SlideShare a Scribd company logo
1 of 6
This is assignment is a two part questions. Each question needs
to be addressed in 400-500 words.
PART1
Internal Threats and Countermeasures
Cyber-attacks offer the ability to obliterate and interrupt an
organization’s communication channels, security data center
and facility remotely. Indeed, private and public organizations
are often interlinked; hence, data breaches effect damaging
impact on the organization’s confidence in protecting the
economy and innocent citizens. Today, there is a crisis about
organizations’ inability to resolve the age-old problem of how
to control the abuse of trust and confidence given to authorized
officials to freely logon onto the organization’s system, Many
such officials , turn around to betray the organization by
committing cybercrimes.
Vulnerability stems from interactions and communications
among several system components and categorized as
deficiency, weakness and security cavity on network data
center.
To what extent do internal threats constitute a key factor
against any organization’s ability to battle insider threats
caused by people who abuse assigned privilege?
What is the most effective mechanism for organizations to
combat internal threats?
Why should disgruntled employees must be trained on the
danger of throwing wastepaper and electronic media in a bin
within and outside the facility?
Internal threats and countermeasures are isolated occurrences
where most activities involve direct connection to the Internet
for global interaction, digital communication and transmission.
The preeminent method to mitigate internal threats is to equip
users with ready-to-act traditional approach. As a result of the
sophistication of our modern-day culprits, over-all reliance on
employees, increasing credo that authorized users are
predictable agent in the fight against internal threats. Internal
threat operators often use psychological moralities and
procedures to navigate or circumvent security restrictions
through persuasion and psychosomatic principles. Criminals
use crafty manipulation techniques to sway users into divulging
confidential information, such as, usernames, passwords, bank
information, house and office alarm codes to take control over
organizations’ security centers. Historic channel to internal
threats and countermeasures are categorized into employee’s
theft, pilferage, embezzlement, fraud, stealing, peculation and
defalcation. Most organizations often ignore to establish and
adopt on-board ecological waste management action plans to
deal with discarded materials, shredded left-over documents,
magnetic media and placing fragments in isolated location as
countermeasure process.
Today, there is a crisis about organizations’ inability to resolve
the age-old problem of how to control the abuse of trust and
confidence given to authorized officials to freely logon onto
the organization’s system, Many such officials , turn around to
betray the organization by committing cybercrimes.
Vulnerability stems from interactions and communications
among several system components and categorized as
deficiency, weakness and security cavity on network data
center.
To what extent do internal threats constitute a key factor
against any organization’s ability to battle insider threats
caused by people who abuse assigned privilege?
What is the most effective mechanism for organizations to
combat internal threats?
Why should disgruntled employees must be trained on the
danger of throwing wastepaper and electronic media in a bin
within and outside the facility?
PART2
Objective
The culture of external threats and countermeasures (ETC) is
an overriding factor for public and private organizations in our
generation. The ETC consist of a set of threats such as
matchless combination of terrorizations and countermeasures.
Organizations are strongly urged to establish comprehensive
mechanism to mitigate external threat and countermeasures.
However, failure to do so can lead to the creation of adverse
effects on organization’s data and assets. In all dimensions,
external threats can exist without risk, but risk cannot exist
without a matching threat and conforming action. The ETC
often derives its strength from these four demographic factors;
deterrence, detection, denial and perimeter security
.
Deterrence
Deterrence is designated to dissuade potential violators from
launching threats and criminal acts against organizations.
Aura Security
in physical security is often heightened by security
professional measures such as signs placed along perimeters
near openings of the facility. Aura security strives to create
strong psychological deterrent warning offenders and keeping
them away from the facility. Most deterrence has very limited
or no physical security mechanism.
Detection
This is an apparatus used in most facilities to detect
perpetrators. They include devices such as closed-circuit
television (CCTV), intrusion sensors, duress alarms, weapons
screening imaging machines and protective dogs.
Traditionally, these devices are installed to identify violators
upon arrival in the facility.
Denial
Deny is crucial component of physical security items
codenamed target hardening: They include steel doors, safe
deposits and frequent banks deposits of available cash which
often help to deny perpetrators access to the facility.
Perimeter Security
Naturally, a building access points such as outer boundary and
boundary line is the first line of defense against perpetrators of
any property. In addition, Perimeter Security is entrenched with
a psychological impact on offenders. Two components of
perimeter Security include natural and human barriers. natural
barriers are closely related to rivers, hills, foliage, fences, and
steel doors; while. human barriers include security officers who
are designated to scrutinize individuals entering and leaving to
the facility.
Deterrence
is designated to dissuade potential violators from launching
threat and criminal acts against organizations.
Aura Security
in physical security is often heightened by security
professional measures such as signs placed along perimeters
near openings of the facility. Aura security strives to create
strong phycological deterrent warning offenders and keeping
them away from the facility. Deterrence has very limited or no
physical security mechanism and
Detection a
pparatus is used in most facilities to detect perpetrators. Such
devices include devices closed circuit television (CCTV),
intrusion sensors, duress alarms, weapons screening devices
and protective dogs. Traditionally, these devices are installed
to identify violators upon arrival in the facility.
The university president is very concerned about external
threats. What countermeasures such as deterrence or detection
must be implemented on campus to enhance student, faculty
and staff security?
APA Formatting and plagiarism report are must.
This is assignment is a two part questions. Each question needs to b.docx

More Related Content

Similar to This is assignment is a two part questions. Each question needs to b.docx

Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
16 Chapter 1. Encompassing Effective CPTED Solution.docx
16   Chapter 1.  Encompassing Effective CPTED Solution.docx16   Chapter 1.  Encompassing Effective CPTED Solution.docx
16 Chapter 1. Encompassing Effective CPTED Solution.docx
herminaprocter
 
System Security SEC440 System Security.docx
System Security     SEC440 System Security.docxSystem Security     SEC440 System Security.docx
System Security SEC440 System Security.docx
mattinsonjanel
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
John Intindolo
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
Austin Eppstein
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Risk
phanleson
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
dr_edw777
 

Similar to This is assignment is a two part questions. Each question needs to b.docx (20)

An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Report on Human factor in the financial industry
Report on Human factor in the financial industryReport on Human factor in the financial industry
Report on Human factor in the financial industry
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 
16 Chapter 1. Encompassing Effective CPTED Solution.docx
16   Chapter 1.  Encompassing Effective CPTED Solution.docx16   Chapter 1.  Encompassing Effective CPTED Solution.docx
16 Chapter 1. Encompassing Effective CPTED Solution.docx
 
System Security SEC440 System Security.docx
System Security     SEC440 System Security.docxSystem Security     SEC440 System Security.docx
System Security SEC440 System Security.docx
 
EnterpriseImmuneSystem
EnterpriseImmuneSystemEnterpriseImmuneSystem
EnterpriseImmuneSystem
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
 
The Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your OrganizationThe Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your Organization
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Risk
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Zero Trust.pptx
Zero Trust.pptxZero Trust.pptx
Zero Trust.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Insider threats
Insider threatsInsider threats
Insider threats
 

More from kenth16

This is a special edition of an established title widely use.docx
This is a special edition of an established title widely use.docxThis is a special edition of an established title widely use.docx
This is a special edition of an established title widely use.docx
kenth16
 
This is a start to the scope baseline but you seem to have forgott.docx
This is a start to the scope baseline but you seem to have forgott.docxThis is a start to the scope baseline but you seem to have forgott.docx
This is a start to the scope baseline but you seem to have forgott.docx
kenth16
 
This is a sample list of movies that you may use for your paper. Y.docx
This is a sample list of movies that you may use for your paper. Y.docxThis is a sample list of movies that you may use for your paper. Y.docx
This is a sample list of movies that you may use for your paper. Y.docx
kenth16
 
This is Conflict and Negotiations”, chapter 10 from the book .docx
This is Conflict and Negotiations”, chapter 10 from the book .docxThis is Conflict and Negotiations”, chapter 10 from the book .docx
This is Conflict and Negotiations”, chapter 10 from the book .docx
kenth16
 
this is Consumer Buyer Behavior Part 2. Our learning objectives to.docx
this is Consumer Buyer Behavior Part 2. Our learning objectives to.docxthis is Consumer Buyer Behavior Part 2. Our learning objectives to.docx
this is Consumer Buyer Behavior Part 2. Our learning objectives to.docx
kenth16
 
this is due in 12 hours..... must have done in 12 hours..... Ple.docx
this is due in 12 hours..... must have done in 12 hours..... Ple.docxthis is due in 12 hours..... must have done in 12 hours..... Ple.docx
this is due in 12 hours..... must have done in 12 hours..... Ple.docx
kenth16
 

More from kenth16 (20)

This is a special edition of an established title widely use.docx
This is a special edition of an established title widely use.docxThis is a special edition of an established title widely use.docx
This is a special edition of an established title widely use.docx
 
This is a statistics essayThe different sections that should be .docx
This is a statistics essayThe different sections that should be .docxThis is a statistics essayThe different sections that should be .docx
This is a statistics essayThe different sections that should be .docx
 
This is a start to the scope baseline but you seem to have forgott.docx
This is a start to the scope baseline but you seem to have forgott.docxThis is a start to the scope baseline but you seem to have forgott.docx
This is a start to the scope baseline but you seem to have forgott.docx
 
This is a sociology course, the quiz is 20 questions all of them are.docx
This is a sociology course, the quiz is 20 questions all of them are.docxThis is a sociology course, the quiz is 20 questions all of them are.docx
This is a sociology course, the quiz is 20 questions all of them are.docx
 
This is a simple weekly assignment that I honestly have no motivatio.docx
This is a simple weekly assignment that I honestly have no motivatio.docxThis is a simple weekly assignment that I honestly have no motivatio.docx
This is a simple weekly assignment that I honestly have no motivatio.docx
 
This is a sermon that Jonathan Edwards gives at a revival in Con.docx
This is a sermon that Jonathan Edwards gives at a revival in Con.docxThis is a sermon that Jonathan Edwards gives at a revival in Con.docx
This is a sermon that Jonathan Edwards gives at a revival in Con.docx
 
This is a short 4-minute video introduction to DISC.   The fou.docx
This is a short 4-minute video introduction to DISC.   The fou.docxThis is a short 4-minute video introduction to DISC.   The fou.docx
This is a short 4-minute video introduction to DISC.   The fou.docx
 
This is a serious assignment that will be graded heavily. I need a s.docx
This is a serious assignment that will be graded heavily. I need a s.docxThis is a serious assignment that will be graded heavily. I need a s.docx
This is a serious assignment that will be graded heavily. I need a s.docx
 
This is a sample list of movies that you may use for your paper. Y.docx
This is a sample list of movies that you may use for your paper. Y.docxThis is a sample list of movies that you may use for your paper. Y.docx
This is a sample list of movies that you may use for your paper. Y.docx
 
This is a research paper based off the Book The Prince by Niccolo .docx
This is a research paper based off the Book The Prince by Niccolo .docxThis is a research paper based off the Book The Prince by Niccolo .docx
This is a research paper based off the Book The Prince by Niccolo .docx
 
This is a redo Assessment. I receive a 42 on Assessment 3.  Assessm.docx
This is a redo Assessment. I receive a 42 on Assessment 3.  Assessm.docxThis is a redo Assessment. I receive a 42 on Assessment 3.  Assessm.docx
This is a redo Assessment. I receive a 42 on Assessment 3.  Assessm.docx
 
This is a quiz...please answer questions thoroughly and define words.docx
This is a quiz...please answer questions thoroughly and define words.docxThis is a quiz...please answer questions thoroughly and define words.docx
This is a quiz...please answer questions thoroughly and define words.docx
 
This is due in 30 hoursPart I. Present your research pr.docx
This is due in 30 hoursPart I. Present your research pr.docxThis is due in 30 hoursPart I. Present your research pr.docx
This is due in 30 hoursPart I. Present your research pr.docx
 
This is Conflict and Negotiations”, chapter 10 from the book .docx
This is Conflict and Negotiations”, chapter 10 from the book .docxThis is Conflict and Negotiations”, chapter 10 from the book .docx
This is Conflict and Negotiations”, chapter 10 from the book .docx
 
this is due in 14 hours..... must have done in time.... no late .docx
this is due in 14 hours..... must have done in time.... no late .docxthis is due in 14 hours..... must have done in time.... no late .docx
this is due in 14 hours..... must have done in time.... no late .docx
 
This is due by 1159 p.m. EST, Friday, May 29, 2020 Select TWO.docx
This is due by 1159 p.m. EST, Friday, May 29, 2020 Select TWO.docxThis is due by 1159 p.m. EST, Friday, May 29, 2020 Select TWO.docx
This is due by 1159 p.m. EST, Friday, May 29, 2020 Select TWO.docx
 
this is Consumer Buyer Behavior Part 2. Our learning objectives to.docx
this is Consumer Buyer Behavior Part 2. Our learning objectives to.docxthis is Consumer Buyer Behavior Part 2. Our learning objectives to.docx
this is Consumer Buyer Behavior Part 2. Our learning objectives to.docx
 
this is due in 12 hours..... must have done in 12 hours..... Ple.docx
this is due in 12 hours..... must have done in 12 hours..... Ple.docxthis is due in 12 hours..... must have done in 12 hours..... Ple.docx
this is due in 12 hours..... must have done in 12 hours..... Ple.docx
 
This is aTestand not a research paper. Only assigned written m.docx
This is aTestand not a research paper. Only assigned written m.docxThis is aTestand not a research paper. Only assigned written m.docx
This is aTestand not a research paper. Only assigned written m.docx
 
This is Communication 101 assignment not English.After viewing.docx
This is Communication 101 assignment not English.After viewing.docxThis is Communication 101 assignment not English.After viewing.docx
This is Communication 101 assignment not English.After viewing.docx
 

Recently uploaded

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

This is assignment is a two part questions. Each question needs to b.docx

  • 1. This is assignment is a two part questions. Each question needs to be addressed in 400-500 words. PART1 Internal Threats and Countermeasures Cyber-attacks offer the ability to obliterate and interrupt an organization’s communication channels, security data center and facility remotely. Indeed, private and public organizations are often interlinked; hence, data breaches effect damaging impact on the organization’s confidence in protecting the economy and innocent citizens. Today, there is a crisis about organizations’ inability to resolve the age-old problem of how to control the abuse of trust and confidence given to authorized officials to freely logon onto the organization’s system, Many such officials , turn around to betray the organization by committing cybercrimes. Vulnerability stems from interactions and communications among several system components and categorized as deficiency, weakness and security cavity on network data center. To what extent do internal threats constitute a key factor against any organization’s ability to battle insider threats caused by people who abuse assigned privilege? What is the most effective mechanism for organizations to combat internal threats? Why should disgruntled employees must be trained on the danger of throwing wastepaper and electronic media in a bin
  • 2. within and outside the facility? Internal threats and countermeasures are isolated occurrences where most activities involve direct connection to the Internet for global interaction, digital communication and transmission. The preeminent method to mitigate internal threats is to equip users with ready-to-act traditional approach. As a result of the sophistication of our modern-day culprits, over-all reliance on employees, increasing credo that authorized users are predictable agent in the fight against internal threats. Internal threat operators often use psychological moralities and procedures to navigate or circumvent security restrictions through persuasion and psychosomatic principles. Criminals use crafty manipulation techniques to sway users into divulging confidential information, such as, usernames, passwords, bank information, house and office alarm codes to take control over organizations’ security centers. Historic channel to internal threats and countermeasures are categorized into employee’s theft, pilferage, embezzlement, fraud, stealing, peculation and defalcation. Most organizations often ignore to establish and adopt on-board ecological waste management action plans to deal with discarded materials, shredded left-over documents, magnetic media and placing fragments in isolated location as countermeasure process. Today, there is a crisis about organizations’ inability to resolve the age-old problem of how to control the abuse of trust and confidence given to authorized officials to freely logon onto the organization’s system, Many such officials , turn around to betray the organization by committing cybercrimes. Vulnerability stems from interactions and communications among several system components and categorized as deficiency, weakness and security cavity on network data center.
  • 3. To what extent do internal threats constitute a key factor against any organization’s ability to battle insider threats caused by people who abuse assigned privilege? What is the most effective mechanism for organizations to combat internal threats? Why should disgruntled employees must be trained on the danger of throwing wastepaper and electronic media in a bin within and outside the facility? PART2 Objective The culture of external threats and countermeasures (ETC) is an overriding factor for public and private organizations in our generation. The ETC consist of a set of threats such as matchless combination of terrorizations and countermeasures. Organizations are strongly urged to establish comprehensive mechanism to mitigate external threat and countermeasures. However, failure to do so can lead to the creation of adverse effects on organization’s data and assets. In all dimensions, external threats can exist without risk, but risk cannot exist without a matching threat and conforming action. The ETC often derives its strength from these four demographic factors; deterrence, detection, denial and perimeter security . Deterrence
  • 4. Deterrence is designated to dissuade potential violators from launching threats and criminal acts against organizations. Aura Security in physical security is often heightened by security professional measures such as signs placed along perimeters near openings of the facility. Aura security strives to create strong psychological deterrent warning offenders and keeping them away from the facility. Most deterrence has very limited or no physical security mechanism. Detection This is an apparatus used in most facilities to detect perpetrators. They include devices such as closed-circuit television (CCTV), intrusion sensors, duress alarms, weapons screening imaging machines and protective dogs. Traditionally, these devices are installed to identify violators upon arrival in the facility. Denial Deny is crucial component of physical security items codenamed target hardening: They include steel doors, safe deposits and frequent banks deposits of available cash which often help to deny perpetrators access to the facility. Perimeter Security Naturally, a building access points such as outer boundary and boundary line is the first line of defense against perpetrators of any property. In addition, Perimeter Security is entrenched with a psychological impact on offenders. Two components of perimeter Security include natural and human barriers. natural barriers are closely related to rivers, hills, foliage, fences, and steel doors; while. human barriers include security officers who
  • 5. are designated to scrutinize individuals entering and leaving to the facility. Deterrence is designated to dissuade potential violators from launching threat and criminal acts against organizations. Aura Security in physical security is often heightened by security professional measures such as signs placed along perimeters near openings of the facility. Aura security strives to create strong phycological deterrent warning offenders and keeping them away from the facility. Deterrence has very limited or no physical security mechanism and Detection a pparatus is used in most facilities to detect perpetrators. Such devices include devices closed circuit television (CCTV), intrusion sensors, duress alarms, weapons screening devices and protective dogs. Traditionally, these devices are installed to identify violators upon arrival in the facility. The university president is very concerned about external threats. What countermeasures such as deterrence or detection must be implemented on campus to enhance student, faculty and staff security? APA Formatting and plagiarism report are must.