This is assignment is a two part questions. Each question needs to be addressed in 400-500 words. PART1 Internal Threats and Countermeasures Cyber-attacks offer the ability to obliterate and interrupt an organization’s communication channels, security data center and facility remotely. Indeed, private and public organizations are often interlinked; hence, data breaches effect damaging impact on the organization’s confidence in protecting the economy and innocent citizens. Today, there is a crisis about organizations’ inability to resolve the age-old problem of how to control the abuse of trust and confidence given to authorized officials to freely logon onto the organization’s system, Many such officials , turn around to betray the organization by committing cybercrimes. Vulnerability stems from interactions and communications among several system components and categorized as deficiency, weakness and security cavity on network data center. To what extent do internal threats constitute a key factor against any organization’s ability to battle insider threats caused by people who abuse assigned privilege? What is the most effective mechanism for organizations to combat internal threats? Why should disgruntled employees must be trained on the danger of throwing wastepaper and electronic media in a bin within and outside the facility? Internal threats and countermeasures are isolated occurrences where most activities involve direct connection to the Internet for global interaction, digital communication and transmission. The preeminent method to mitigate internal threats is to equip users with ready-to-act traditional approach. As a result of the sophistication of our modern-day culprits, over-all reliance on employees, increasing credo that authorized users are predictable agent in the fight against internal threats. Internal threat operators often use psychological moralities and procedures to navigate or circumvent security restrictions through persuasion and psychosomatic principles. Criminals use crafty manipulation techniques to sway users into divulging confidential information, such as, usernames, passwords, bank information, house and office alarm codes to take control over organizations’ security centers. Historic channel to internal threats and countermeasures are categorized into employee’s theft, pilferage, embezzlement, fraud, stealing, peculation and defalcation. Most organizations often ignore to establish and adopt on-board ecological waste management action plans to deal with discarded materials, shredded left-over documents, magnetic media and placing fragments in isolated location as countermeasure process. Today, there is a crisis about organizations’ inability to resolve the age-old problem of how to control the abuse of trust and confidence given to authorized officials to freely logon onto the organization’s system, Many such officials , turn around to betray.