SlideShare a Scribd company logo
This is assignment is a two part questions. Each question needs
to be addressed in 400-500 words.
PART1
Internal Threats and Countermeasures
Cyber-attacks offer the ability to obliterate and interrupt an
organization’s communication channels, security data center
and facility remotely. Indeed, private and public organizations
are often interlinked; hence, data breaches effect damaging
impact on the organization’s confidence in protecting the
economy and innocent citizens. Today, there is a crisis about
organizations’ inability to resolve the age-old problem of how
to control the abuse of trust and confidence given to authorized
officials to freely logon onto the organization’s system, Many
such officials , turn around to betray the organization by
committing cybercrimes.
Vulnerability stems from interactions and communications
among several system components and categorized as
deficiency, weakness and security cavity on network data
center.
To what extent do internal threats constitute a key factor
against any organization’s ability to battle insider threats
caused by people who abuse assigned privilege?
What is the most effective mechanism for organizations to
combat internal threats?
Why should disgruntled employees must be trained on the
danger of throwing wastepaper and electronic media in a bin
within and outside the facility?
Internal threats and countermeasures are isolated occurrences
where most activities involve direct connection to the Internet
for global interaction, digital communication and transmission.
The preeminent method to mitigate internal threats is to equip
users with ready-to-act traditional approach. As a result of the
sophistication of our modern-day culprits, over-all reliance on
employees, increasing credo that authorized users are
predictable agent in the fight against internal threats. Internal
threat operators often use psychological moralities and
procedures to navigate or circumvent security restrictions
through persuasion and psychosomatic principles. Criminals
use crafty manipulation techniques to sway users into divulging
confidential information, such as, usernames, passwords, bank
information, house and office alarm codes to take control over
organizations’ security centers. Historic channel to internal
threats and countermeasures are categorized into employee’s
theft, pilferage, embezzlement, fraud, stealing, peculation and
defalcation. Most organizations often ignore to establish and
adopt on-board ecological waste management action plans to
deal with discarded materials, shredded left-over documents,
magnetic media and placing fragments in isolated location as
countermeasure process.
Today, there is a crisis about organizations’ inability to resolve
the age-old problem of how to control the abuse of trust and
confidence given to authorized officials to freely logon onto
the organization’s system, Many such officials , turn around to
betray the organization by committing cybercrimes.
Vulnerability stems from interactions and communications
among several system components and categorized as
deficiency, weakness and security cavity on network data
center.
To what extent do internal threats constitute a key factor
against any organization’s ability to battle insider threats
caused by people who abuse assigned privilege?
What is the most effective mechanism for organizations to
combat internal threats?
Why should disgruntled employees must be trained on the
danger of throwing wastepaper and electronic media in a bin
within and outside the facility?
PART2
Objective
The culture of external threats and countermeasures (ETC) is
an overriding factor for public and private organizations in our
generation. The ETC consist of a set of threats such as
matchless combination of terrorizations and countermeasures.
Organizations are strongly urged to establish comprehensive
mechanism to mitigate external threat and countermeasures.
However, failure to do so can lead to the creation of adverse
effects on organization’s data and assets. In all dimensions,
external threats can exist without risk, but risk cannot exist
without a matching threat and conforming action. The ETC
often derives its strength from these four demographic factors;
deterrence, detection, denial and perimeter security
.
Deterrence
Deterrence is designated to dissuade potential violators from
launching threats and criminal acts against organizations.
Aura Security
in physical security is often heightened by security
professional measures such as signs placed along perimeters
near openings of the facility. Aura security strives to create
strong psychological deterrent warning offenders and keeping
them away from the facility. Most deterrence has very limited
or no physical security mechanism.
Detection
This is an apparatus used in most facilities to detect
perpetrators. They include devices such as closed-circuit
television (CCTV), intrusion sensors, duress alarms, weapons
screening imaging machines and protective dogs.
Traditionally, these devices are installed to identify violators
upon arrival in the facility.
Denial
Deny is crucial component of physical security items
codenamed target hardening: They include steel doors, safe
deposits and frequent banks deposits of available cash which
often help to deny perpetrators access to the facility.
Perimeter Security
Naturally, a building access points such as outer boundary and
boundary line is the first line of defense against perpetrators of
any property. In addition, Perimeter Security is entrenched with
a psychological impact on offenders. Two components of
perimeter Security include natural and human barriers. natural
barriers are closely related to rivers, hills, foliage, fences, and
steel doors; while. human barriers include security officers who
are designated to scrutinize individuals entering and leaving to
the facility.
Deterrence
is designated to dissuade potential violators from launching
threat and criminal acts against organizations.
Aura Security
in physical security is often heightened by security
professional measures such as signs placed along perimeters
near openings of the facility. Aura security strives to create
strong phycological deterrent warning offenders and keeping
them away from the facility. Deterrence has very limited or no
physical security mechanism and
Detection a
pparatus is used in most facilities to detect perpetrators. Such
devices include devices closed circuit television (CCTV),
intrusion sensors, duress alarms, weapons screening devices
and protective dogs. Traditionally, these devices are installed
to identify violators upon arrival in the facility.
The university president is very concerned about external
threats. What countermeasures such as deterrence or detection
must be implemented on campus to enhance student, faculty
and staff security?
APA Formatting and plagiarism report are must.
This is assignment is a two part questions. Each question needs to b.docx

More Related Content

Similar to This is assignment is a two part questions. Each question needs to b.docx

Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
srtwgwfwwgw
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
Ahmad Sharifi
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
IOSR Journals
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
AbdullahKanash
 
Report on Human factor in the financial industry
Report on Human factor in the financial industryReport on Human factor in the financial industry
Report on Human factor in the financial industry
Chandrak Trivedi
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
AnupmaMunshi
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Enterprise Insider
 
16 Chapter 1. Encompassing Effective CPTED Solution.docx
16   Chapter 1.  Encompassing Effective CPTED Solution.docx16   Chapter 1.  Encompassing Effective CPTED Solution.docx
16 Chapter 1. Encompassing Effective CPTED Solution.docx
herminaprocter
 
System Security SEC440 System Security.docx
System Security     SEC440 System Security.docxSystem Security     SEC440 System Security.docx
System Security SEC440 System Security.docx
mattinsonjanel
 
EnterpriseImmuneSystem
EnterpriseImmuneSystemEnterpriseImmuneSystem
EnterpriseImmuneSystem
Adam Toth-Fejel
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
Booz Allen Hamilton
 
The Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your OrganizationThe Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your Organization
LDMGlobal
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
John Intindolo
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
CMR WORLD TECH
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
Austin Eppstein
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Risk
phanleson
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
dr_edw777
 
Zero Trust.pptx
Zero Trust.pptxZero Trust.pptx
Zero Trust.pptx
ThavaselviMunusamy1
 
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdf
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdfUnderstanding the Biggest Cybersecurity Threats for Businesses Today.pdf
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdf
VLink Inc
 

Similar to This is assignment is a two part questions. Each question needs to b.docx (20)

Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Report on Human factor in the financial industry
Report on Human factor in the financial industryReport on Human factor in the financial industry
Report on Human factor in the financial industry
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 
16 Chapter 1. Encompassing Effective CPTED Solution.docx
16   Chapter 1.  Encompassing Effective CPTED Solution.docx16   Chapter 1.  Encompassing Effective CPTED Solution.docx
16 Chapter 1. Encompassing Effective CPTED Solution.docx
 
System Security SEC440 System Security.docx
System Security     SEC440 System Security.docxSystem Security     SEC440 System Security.docx
System Security SEC440 System Security.docx
 
EnterpriseImmuneSystem
EnterpriseImmuneSystemEnterpriseImmuneSystem
EnterpriseImmuneSystem
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
 
The Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your OrganizationThe Role of Incident Response in Cybersecurity: Protecting Your Organization
The Role of Incident Response in Cybersecurity: Protecting Your Organization
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Risk
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Zero Trust.pptx
Zero Trust.pptxZero Trust.pptx
Zero Trust.pptx
 
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdf
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdfUnderstanding the Biggest Cybersecurity Threats for Businesses Today.pdf
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdf
 

More from kenth16

This is a special edition of an established title widely use.docx
This is a special edition of an established title widely use.docxThis is a special edition of an established title widely use.docx
This is a special edition of an established title widely use.docx
kenth16
 
This is a statistics essayThe different sections that should be .docx
This is a statistics essayThe different sections that should be .docxThis is a statistics essayThe different sections that should be .docx
This is a statistics essayThe different sections that should be .docx
kenth16
 
This is a start to the scope baseline but you seem to have forgott.docx
This is a start to the scope baseline but you seem to have forgott.docxThis is a start to the scope baseline but you seem to have forgott.docx
This is a start to the scope baseline but you seem to have forgott.docx
kenth16
 
This is a sociology course, the quiz is 20 questions all of them are.docx
This is a sociology course, the quiz is 20 questions all of them are.docxThis is a sociology course, the quiz is 20 questions all of them are.docx
This is a sociology course, the quiz is 20 questions all of them are.docx
kenth16
 
This is a simple weekly assignment that I honestly have no motivatio.docx
This is a simple weekly assignment that I honestly have no motivatio.docxThis is a simple weekly assignment that I honestly have no motivatio.docx
This is a simple weekly assignment that I honestly have no motivatio.docx
kenth16
 
This is a sermon that Jonathan Edwards gives at a revival in Con.docx
This is a sermon that Jonathan Edwards gives at a revival in Con.docxThis is a sermon that Jonathan Edwards gives at a revival in Con.docx
This is a sermon that Jonathan Edwards gives at a revival in Con.docx
kenth16
 
This is a short 4-minute video introduction to DISC.   The fou.docx
This is a short 4-minute video introduction to DISC.   The fou.docxThis is a short 4-minute video introduction to DISC.   The fou.docx
This is a short 4-minute video introduction to DISC.   The fou.docx
kenth16
 
This is a serious assignment that will be graded heavily. I need a s.docx
This is a serious assignment that will be graded heavily. I need a s.docxThis is a serious assignment that will be graded heavily. I need a s.docx
This is a serious assignment that will be graded heavily. I need a s.docx
kenth16
 
This is a sample list of movies that you may use for your paper. Y.docx
This is a sample list of movies that you may use for your paper. Y.docxThis is a sample list of movies that you may use for your paper. Y.docx
This is a sample list of movies that you may use for your paper. Y.docx
kenth16
 
This is a research paper based off the Book The Prince by Niccolo .docx
This is a research paper based off the Book The Prince by Niccolo .docxThis is a research paper based off the Book The Prince by Niccolo .docx
This is a research paper based off the Book The Prince by Niccolo .docx
kenth16
 
This is a redo Assessment. I receive a 42 on Assessment 3.  Assessm.docx
This is a redo Assessment. I receive a 42 on Assessment 3.  Assessm.docxThis is a redo Assessment. I receive a 42 on Assessment 3.  Assessm.docx
This is a redo Assessment. I receive a 42 on Assessment 3.  Assessm.docx
kenth16
 
This is a quiz...please answer questions thoroughly and define words.docx
This is a quiz...please answer questions thoroughly and define words.docxThis is a quiz...please answer questions thoroughly and define words.docx
This is a quiz...please answer questions thoroughly and define words.docx
kenth16
 
This is due in 30 hoursPart I. Present your research pr.docx
This is due in 30 hoursPart I. Present your research pr.docxThis is due in 30 hoursPart I. Present your research pr.docx
This is due in 30 hoursPart I. Present your research pr.docx
kenth16
 
This is Conflict and Negotiations”, chapter 10 from the book .docx
This is Conflict and Negotiations”, chapter 10 from the book .docxThis is Conflict and Negotiations”, chapter 10 from the book .docx
This is Conflict and Negotiations”, chapter 10 from the book .docx
kenth16
 
this is due in 14 hours..... must have done in time.... no late .docx
this is due in 14 hours..... must have done in time.... no late .docxthis is due in 14 hours..... must have done in time.... no late .docx
this is due in 14 hours..... must have done in time.... no late .docx
kenth16
 
This is due by 1159 p.m. EST, Friday, May 29, 2020 Select TWO.docx
This is due by 1159 p.m. EST, Friday, May 29, 2020 Select TWO.docxThis is due by 1159 p.m. EST, Friday, May 29, 2020 Select TWO.docx
This is due by 1159 p.m. EST, Friday, May 29, 2020 Select TWO.docx
kenth16
 
this is Consumer Buyer Behavior Part 2. Our learning objectives to.docx
this is Consumer Buyer Behavior Part 2. Our learning objectives to.docxthis is Consumer Buyer Behavior Part 2. Our learning objectives to.docx
this is Consumer Buyer Behavior Part 2. Our learning objectives to.docx
kenth16
 
this is due in 12 hours..... must have done in 12 hours..... Ple.docx
this is due in 12 hours..... must have done in 12 hours..... Ple.docxthis is due in 12 hours..... must have done in 12 hours..... Ple.docx
this is due in 12 hours..... must have done in 12 hours..... Ple.docx
kenth16
 
This is aTestand not a research paper. Only assigned written m.docx
This is aTestand not a research paper. Only assigned written m.docxThis is aTestand not a research paper. Only assigned written m.docx
This is aTestand not a research paper. Only assigned written m.docx
kenth16
 
This is Communication 101 assignment not English.After viewing.docx
This is Communication 101 assignment not English.After viewing.docxThis is Communication 101 assignment not English.After viewing.docx
This is Communication 101 assignment not English.After viewing.docx
kenth16
 

More from kenth16 (20)

This is a special edition of an established title widely use.docx
This is a special edition of an established title widely use.docxThis is a special edition of an established title widely use.docx
This is a special edition of an established title widely use.docx
 
This is a statistics essayThe different sections that should be .docx
This is a statistics essayThe different sections that should be .docxThis is a statistics essayThe different sections that should be .docx
This is a statistics essayThe different sections that should be .docx
 
This is a start to the scope baseline but you seem to have forgott.docx
This is a start to the scope baseline but you seem to have forgott.docxThis is a start to the scope baseline but you seem to have forgott.docx
This is a start to the scope baseline but you seem to have forgott.docx
 
This is a sociology course, the quiz is 20 questions all of them are.docx
This is a sociology course, the quiz is 20 questions all of them are.docxThis is a sociology course, the quiz is 20 questions all of them are.docx
This is a sociology course, the quiz is 20 questions all of them are.docx
 
This is a simple weekly assignment that I honestly have no motivatio.docx
This is a simple weekly assignment that I honestly have no motivatio.docxThis is a simple weekly assignment that I honestly have no motivatio.docx
This is a simple weekly assignment that I honestly have no motivatio.docx
 
This is a sermon that Jonathan Edwards gives at a revival in Con.docx
This is a sermon that Jonathan Edwards gives at a revival in Con.docxThis is a sermon that Jonathan Edwards gives at a revival in Con.docx
This is a sermon that Jonathan Edwards gives at a revival in Con.docx
 
This is a short 4-minute video introduction to DISC.   The fou.docx
This is a short 4-minute video introduction to DISC.   The fou.docxThis is a short 4-minute video introduction to DISC.   The fou.docx
This is a short 4-minute video introduction to DISC.   The fou.docx
 
This is a serious assignment that will be graded heavily. I need a s.docx
This is a serious assignment that will be graded heavily. I need a s.docxThis is a serious assignment that will be graded heavily. I need a s.docx
This is a serious assignment that will be graded heavily. I need a s.docx
 
This is a sample list of movies that you may use for your paper. Y.docx
This is a sample list of movies that you may use for your paper. Y.docxThis is a sample list of movies that you may use for your paper. Y.docx
This is a sample list of movies that you may use for your paper. Y.docx
 
This is a research paper based off the Book The Prince by Niccolo .docx
This is a research paper based off the Book The Prince by Niccolo .docxThis is a research paper based off the Book The Prince by Niccolo .docx
This is a research paper based off the Book The Prince by Niccolo .docx
 
This is a redo Assessment. I receive a 42 on Assessment 3.  Assessm.docx
This is a redo Assessment. I receive a 42 on Assessment 3.  Assessm.docxThis is a redo Assessment. I receive a 42 on Assessment 3.  Assessm.docx
This is a redo Assessment. I receive a 42 on Assessment 3.  Assessm.docx
 
This is a quiz...please answer questions thoroughly and define words.docx
This is a quiz...please answer questions thoroughly and define words.docxThis is a quiz...please answer questions thoroughly and define words.docx
This is a quiz...please answer questions thoroughly and define words.docx
 
This is due in 30 hoursPart I. Present your research pr.docx
This is due in 30 hoursPart I. Present your research pr.docxThis is due in 30 hoursPart I. Present your research pr.docx
This is due in 30 hoursPart I. Present your research pr.docx
 
This is Conflict and Negotiations”, chapter 10 from the book .docx
This is Conflict and Negotiations”, chapter 10 from the book .docxThis is Conflict and Negotiations”, chapter 10 from the book .docx
This is Conflict and Negotiations”, chapter 10 from the book .docx
 
this is due in 14 hours..... must have done in time.... no late .docx
this is due in 14 hours..... must have done in time.... no late .docxthis is due in 14 hours..... must have done in time.... no late .docx
this is due in 14 hours..... must have done in time.... no late .docx
 
This is due by 1159 p.m. EST, Friday, May 29, 2020 Select TWO.docx
This is due by 1159 p.m. EST, Friday, May 29, 2020 Select TWO.docxThis is due by 1159 p.m. EST, Friday, May 29, 2020 Select TWO.docx
This is due by 1159 p.m. EST, Friday, May 29, 2020 Select TWO.docx
 
this is Consumer Buyer Behavior Part 2. Our learning objectives to.docx
this is Consumer Buyer Behavior Part 2. Our learning objectives to.docxthis is Consumer Buyer Behavior Part 2. Our learning objectives to.docx
this is Consumer Buyer Behavior Part 2. Our learning objectives to.docx
 
this is due in 12 hours..... must have done in 12 hours..... Ple.docx
this is due in 12 hours..... must have done in 12 hours..... Ple.docxthis is due in 12 hours..... must have done in 12 hours..... Ple.docx
this is due in 12 hours..... must have done in 12 hours..... Ple.docx
 
This is aTestand not a research paper. Only assigned written m.docx
This is aTestand not a research paper. Only assigned written m.docxThis is aTestand not a research paper. Only assigned written m.docx
This is aTestand not a research paper. Only assigned written m.docx
 
This is Communication 101 assignment not English.After viewing.docx
This is Communication 101 assignment not English.After viewing.docxThis is Communication 101 assignment not English.After viewing.docx
This is Communication 101 assignment not English.After viewing.docx
 

Recently uploaded

RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 

Recently uploaded (20)

RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 

This is assignment is a two part questions. Each question needs to b.docx

  • 1. This is assignment is a two part questions. Each question needs to be addressed in 400-500 words. PART1 Internal Threats and Countermeasures Cyber-attacks offer the ability to obliterate and interrupt an organization’s communication channels, security data center and facility remotely. Indeed, private and public organizations are often interlinked; hence, data breaches effect damaging impact on the organization’s confidence in protecting the economy and innocent citizens. Today, there is a crisis about organizations’ inability to resolve the age-old problem of how to control the abuse of trust and confidence given to authorized officials to freely logon onto the organization’s system, Many such officials , turn around to betray the organization by committing cybercrimes. Vulnerability stems from interactions and communications among several system components and categorized as deficiency, weakness and security cavity on network data center. To what extent do internal threats constitute a key factor against any organization’s ability to battle insider threats caused by people who abuse assigned privilege? What is the most effective mechanism for organizations to combat internal threats? Why should disgruntled employees must be trained on the danger of throwing wastepaper and electronic media in a bin
  • 2. within and outside the facility? Internal threats and countermeasures are isolated occurrences where most activities involve direct connection to the Internet for global interaction, digital communication and transmission. The preeminent method to mitigate internal threats is to equip users with ready-to-act traditional approach. As a result of the sophistication of our modern-day culprits, over-all reliance on employees, increasing credo that authorized users are predictable agent in the fight against internal threats. Internal threat operators often use psychological moralities and procedures to navigate or circumvent security restrictions through persuasion and psychosomatic principles. Criminals use crafty manipulation techniques to sway users into divulging confidential information, such as, usernames, passwords, bank information, house and office alarm codes to take control over organizations’ security centers. Historic channel to internal threats and countermeasures are categorized into employee’s theft, pilferage, embezzlement, fraud, stealing, peculation and defalcation. Most organizations often ignore to establish and adopt on-board ecological waste management action plans to deal with discarded materials, shredded left-over documents, magnetic media and placing fragments in isolated location as countermeasure process. Today, there is a crisis about organizations’ inability to resolve the age-old problem of how to control the abuse of trust and confidence given to authorized officials to freely logon onto the organization’s system, Many such officials , turn around to betray the organization by committing cybercrimes. Vulnerability stems from interactions and communications among several system components and categorized as deficiency, weakness and security cavity on network data center.
  • 3. To what extent do internal threats constitute a key factor against any organization’s ability to battle insider threats caused by people who abuse assigned privilege? What is the most effective mechanism for organizations to combat internal threats? Why should disgruntled employees must be trained on the danger of throwing wastepaper and electronic media in a bin within and outside the facility? PART2 Objective The culture of external threats and countermeasures (ETC) is an overriding factor for public and private organizations in our generation. The ETC consist of a set of threats such as matchless combination of terrorizations and countermeasures. Organizations are strongly urged to establish comprehensive mechanism to mitigate external threat and countermeasures. However, failure to do so can lead to the creation of adverse effects on organization’s data and assets. In all dimensions, external threats can exist without risk, but risk cannot exist without a matching threat and conforming action. The ETC often derives its strength from these four demographic factors; deterrence, detection, denial and perimeter security . Deterrence
  • 4. Deterrence is designated to dissuade potential violators from launching threats and criminal acts against organizations. Aura Security in physical security is often heightened by security professional measures such as signs placed along perimeters near openings of the facility. Aura security strives to create strong psychological deterrent warning offenders and keeping them away from the facility. Most deterrence has very limited or no physical security mechanism. Detection This is an apparatus used in most facilities to detect perpetrators. They include devices such as closed-circuit television (CCTV), intrusion sensors, duress alarms, weapons screening imaging machines and protective dogs. Traditionally, these devices are installed to identify violators upon arrival in the facility. Denial Deny is crucial component of physical security items codenamed target hardening: They include steel doors, safe deposits and frequent banks deposits of available cash which often help to deny perpetrators access to the facility. Perimeter Security Naturally, a building access points such as outer boundary and boundary line is the first line of defense against perpetrators of any property. In addition, Perimeter Security is entrenched with a psychological impact on offenders. Two components of perimeter Security include natural and human barriers. natural barriers are closely related to rivers, hills, foliage, fences, and steel doors; while. human barriers include security officers who
  • 5. are designated to scrutinize individuals entering and leaving to the facility. Deterrence is designated to dissuade potential violators from launching threat and criminal acts against organizations. Aura Security in physical security is often heightened by security professional measures such as signs placed along perimeters near openings of the facility. Aura security strives to create strong phycological deterrent warning offenders and keeping them away from the facility. Deterrence has very limited or no physical security mechanism and Detection a pparatus is used in most facilities to detect perpetrators. Such devices include devices closed circuit television (CCTV), intrusion sensors, duress alarms, weapons screening devices and protective dogs. Traditionally, these devices are installed to identify violators upon arrival in the facility. The university president is very concerned about external threats. What countermeasures such as deterrence or detection must be implemented on campus to enhance student, faculty and staff security? APA Formatting and plagiarism report are must.