Free Essay

Security

In:

Submitted By WWJJ
Words 2035
Pages 9
Introduction

The world has undergone significant technological advancement and strategic landscape evolution since the start of this century. Globalisation has shrunk the spaces between states and nations. The world is now intricately connected and nations are hence more vulnerable to the impacts and effects of threats posed by others. With the transformation of the global security landscape, militaries have to cope with a wider spectrum of threats – traditional and non-traditional. Non-traditional threats are transnational by nature. They are not restricted by international boundaries or nationalities. Often, the threats are unpredictable and intricately woven into our traditional threats. Such combinations posed greater danger and risk in damaging the states or nations. The primary purpose of the military outfit is to defend the nation’s sovereignty and independence against traditional threats from other nations. The marrying of non-traditional and traditional threats imposed greater responsibilities on the military forces. It also fundamentally challenges the relevance, construct and employment of the military force. This essay seeks to explore how the global security landscape has changed and its impact on the world. It also aims to identify if military forces are successful in coping with the current landscape.

Global security landscape and its impact

Liberal trade and rapid advancement of technology has resulted in a greater degree of interconnectedness and interdependence between countries. This in evidently integrated the world in terms of political, social and economical aspects. Such integration would also mean that any major incident in a developed nation would have an effect on the rest of the world. The attacks of Sep 11 2001 increased the number of people living in poverty by 10 million and cost the world economy to exceed 80 billion dollars.

Hence global evolution has also increased and fostered diverse security threats such as transnational crimes, terrorism and cyber warfare. The world is much closer these days with the rapid and rampant introduction and use of social media. Information is communicated swiftly in this age. Such interconnectedness has provided a platform for proliferation of radical ideologies and the conduct of transnational crimes and terrorist acts. Before the killing of Osama bin Laden, terrorist groups or organisations such as al-Qaeda were dispersed and loosely organised networks. These days, the al-Qaeda inspired Islamic State of Iraq and Syria or ISIS has been using sophisticated techniques on the cyber front to promulgate their propaganda and promote recruitment around the world.

After Cold War and World War II, global trade has grown tremendously. As Phil Williams of the University of Pittsburgh has quoted “ Transnational criminals have been on of the biggest beneficiaries of globalisation.” The large volume of international trade has resulted in regulation challenges and wealth inequality especially in developing countries. Transnational crimes were organised to exploit the loopholes in regulation, weak nations or states in governance so as challenge the inequality.

However the inequality in economy does not contribute to such “non-traditional” aggressions alone. A nation weak in regulation and governance creates permissive environment for the rise of non-state actors and intra-State conflicts. Intra-states conflicts usually arised between the intra-state groups i.e. the government and one of more non-state actors. The ongoing Syrian Civil War between the incumbent government and the Free Syrian Army (FSA), an armed opposition of various groups started since 2011 is one such example. The war was triggered by unrest due to pro-democratic protests that turned violent and deadly with the arrest and torture of some teenagers. This war escalated into a chemical warfare when rockets with nerve agent sarin were used during the conflict. The conflict had claimed more than 200,000 lives and $202 billion by March 2015.

Nation’s internal strife more often than not, results in humanitarian issues. An example will be the independence of Timor Leste in August 1999. The country descended into mayhem when it gained independence. The mayhem was due to the widespread retaliation and destruction by militias who were in favour of integration with Indonesia. More than 450,000 Timorese were displaced and 70% of Timor’s infrastructures such as schools, housing, public utilities and medical facilities were destroyed.

Globalisation has also increased the opportunity for travellers – business and leisure. This brought about the potential rapid transmission of infectious diseases such as malaria or SARS throughout the world. Such diseases can turn into medical epidemics that could cripple economical confidence of investors and create social instability within the nation. In February 2003, the outbreak of SARS in Singapore resulted in 238 infected personnel, 33 of whom died. Singapore’s economic growth fell from 2-5% to 0.5-2.5%. Businesses were badly affected as people stayed home due to fear.

So what did the rest of the world do?
Since the end of Cold War, the US military narratives shifted from containment to cooperation or engagement. Then, the focus was on countering the Soviet Union and communist expansion. President George H. W. Bush presented and emphasized the importance of cooperation of nations in the 1990s, which was reviewed as a strategy of engagement and enlargement by President Bill Clinton, that was to rely on economic and diplomatic efforts, backed by credible military force. With the 9/11 incident, President George W. Bush adopted the prerogative of preemptive actions without warning on terrorist states or organisations. Operation Iraqi Freedom (OIF) well demonstrated such policy. OIF was a US-led coalition military operation to remove Saddam Hussein’s regime and destroy their Weapons of Mass Destruction (WMD) or render them ineffective to terrorists. Through interviews, it was noted that Secretary of Defense, Donald Rumsfeld urged the employment of a streamlined force to execute the operation in a compressed timeline of 125 days. He recognised that Saddam’s regime was one that fought nimbly and operated in small units rather than in large numbers. Such planning guidance had fundamentally broken away from Powell Doctrine of overwhelming force against any adversaries. The campaign was launched on March 20, 2003 and ended on May 1. The campaign took 42 days, although Saddam was captured much later in December 2003. However the rebuilding efforts for post-war Iraq was much intensive and long-drawn than the military campaign. The military campaign and rebuilding efforts required herculean number of forces in ensuring Iraq was able to survive and prosper post war. Large part of it was due to security challenges of the 2 major extremist groups – Sunni and Shi’a. These groups resisted the US-led coalition Task Force that impeded the rebuilding process in Iraq. The coalition force largely contributed in building Iraq’s military forces and maintaining its security. In this instance, we learnt that the military force was used to defeat or topple an ill regime before supporting local police agencies in establishing law and order.

Over at Timor-Leste in 1999, UN administration assisted the state in its humanitarian relief and reconstruction efforts after unrest broke out in the state by adopting Security Council Resolution 1264, creating a multinational force or International Force for East Timor (INTERFET) led by Australia. This force comprised of troops from 22 countries and was assembled in five days. The responsive setup and deployment of the forces were so successful that Indonesia pulled out their military troops within 2 months. Such action stabilised the situation for international organisations and aid agencies to provide subsequent assistance. In addition, the military outfit possessed the necessary transportation means, engineering equipment and manpower to provide responsive and large-scale relief operations.

However a military outfit may not be effective in dealing with all transnational crimes. It may require a whole-of-government approach whereby law enforcement agencies together with political agencies can work on and support to counter such crimes at a global scale. This approach is to provide governance, protect civilian populace, improve security and restoring basic necessities and amenities for subsequent economical developments. Although the military may prove to be limited in dealing with transnational crimes, it may prove useful in dealing with global epidemic. The Singapore Armed Forces (SAF) was employed as the leading agency for national consequence management in 2003 to combat SARS. In this aspect, the leadership and innate nature of crisis management of the military outfit were valued.

Conclusion
The security landscape has certainly evolved over the years. The rapid advancement of technology and booming trade around the world has hastened this evolution and added layers of complexities. Military forces around the world are evolving to combat the non-traditional threats. These threats are increasingly getting sophisticated and complex. The role of the military force in the wider spectrum of operation largely depends on its competency and capability. The more competent and capable the force, the greater spectrum it operates in. The military forces are largely seen as an adaptable and dependable tool of choice in spearheading or supporting operations against non-traditional. This can be attributed to their larger capacity and capability as compared to the other state agencies.

Overall, the military forces in developed countries are successful and better equipped – knowledge, experience and economic to deal with non-traditional threats. Although non-traditional threats are getting complex, military forces are also constantly upgrading their military technology and acquiring knowledge and lessons learnt from other military forces. Dealing with such threats is an ongoing structural and capability developmental process. The success of military forces dealing with these threats largely depends on the context at the point in time.

Bibliography

United Nations. A more secure world: Our shared responsibility. Report of the Secretary-General’s High-level Panel on Threats, Challenges and Change. 2004

Gregory J. Dyekman. Security Cooperation: A Key to the Challenges of the 21st Century. Nov. 2007

Patrick, Stewart M. How Globalisation Affects Transnational Crime. Interview. Interviewed by Phil Williams. May 30, 2012

BBC. “Syria: The story of the conflict” BBC, http://www.bbc.com/news/world-middle-east-26116868

Erwin, Sandra I. and others, Top Five Threats to National Security in the Coming Decade. NDIA’s Business and Technology Magazine. November, 2012.

Margesson, Rhoda and Vaughn, Bruce. “East Timor: Political Dynamics, Dvelopment and International Involvement.” Congressional Research Service (June 17, 2009)

Srikanth, Divya. “Non-traditional Security Threats in the 21st Century: A Review.” International Journal of Development and Conflict 4 (2014) 60 – 68

Braun III, William G. and Allen, Charles D. “Shaping a 21st Century Defense Strategy: Reconciling Military Roles.” Joint Force Quarterly (JFQ) 73, April 01, 2014

Lachica, Alan A. “Humanitarian intervention in East Timor: An analysis of Australia’s leadership role.” The Peace and Conflict Review, http://www.review.upeace.org/index.cfm?opcion=0&ejemplar=22&entrada=113

Chew, Valerie. “Severe acute respiratory syndrome (SARS) outbreak, 2003.” Singapore Infopedia, http://eresources.nlb.gov.sg/infopedia/articles/SIP_1529_2009-06-03.html

COL. Yu Lin, Ong and LTC Cheng Kwee, Tan and MAJ Tan, Fredie. “The Utility of Military Force Against Non-Traditional Threats.” In Pointer, Vol. 36, No. 3-4: Journal of the Singapore Armed Forces, 2011

--------------------------------------------
[ 1 ]. Paul Collier et al., Breaking the Conflict Trap: Civil War and Development Policy, A World Bank Policy Research Report (Washington D.C.: The World Bank and Oxford University Press, 2003), p. 3.
[ 2 ]. Sandra I. Erwin, Stew Magnuson, Dan Parsons and Yasmin Tadjeh, Top Five Threats to National Security in the Coming Decade,” NDIA’s Business and Technology Magazine, November, 2012
[ 3 ]. Stewart M. Patrick, How Globilisation Affects Transnational Crime, Interview. Interviewed by Phil Williams
[ 4 ]. British Broadcasting Corporation (BBC), “ Syria: The story of the conflict,” BBC, http://www.bbc.com/news/world-middle-east-26116868 (accessed Mar 31, 2015)
[ 5 ]. Rhoda Margesson and Bruce Vaughn, “East Timor: Political Dynamics, Development and International Involvement,” Congressional Research Service, June 17, 2009: 7
[ 6 ]. Valerie Chew, “Sever acute respiratory syndrome (SARS) outbreak, 2003,” Singapore Infopedia, http://eresources.nlb.gov.sg/infopedia/articles/SIP_1529_2009-06-03.html (accessed March 31, 2015)
[ 7 ]. William G. Braun III and Charles D. Allen, “Shaping a 21st Century Defense Strategy: Reconciling Military Roles,” Joint Force Quarterly (JFQ) 73, April 01, 2014
[ 8 ]. Alan A. Lachica, “Humanitarian intervention in East Timor: An analysis of Australia’s leadership role,” The Peace and Conflict Review, http://www.review.upeace.org/index.cfm?opcion=0&ejemplar=22&entrada=113 (assessed Mar 31, 2015)

Similar Documents

Free Essay

Security

...Assignment 1 Lee Holland Identify what you see as the main purpose of security management and discuss what is meant by the statement that ‘security measures must be commensurate with the threat’. Within this essay I seek to break down the main assignment into the two phases that are within the title, the first being; What is the main purpose of security management? a role that to some would be undervalued, inconvenient, poorly funded and a hindrance, where to others, it is an effective, well-co-ordinated and highly desirable position, which when funded correctly, will have a positive effect on an organisations financial goals in the aid of preventing the loss of their assets through ways that were not before protected, this both in the corporate business and the commercial world. A reliable and effective security function is an asset to any organisation wishing to protect their tangible and intangible assets from compromise. In the second phase I will discuss what is meant by the statement that “security measures must be commensurate with the threat” In a world where the threats are changing daily, it is imperative that security procedures, policies and counter measures are kept up to date, and in line with the current rules and regulations of the security industry, they must also work within the National law within the county that they might be operating in. With financial constrictions and fierce competition within the business world it is only natural that an organisation...

Words: 685 - Pages: 3

Premium Essay

Security

...the CSO or Chief Security Officer. The CSO reports to the Board of Directors directly, hence cannot be influenced by the CEO or the CFO. According to the guideline by ASIS, this is the best model for a position that is as critical as the Chief Security Officer. Our CSO has been trying to add security to the culture of the company, and so far, it has been working. Being that the department is very new (about 1 year old), the security policies are now part of the human resources new hire packet. During their orientation, every new employee has to listen in on about 30 minutes of presentation that is security related, in addition to the normal company and culture orientation. The policies and procedures are now also embedded in the company intranet, and everyone has to sign a letter that says they read everything about the company’s security policies and procedures. This part also complies with the ASIS CSO guideline of bringing security into the company culture. According to the guideline, there is physical security that is handled by the CSO through his Facilities Director, as well as information security that is handled by the Information Security Director. They both report to the CSO (although the facilities director also reports to the Vice President of Human Resources). The company also has a Legal General Council, but this position reports directly to the CEO. The CSO regularly liaises with the General Council on all legal matters relating to the security department. Since...

Words: 561 - Pages: 3

Premium Essay

Security

...Security policy & standards Name Institution Course Instructor Date Part A In the current system, the following would be threats to the various components. THREATS TO SERVER Hacker Hacker is a general term that has truly been utilized to portray a machine programming master. All the more as of late, this term is regularly utilized as a part of a negative approach to depict a person who endeavors to increase unapproved access to system assets with pernicious plan. Black hat Black is an alternate term for people who utilize their insight into machine frameworks to break into frameworks or systems that they are not approved to utilize. Port Redirection Port redirection assaults are a kind of trust misuse assault that uses a bargained host to pass movement through a firewall that would overall be dropped. Consider a firewall with three interfaces and a host on every interface. The host on the outside can achieve the host on people in general administrations section, however not the host within. This openly open fragment is normally alluded to as a neutral ground (DMZ). The host on people in general administrations fragment can achieve the host on both the outside and within. In the event that programmers had the capacity bargain people in general administrations fragment host Theft of Service The likelihood of maverick utilization of a system association. Numerous hosts run the Dynamic Host Configuration Protocol (DHCP), by which...

Words: 1684 - Pages: 7

Free Essay

Security

...In this age where everything is computerized and or internet based, people spend more time on their pc’s than ever. You can pay your bills, email, perform financial transactions with the bank, social network, shop, get a degree, and the list goes on. These activities involve the transmission of sensitive data over the network and open the door for criminals to steal your valuable personal information. Knowing how to stop these thieves is important. The purpose of this report is to address a few of these security issues and discuss ways to prevent attacks from occurring. Users pose the largest security threat to a pc. Users go out on the internet, haphazardly clicking away on links that could open their pc for an attack. Malware, phishing scams, bot herding, viruses, and worms are just a few of the ways that your pc can be attacked. First and foremost is the user needs to understand that they must use caution when accessing the network. Follow sensible rules such as, don’t open email from strangers, don’t click on strange links, and don’t walk away from the pc without logging out. Never give out passwords, and change passwords often. Every 30-90 days is good and make sure you create strong passwords. As a rule of thumb, only give users access to the specific files and folders that they need. Use common sense when you are on the network and you can prevent malicious attack on your pc and protect sensitive information. Another way to protect your pc from malicious attack...

Words: 693 - Pages: 3

Premium Essay

Securities

...SECURITIES What is meant by ‘Securities’? The definition of ‘Securities’ as per the Securities Contracts Regulation Act (SCRA), 1956, includes instruments such as shares, bonds, scrips, stocks or other marketable securities of similar nature in or of any incorporate company or body corporate, government securities, derivatives of securities, units of collective investment scheme, interest and rights in securities, security receipt or any other instruments so declared by the Central Government. What is the function of Securities Market? Securities Markets is a place where buyers and sellers of securities can enter into transactions to purchase and sell shares, bonds, debentures etc. Further, it performs an important role of enabling corporates, entrepreneurs to raise resources for their companies and business ventures through public issues. Transfer of resources from those having idle resources (investors) to others who have a need for them (corporates) is most efficiently achieved through the securities market. Stated formally, securities markets provide channels for reallocation of savings to investments and entrepreneurship. Savings are linked to investments by a variety of intermediaries, through a range of financial products, called ‘Securities’. Which are the securities one can invest in? Shares Government Securities Derivative products Units of Mutual Funds etc., are some of the securities investors in the securities market can invest in...

Words: 710 - Pages: 3

Premium Essay

Security

...Kudler Fine Foods IT Security Report Area of System | Threat | Potential Vulnerability | IT System | Targeted Attacks – specifically designed to penetrate a particular organization, and focus on gathering specific information. | Used to gather information with monetary value for example, customers personal information. Name, address, phone numbers, and social security numbers. | | Privacy Threats - That puts both personal data at risk and raises bigger questions about the proper use of aggregated data companies use for promotional purposes. | The internet allows users to bank, shop, and socialize online which requires users to disclose customer information putting personal data at risk | | Fake Security Certificates - cybercriminals have been able to issue fake certificates for their malware using so-called self-signed certificates, and they have also been able to successfully breach the systems of various CAs and use stolen certificates to sign their code. | Make a fake website seem like it is a legit service | | Mobile Malware – about 90% of mobile malware is targeted toward Android based devices. Android is widely used, easy to develop for, and users of Android are able to download apps from anywhere they choose. On the other hand, iOS is a closed file system, allowing the download and use of apps from just a single source, the App Store. | Customer using their mobile devices to store their loyalty card must be aware that mobile phones are also targets for...

Words: 327 - Pages: 2

Premium Essay

Security

...Security Students Name Institutions Name How to resolve a security issue in a situation where the need for security is great but the available funds are limited Community participation is a very important aspect in enhancing security. Through the community’s leaders individuals can be sensitized on the need to protect each other and also help them to create a ‘we’ feeling in the management of the important resources in a region. This will enable the community members to identify with the resources and wealth of a region and hence strive to protect it by all means. Governments and administrative officials should also involve the locals in making of decisions that are of utmost importance to the people’s welfare (Bakari, Magnusson, Tarimo, & Yngström, 2006). The benefits if personnel in security management develop skills as educators for their organization's security Having high skilled employees who are given the potential to grow their expertise is a great benefit to any organization. An organizations success can often be attributed to individual expertise and skills of its employees. The benefits are as follows: 1. Cuts on the costs of hiring external consultants; many organizations spend a lot of money in hiring third party consultants to cover essential tasks within the organization such as periodic network vulnerability scans and developing security programs. The cost of sending employees to the requisite training may be relatively cheaper (McCoy & Fowler...

Words: 1066 - Pages: 5

Premium Essay

Security

...Security is an intentional process of securing anything from expected jeopardy. It is a condition in result of various protective measures. There are different aspects of security that ranges from personal life to national security. This is a separate department in large managements.   This is a condition that prevents unauthorized information or people from having access to confidential or personal areas. Writing on this subject matter might not be difficult but writing well is surely. It’s not simple to comprehend a professional paper on such a diverse subject. It has various categories and concepts which need to be researched and studied properly to write an ample document.   Our company has been writing security term papers since long and it has experienced writers who know their job very well. Physical security, information security, computing security, financial security, human security or food security, writers at our company are skilled enough to produce highly authentic term papers on any one of these categories of security. No matter how difficult topic you have for your term paper we guarantee you quality in any case.   Writers at our company follow your given specifications keenly to produce desired papers. With us you don’t need to worry about the quality of your term paper because excellence is never compromised at our company. Just place your order with us and experience it yourself.   Services provided by our company include:   ...

Words: 295 - Pages: 2

Premium Essay

Security

...White Paper IT Security Risk Management By Mark Gerschefske Risk Analysis How do you predict the total cost of a threat? Is it only the cost to restore the comprised system and lost productivity? Or does it include lost revenue, customer confidence, and trust of investors? This paper provides an overview of the risk management process and its benefits. Risk management is a much talked about, but little understood area of the IT Security industry. While risk management has been practiced by other industries for hundreds of years, little historical data exists to support qualitative analysis in the IT environment.1 The industry approach has been to buy technology without really understanding the potential underlying risks. To further complicate matters, new government regulations create additional pressure to ensure sensitive data is protected from compromise and disclosure. Processes need to be developed that not only identify the sensitive data, but also identify the level of risk posed due to noncompliance of corporate security policies. Verizon has developed security procedures based on industry standards that evaluate and mitigate areas deemed not compliant to internal security policies and standards. Through the use of quantitative analysis, Verizon is able to determine areas that present the greatest risk, which allows for identification and prioritization of security investments. Risk Mitigation Process The Risk Mitigation Process (RMP) is a part of risk management...

Words: 2021 - Pages: 9

Premium Essay

Security

...above to submit your assignment. Term Paper: Chief Security Officer Due Week 10 and worth 200 points You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that all information and data assets are not compromised. Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders. Write a 8-10 page paper in which you: Research the Internet for recent computer hacker attacks or other crimes that have been committed against higher educational institutions. Analyze the processes put in place by other higher education institutions in order to prevent these crimes from reoccurring. Recommend processes, methodologies, or technology that can be purchased to lower computer crime threats. Include specifics on pricing and the level of support and maintenance that would be required. Research the Internet for current laws and government agencies that exist in your region that address the threat of computer cyber-crimes. Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your security operations. Research the internet for computer forensics...

Words: 317 - Pages: 2

Free Essay

Security

...Raymond D. Jambalos BSIT Physical Security measures every organization should take Lock up the server room Even before you lock down the servers, in fact, before you even turn them on for the first time, you should ensure that there are good locks on the server room door. Of course, the best lock in the world does no good if it isn’t used, so you also need policies requiring that those doors be locked any time the room is unoccupied, and the policies should set out who has the key or keycode to get in. Set up surveillance Locking the door to the server room is a good first step, but someone could break in, or someone who has authorized access could misuse that authority. You need a way to know who goes in and out and when. A log book for signing in and out is the most elemental way to accomplish this, but it has a lot of drawbacks. A person with malicious intent is likely to just bypass it. A better solution than the log book is an authentication system incorporated into the locking devices, so that a smart card, token, or biometric scan is required to unlock the doors, and a record is made of the identity of each person who enters. A video surveillance camera, placed in a location that makes it difficult to tamper with or disable (or even to find) but gives a good view of persons entering and leaving should supplement the log book or electronic access system. Surveillance cams can monitor continuously, or they can use motion detection technology to record only when...

Words: 1226 - Pages: 5

Premium Essay

Security

...Project Part 1 Multi-Layered Security Plan | NT2580 | | James Maus | 8/21/2015 | In the process of emerging a mulit-layered security plan, you will need to see the seven domains of the IT set-up. The security will be increased on each of the domains. Security increase on the seven domains increases complete security of the system and build a mulit-layered security plan. Only the users can negotiate the system in the user domain. Easy passwords can cause a lot of problems so we will need to use difficult passwords with eight characters and up. Passwords will include special characters with capitals and lowercase. A limit to how long you can use the password and to only a one time password use. Workstations will have antivirus and malware protection installed. Since laptops are very weak and easy to get lost or stolen, the companies will have a converted hard drive so only the owner can recover the data. On the LAN domain, you should never open any scam emails when on company systems. To reduce email malware, you should add spam filters to stop junk email and reduce employee mistakes. On the LAN to WAN domain, we should switch the FTP to secure FTP so only our suers can have access to the FTP server. On the WAN domain there should be firewalls put in place on the network to filter inbound traffic. In the case of the Richman investments, network of\ any kind of traffic that is coming in and out is not needed will be stopped by a firewall. Reference Courtesy of...

Words: 444 - Pages: 2

Premium Essay

Security

...Recruiting and Selecting Quality Security Employees for security job position Contemporary Issues in Security Management Abstract For years, recruitment and hiring methods have been deemed by dated by human resource managers but are realizing that different strategies and methods are need to attract millennials. Hiring qualified personnel has become an essential component in an organization foundation. This paper will explore multiple articles that provide techniques on how to recruitment and hire candidates from college graduates, apprentices, and novices to the security profession and presents key components of innovative approaches and traditional human resource techniques, and training policies that will meet any small or large business goal of highly hiring qualified candidates. In addition, it will highlight techniques, practices and, lessons learnt in enhancing a company’s ability to attract, hire, retain, and improve human resource practices, improve human resource development and human resource capabilities in today’s security career field. Keyword: Employees, Hiring, Human Resources (HR), Security Recruiting and Selecting Quality Security Employees in the security field Currently there is a high demand for security professional specializing Cybersecurity, Personnel Security, Physical Security, and Industrial security and many other security jobs. The issue is attracting, hiring, retaining people that have...

Words: 3616 - Pages: 15

Premium Essay

Security

...Security Students Name Institutions Name How to resolve a security issue in a situation where the need for security is great but the available funds are limited Community participation is a very important aspect in enhancing security. Through the community’s leaders individuals can be sensitized on the need to protect each other and also help them to create a ‘we’ feeling in the management of the important resources in a region. This will enable the community members to identify with the resources and wealth of a region and hence strive to protect it by all means. Governments and administrative officials should also involve the locals in making of decisions that are of utmost importance to the people’s welfare (Bakari, Magnusson, Tarimo, & Yngström, 2006). The benefits if personnel in security management develop skills as educators for their organization's security Having high skilled employees who are given the potential to grow their expertise is a great benefit to any organization. An organizations success can often be attributed to individual expertise and skills of its employees. The benefits are as follows: 1. Cuts on the costs of hiring external consultants; many organizations spend a lot of money in hiring third party consultants to cover essential tasks within the organization such as periodic network vulnerability scans and developing security programs. The cost of sending employees to the requisite training may be relatively cheaper (McCoy & Fowler...

Words: 1066 - Pages: 5

Premium Essay

Security

...Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization. As noted by the Institute for Security and Open Methodologies (ISECOM) in the OSSTMM 3, security provides "a form of protection where a separation is created between the assets and the threat." These separations are generically called "controls," and sometimes include changes to the asset or the threat.[1] Perception of security may be poorly mapped to measureable objective security. For example, the fear of earthquakes has been reported to be more common than the fear of slipping on the bathroom floor although the latter kills many more people than the former.[2] Similarly, the perceived effectiveness of security measures is sometimes different from the actual security provided by those measures. The presence of security protections may even be taken for security itself. For example, two computer security programs could be interfering with each other and even cancelling each other's effect, while the owner believes s/he is getting double the protection. Security theater is a critical term for deployment of measures primarily aimed at raising subjective security without a genuine or commensurate concern for the effects of that measure on objective security. For example, some consider the screening of airline passengers based on static databases to have been Security Theater and Computer Assisted...

Words: 436 - Pages: 2