Running head: SECURITY MECHANISM 1 SECURITY MECHANISM 2 Security Mechanism Student Name Institution Affiliation Abstract Many organizations and enterprises have adopted the practice of storage of data in the cloud as it is fast, efficient and reliable. It has eliminated the challenge of loss of data and made it easier to retrieve data. Enterprises are therefore able to thrive in the current era where clients require their needs to be met quickly and in their desired timing. However it is faced with the challenge of security, many do not understand their responsibility of making sure that the data is secure. The storage of data in the clouds has decentralized the IT department because in most cases they are not in control of the data due to the ease of access to the various cloud service providers, different departments within an enterprise which have different service providers. The security mechanisms are not comprehensive to cater to all the service providers. Requiring one to use multiple security measures. Hence there exist several loopholes that can be exploited by criminals impairing the steady operations of the victims. Imposing security on the cloud requires that a mechanism is put in place to not only protect but also detect the threats. This will help in planning how to counter react to any possible threat. It does also ensure that there is a study of the trends of such crimes. Chapter 13 Counterterrorism The Options Counterterrorism and the Use of Force · Suppression Campaigns · Military suppression campaigns. · Case: Operation Enduring Freedom. · Case: Operation Peace for Galilee. · Paramilitary suppression campaigns. · Case: Algeria. · Case: Colombia. · Punitive and preemptive strikes. · Coercive Covert Operations · “War in the shadows.” · Case: The Achille Lauro operation. · Case: Assassinations. · Case: Israeli Approach · Case: Armed Drone Aircraft · Special Operations Forces · Elite military and police units specializing in unconventional operations. OOTW: Repressive Options · Nonviolent Covert Operations · Encompasses a number of options. · Inherently secretive. Often creative. · Examples: · Infiltration. · Disinformation. · Cyberwar · Intelligence · SIGINT (Signal Intelligence) · HUMINT (Human Intelligence) · OSINT (Open Source Intelligence) · IMINT (Imagery Intelligence) · MASINT (Measures and Signatures Intelligence) · GEOINT (Geospatial Intelligence) · Enhanced Security · Target hardening. · Case: Morocco’s desert wall. · Case: Israel’s walls on the border. · Economic Sanctions · Directed against governments. · Conditions for success. · Cooperation must remain firm. · Trade leaks must be controlled. · Sanctioned regime must be made to suffer. · Problems. · Sanctioned regimes rarely suffer—their people do. · Coalitions do not always remain firm. · Leaks are difficult to control. · OOTW: Conciliatory Options · Diplomatic Options · Reasoned dialogue. · Peace processes. · Negotiations. · Social Reform · Respo.