circumvent security restrictions
through persuasion and psychosomatic principles. Criminals
use crafty manipulation techniques to sway users into divulging
confidential information, such as, usernames, passwords, bank
information, house and office alarm codes to take control over
organizations’ security centers. Historic channel to internal
threats and countermeasures are categorized into employee’s
theft, pilferage, embezzlement, fraud, stealing, peculation and
defalcation. Most organizations often ignore to establish and
adopt on-board ecological waste management action plans to
deal with discarded materials, shredded left-over documents,
magnetic media and placing fragments in isolated location as
countermeasure process.
Today, there is a crisis about organizations’ inability to resolve
the age-old problem of how to control the abuse of trust and
confidence given to authorized officials to freely logon onto
the organization’s system, Many such officials , turn around to
betray the organization by committing cybercrimes.
Vulnerability stems from interactions and communications
among several system components and categorized as
deficiency, weakness and security cavity on network data
center.
3. To what extent do internal threats constitute a key factor
against any organization’s ability to battle insider threats
caused by people who abuse assigned privilege?
What is the most effective mechanism for organizations to
combat internal threats?
Why should disgruntled employees must be trained on the
danger of throwing wastepaper and electronic media in a bin
within and outside the facility?
PART2
Objective
The culture of external threats and countermeasures (ETC) is
an overriding factor for public and private organizations in our
generation. The ETC consist of a set of threats such as
matchless combination of terrorizations and countermeasures.
Organizations are strongly urged to establish comprehensive
mechanism to mitigate external threat and countermeasures.
However, failure to do so can lead to the creation of adverse
effects on organization’s data and assets. In all dimensions,
external threats can exist without risk, but risk cannot exist
without a matching threat and conforming action. The ETC
often derives its strength from these four demographic factors;
deterrence, detection, denial and perimeter security
.
Deterrence
4. Deterrence is designated to dissuade potential violators from
launching threats and criminal acts against organizations.
Aura Security
in physical security is often heightened by security
professional measures such as signs placed along perimeters
near openings of the facility. Aura security strives to create
strong psychological deterrent warning offenders and keeping
them away from the facility. Most deterrence has very limited
or no physical security mechanism.
Detection
This is an apparatus used in most facilities to detect
perpetrators. They include devices such as closed-circuit
television (CCTV), intrusion sensors, duress alarms, weapons
screening imaging machines and protective dogs.
Traditionally, these devices are installed to identify violators
upon arrival in the facility.
Denial
Deny is crucial component of physical security items
codenamed target hardening: They include steel doors, safe
deposits and frequent banks deposits of available cash which
often help to deny perpetrators access to the facility.
Perimeter Security
Naturally, a building access points such as outer boundary and
boundary line is the first line of defense against perpetrators of
any property. In addition, Perimeter Security is entrenched with
a psychological impact on offenders. Two components of
perimeter Security include natural and human barriers. natural
barriers are closely related to rivers, hills, foliage, fences, and
steel doors; while. human barriers include security officers who
5. are designated to scrutinize individuals entering and leaving to
the facility.
Deterrence
is designated to dissuade potential violators from launching
threat and criminal acts against organizations.
Aura Security
in physical security is often heightened by security
professional measures such as signs placed along perimeters
near openings of the facility. Aura security strives to create
strong phycological deterrent warning offenders and keeping
them away from the facility. Deterrence has very limited or no
physical security mechanism and
Detection a
pparatus is used in most facilities to detect perpetrators. Such
devices include devices closed circuit television (CCTV),
intrusion sensors, duress alarms, weapons screening devices
and protective dogs. Traditionally, these devices are installed
to identify violators upon arrival in the facility.
The university president is very concerned about external
threats. What countermeasures such as deterrence or detection
must be implemented on campus to enhance student, faculty
and staff security?
APA Formatting and plagiarism report are must.