24 Jul This is assignment is a two part questions. Each question needs
This is assignment is a two part questions. Each question needs to be addressed in 400-500 words.PART1Internal Threats and CountermeasuresCyber-attacks offer the ability to obliterate and interrupt an organization’s communication channels, security data center and facility remotely. Indeed, private and public organizations are often interlinked; hence, data breaches effect damaging impact on the organization’s confidence in protecting the economy and innocent citizens. Today, there is a crisis about organizations’ inability to resolve the age-old problem of how to control the abuse of trust and confidence given to authorized officials to freely logon onto the organization’s system, Many such officials , turn around to betray the organization by committing cybercrimes.Vulnerability stems from interactions and communications among several system components and categorized as deficiency, weakness and security cavity on network data center. To what extent do internal threats constitute a key factor against any organization’s ability to battle insider threats caused by people who abuse assigned privilege? What is the most effective mechanism for organizations to combat internal threats? Why should disgruntled employees must be trained on the danger of throwing wastepaper and electronic media in a bin within and outside the facility?Internal threats and countermeasures are isolated occurrences where most activities involve direct connection to the Internet for global interaction, digital communication and transmission. The preeminent method to mitigate internal threats is to equip users with ready-to-act traditional approach. As a result of the sophistication of our modern-day culprits, over-all reliance on employees, increasing credo that authorized users are predictable agent in the fight against internal threats. Internal threat operators often use psychological moralities and procedures to navigate or circumvent security restrictions through persuasion and psychosomatic principles. Criminals use crafty manipulation techniques to sway users into divulging confidential information, such as, usernames, passwords, bank information, house and office alarm codes to take control over organizations’ security centers. Historic channel to internal threats and countermeasures are categorized into employee’s theft, pilferage, embezzlement, fraud, stealing, peculation and defalcation. Most organizations often ignore to establish and adopt on-board ecological waste management action plans to deal with discarded materials, shredded left-over documents, magnetic media and placing fragments in isolated location as countermeasure process.Today, there is a crisis about organizations’ inability to resolve the age-old problem of how to control the abuse of trust and confidence given to authorized officials to freely logon onto the organization’s system, Many such officials , turn around to betray the organization by committing cybercrimes. Vulnerability stems from interactions and communications among several system components and categorized as deficiency, weakness and security cavity on network data center. To what extent do internal threats constitute a key factor against any organization’s ability to battle insider threats caused by people who abuse assigned privilege? What is the most effective mechanism for organizations to combat internal threats? Why should disgruntled employees must be trained on the danger of throwing wastepaper and electronic media in a bin within and outside the facility? PART2ObjectiveThe culture of external threats and countermeasures (ETC) is an overriding factor for public and private organizations in our generation. The ETC consist of a set of threats such as matchless combination of terrorizations and countermeasures. Organizations are strongly urged to establish comprehensive mechanism to mitigate external threat and countermeasures. However, failure to do so can lead to the creation of adverse effects on organization’s data and assets. In all dimensions, external threats can exist without risk, but risk cannot exist without a matching threat and conforming action. The ETC often derives its strength from these four demographic factors; deterrence, detection, denial and perimeter security.Deterrence Deterrence is designated to dissuade potential violators from launching threats and criminal acts against organizations. Aura Security in physical security is often heightened by security professional measures such as signs placed along perimeters near openings of the facility. Aura security strives to create strong psychological deterrent warning offenders and keeping them away from the facility. Most deterrence has very limited or no physical security mechanism. DetectionThis is an apparatus used in most facilities to detect perpetrators. They include devices such as closed-circuit television (CCTV), intrusion sensors, duress alarms, weapons screening imaging machines and protective dogs. Traditionally, these devices are installed to identify violators upon arrival in the facility.DenialDeny is crucial component of physical security items codenamed target hardening: They include steel doors, safe deposits and frequent banks deposits of available cash which often help to deny perpetrators access to the facility. Perimeter SecurityNaturally, a building access points such as outer boundary and boundary line is the first line of defense against perpetrators of any property. In addition, Perimeter Security is entrenched with a psychological impact on offenders. Two components of perimeter Security include natural and human barriers. natural barriers are closely related to rivers, hills, foliage, fences, and steel doors; while. human barriers include security officers who are designated to scrutinize individuals entering and leaving to the facility. Deterrence is designated to dissuade potential violators from launching threat and criminal acts against organizations. Aura Security in physical security is often heightened by security professional measures such as signs placed along perimeters near openings of the facility. Aura security strives to create strong phycological deterrent warning offenders and keeping them away from the facility. Deterrence has very limited or no physical security mechanism and Detection apparatus is used in most facilities to detect perpetrators. Such devices include devices closed circuit television (CCTV), intrusion sensors, duress alarms, weapons screening devices and protective dogs. Traditionally, these devices are installed to identify violators upon arrival in the facility. The university president is very concerned about external threats. What countermeasures such as deterrence or detection must be implemented on campus to enhance student, faculty and staff security?APA Formatting and plagiarism report are must.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.