StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Concept of Security - Essay Example

Summary
The writer of the paper “Concept of Security” states that a number of aspects of justice along with crime might possibly be incorporated in a broad description of security policy. The paper has mainly concentrated on the four realms of security: IT, political, physical, and monetary realm…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful

Extract of sample "Concept of Security"

Security Name: Institute: Security Introduction Security according to Newman (2010) is the level of opposition to, or defence from, damage, and it is applicable to any susceptible as well as precious asset, like an individual, residence, society, country, or institute. Insight of security could be inadequately mapped into an objective safety measures that can be measured. For instance, the seismic activity terror has been accounted to be more widespread as compare the terror of falling on the floor of the bathroom even though the latter takes life of many people as compared to the former. Equally, the alleged efficacy of security measures is from time to time distinct from the real security offered by such measures. According to Mitzen (2006), the existence of safety measures could even be seen as security itself; for instance, two installed security programs in the computer can be intrusive with each other to the extent that they can even cancel effect of each other, whereas the user thinks he/she is receiving twofold security. The big question is what does security denote? This study will seek to offer an insight pertaining to the real meaning of security, with nearly all argument based on the security realms. Discussion Arguably, acuity of security can heighten intended security when it influences or daunts malevolent activities, as with security measures, visual signs like video surveillance, in a house. Given that a number of burglars will resolve not to attempt to force an entry to such a house, Ma, Johnston, and Pearson (2008) think that there can be smaller amount harm to windowpanes as well as security of costly items inside. Devoid of such classified ad, a burglar may, for instance, move toward an automobile, smash the windowpane, and after that run away in reaction to the triggered alarm. Either way, maybe the automobile itself as well as the items within are not stolen, however, with seeming safety measures even the automobile windows have an inferior possibility of being broken. Presently, there is a vast literature based on the categorization as well as analysis of security. Fraction of the rationale for the existence of such literature is that, in nearly all security systems, the feeblest connection in the sequence is the vital. According to Olusegun and Ithnin (2013), the state of affairs is asymmetric given that the backer has to protect all attack points whereas the assailant must only spot one weakness at which to focus. Security can be categorized into four realms: Information technology (IT) realm such as network security, data security, computing security, application security, and, information security; Physical realm such as Airport security, food security, infrastructure security, and supply chain security; Political realm like public security, human security, international security and homeland security; and finally monetary realm such as financial security (Voss, Whipple, & Closs, 2009). Security Policies Security policy concerns have been a subject of concern for over a decade. Arguably, there is no constitutional meaning of national security that depicts the extent of the organization as presently comprehended (Malesic, 2009). Basically, Continuity of government operations is an aspect of security that depicts the initiatives and programs utilized to make sure that governing bodies can recuperate from an extensive array of possible operational disruptions. In this regard, security policy with regards to continuity planning could be seen as a course that fits in preparedness abilities, which entails response strategies for the agency, worker training, recuperation strategies, as well as the standard operations continuation. Such activities according to Shinoda (2009) are rooted partly to guarantee the preservation of civil power, support provision for victims of an occurrence, infrastructure maintenance, along with other activities in recovery support. Debatably, any response to emergency assumes the subsistence of a continuing, practical government to support, finance, and supervise recovery endeavours. This policy has long been effective and has always been successful. Food security According to Pinstrup-Andersen ands Herforth (2008), foods could be purposely contaminated for reasons of deceit, terrorism, or other detrimental purpose. For this reason, security introduced policies that were intended to offer food safety, and protect foods against accidental contaminants, like pesticide residues or communicable micro-organisms. Ever since the 9/11 terrorist attacks, security in most countries have focused more on food security, especially on the food supply safety from purposeful or deliberate acts of interference or contamination (Qi, Liu, Liu, & Yao, 2013). Evidently, extensive food-borne epidemics can make a lot of people sick, and also sales of contaminated commodities consumed by the public can lead to suffering. A deliberate occurrence of food contagion, particularly when perceived as a terrorism act, can have solemn fiscal significances, so the security policy for food defence has been successful owing to the fact that there has been no occurrence of such. Terrorism Presently, terrorism is still an international threat that presents risks to worldwide concerns originating from and attested in both the domestic and international setting. Essential to security attempts to deal with international terrorism are steps followed to identify, prevent, and overpower terrorists (Malone, 2004). Whereas knowing that many other terrorist groups could be yearning to damage worldwide security concerns, security policy has principally concentrated on handling terrorist threats, its allied institutes, as well as supporters to its aggression-established philosophy. Experts are of the view that instead of attempting to directly battle all terrorist groups irrespective of whether they have the intention or means to show aggression to U.S, President, the national security counterterrorism policy should concentrate much on terrorists as well as its supporters. Comprehending how terrorists continue to develop into an international body with varied set of abilities as well as actors is vital in formulation of effective calculated policy and managing its effectual accomplishment: thus, it there is need for improvements on counterterrorism and security management policy. Cyber Security Cybercrime is a threat posed by unreliable or criminal actions of computer users manipulating the widespread utilisation of computer networks. According to Guinchard (2011), cybercrime pose a serious threat to the security, integrity and quality of enterprise data systems; thus, makes the establishment of efficient security methods as a top preference. Pacek (2012) posits that most computer crimes entail criminal activities that are custom in nature such as defamation, forgery, fraud, and mischief. Consequently, computer abuse has generated a scale of novel age crimes that can be addressed only by the information technology act, 2000, which group’s cybercrime into two categories: crimes promoted by computer devices or networks and crimes that aim computer devices or networks. For instance, crimes that fundamentally target computer devices or network include computer virus, malicious and malware code, and denial-of-service attacks. On the other hand, crimes that usually manipulate computer devices or network would entail identity theft and fraud, phishing frauds, cyber stalking, and information warfare. Based on the modern enterprise complexity, Davis, Garcia, and Zhang (2009) assert that their dependence on technology and the increased interconnectivity among companies, which is both an outcome and a steer of e-commerce; there is rapidly evolving progressions that generate widespread opportunities for fraud and theft both inside and outside the organisation. According to Pacek (2012), with the advancement of e-commerce, both internal and external transgressors can manipulate custom susceptibility in seconds; additionally, they can exploit a new weakness in the hardware or software architecture that now form most organization backbone. As businesses progress as well as partner, systems become more complex and less reliant on human involvement. Thus, supervising individual behaviour has become more difficult, and susceptibility to electronic crime advance, as businesses are increasingly integrated to, and dependable on systems and individuals that they do not directly regulate. Davis, Garcia, and Zhang (2009) argue that most organisations are alert to the danger posed by e-viruses such as ‘I Love You’ virus, which generated several viruses and the cost to avert it was estimated to stand at $10 billion. However, many organizations remain ignorant of the extent to which they can be affected by diverse cyber misbehaviour that may source with their partners or employees. According to Guinchard (2011), as enterprises design and purify their e-commerce strategies, they should take into account the issues that affect the information integrity, confidentiality, and availability. In this perspective, they should know how novel risks of e-crime will affect them and how insufficient preparation could leave them exposed to an attack that could easily reduce their business value. Identity Theft Identity theft is a novel crime, promoted by developed and underlying crimes such as counterfeiting, forgery, impersonation, credit and check fraud, and terrorism. Essentially, the heightening application of the internet presents diverse opportunities for manipulation through identity theft, which burglars often use to access web accounts via the internet. Arguably, Dibattista (2006) asserts that the common utilization of the same password heightens the susceptibility whenever such data is; thus, a supplemental security means are needed for verifying the identity. Fundamentally, identity theft is sub-divided into four main categories namely; financial identify theft, which relates to, utilizing another person identity to attain goods and services; identity cloning, which involves using another’s data to assume their identity on day-to-day activities (Bose & Leung, 2013). Another category is commercial identity theft, which entails utilizing another’s commercial identity to attain credit; final category is criminal identity theft, involves posing as another person when arrested for a crime (Bush, 2008). Statistically, report by Identity Theft Resource Centre (ITRC) exhibited that financial theft crimes stood at 78% to become the highest reported cases contrary to other categories. According to Dibattista (2006), combating identity theft requires both managerial and technological resolutions, bearing in mind, the fact that it cannot be achieved easily in a virtual setting since identity authentication; approval and validation are online. Principally, identity theft incidences have heightened significantly in the present internet age, wherein there is a heightening report of assumed identity for criminal and economic activities, and credit theft cards has generated a developing concern for governments, enterprises, and people. Consequently, it has become a crucial and compelling obligation to search technical and managerial solutions to battle identity theft and fraud. How to Improve Systems Security Locking up the server room: is the centre of organization’s physical network, can help keep the systems safer since when an attacker has physical access to the switches, cables, servers, routers, and other systems in that room can cause immense damage (Gansler & Lucyshyn, 2005). Video surveillance camera: is positioned in a place that makes it thorny to interfere with or immobilize provides an excellent sight of incoming and outgoing individuals by enhancing the electronic access system or logbook. Furthermore, surveillance cameras can supervise incessantly, or can employ motion recognition tools to record when someone is moving within the organization. Installing Door Contact Sensors: The system use magnetic circuit breakers that are incorporated at the edge of the door to generate an invisible contact when the user closes the door, in that when a burglar tries to force the door open, the motion cracks the invisible contact amid the system frame and door; thus, activating the alarm (Nazif, Karamouz, Yousefi, & Zahmatkesh, 2013). Furthermore, the system’s detector minimizes installation cost because of its distinctive design, wherein it contains a manageable zone expansion device that radically reduces the entire system cost. Using antivirus and blacklisting: Blacklisting is the best method to protect malicious emails and web links from being viewed by the users is by blocking the IP addresses of websites and email domains (Balzarotti, et al., 2010). Conclusion Conclusively, a number of aspects of justice along with crime might possibly be incorporated in a broad description of security policy. Challenges like military role in enforcement of laws, policing as well as monitoring money transfers, laws based on weapons as well as explosives, human trafficking, along with foreign policy aspects, have consequences for security policy. Basically, security can be defined as the resistance level to mischief, plus it is relevant to any defenceless in addition to helpful entity, like a human being, home, the public, realm, or civilization. The essay has mainly concentrated on the four realm of security: IT, political, physical and monetary realm. References Balzarotti, D., Banks, G., Cova, M., Felmetsger, V., Kemmerer, R., & al., e. (2010). An Experience in Testing the Security of Real-World Electronic Voting Systems. IEEE Transactions on Software Engineering, 36(4), 453-473. Bose, I., & Leung, A. C. (2013). The impact of adoption of identity theft countermeasures on firm value. Decision Support Systems, 55(3), 753–763. Bush, J. L. (2008). Identity Theft: New Challenges. Business Journal for Entrepreneurs, 2008(2), 1-10. Davis, G., Garcia, A., & Zhang, W. (2009). Empirical Analysis of the Effects of Cyber Security Incidents. Risk Analysis, 29(9), 1304-1316. Dibattista, V. M. (2006). Identity Theft: Is Your Security Blanket Tucked In? The Banking Law Journal, 123(4), 316-322. Ditrych, O. (2013). 'International terrorism' in the league of nations and the contemporary terrorism dispositif. Critical studies on terrorism, 6(2), 225-240. Gansler, J. S., & Lucyshyn, W. (2005). Improving the security of financial management systems: What are we to do? Journal of Accounting and Public Policy, 24(1), 1-9. Guinchard, A. (2011). Between hype and understatement: reassessing cyber risks as a security strategy. Journal of strategic security, 4(2), 75-96. Ma, Q., Johnston, A. C., & Pearson, J. M. (2008). Information security management objectives and practices: a parsimonious framework. Information Management & Computer Security, 16(3), 251-270. Malesic, M. (2009). The Renovation of National Security Policies and Systems. Teorija in Praksa, 46(1-2), 85-104. Malone, D. (2004). Terrorism: The United Nations and the Search for Shared Solutions. Journal of Aggression, Maltreatment & Trauma, 9(3-4), lv-lxi. Mitzen, J. (2006). Ontological Security in World Politics: State Identity and the Security Dilemma. European Journal of International Relations, 12(3), 341-370,459. Nazif, S., Karamouz, M., Yousefi, M., & Zahmatkesh, Z. (2013). Increasing Water Security: An Algorithm to Improve Water Distribution Performance. Water Resources Management, 27(8), 2903-2921. Newman, E. (2010). Critical human security studies. Review of International Studies, 36(1), 77-94. Olusegun, O. J., & Ithnin, N. B. (2013). "People Are the Answer to Security": Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization. International Journal of Computer Science and Information Security, 57-64. Pacek, B. (2012). Cyber Security Directed Activities. Internal Security, 4(2), 119-137. Pinstrup-Andersen, P., & Herforth, A. (2008). Food security: achieving the potential. Environment, 50(5), 48-61. Qi, X., Liu, L., Liu, Y., & Yao, L. (2013). Risk assessment for sustainable food security in China according to integrated food security-taking Dongting Lake area for example. Environmental Monitoring and Assessment, 185(6), 4855-4867. Shinoda, T. (2009). Japan's Parliamentary Confrontation on the Post-Cold War National Security Policies. Japanese Journal of Political Science, 10(3), 267-287. Voss, M. D., Whipple, J. M., & Closs, D. J. (2009). The Role of Strategic Security: Internal and External Security Measures with Security Performance Implications. Transportation Journal, 48(2), 5-23. Read More

Security can be categorized into four realms: Information technology (IT) realm such as network security, data security, computing security, application security, and, information security; Physical realm such as Airport security, food security, infrastructure security, and supply chain security; Political realm like public security, human security, international security and homeland security; and finally monetary realm such as financial security (Voss, Whipple, & Closs, 2009). Security Policies Security policy concerns have been a subject of concern for over a decade.

Arguably, there is no constitutional meaning of national security that depicts the extent of the organization as presently comprehended (Malesic, 2009). Basically, Continuity of government operations is an aspect of security that depicts the initiatives and programs utilized to make sure that governing bodies can recuperate from an extensive array of possible operational disruptions. In this regard, security policy with regards to continuity planning could be seen as a course that fits in preparedness abilities, which entails response strategies for the agency, worker training, recuperation strategies, as well as the standard operations continuation.

Such activities according to Shinoda (2009) are rooted partly to guarantee the preservation of civil power, support provision for victims of an occurrence, infrastructure maintenance, along with other activities in recovery support. Debatably, any response to emergency assumes the subsistence of a continuing, practical government to support, finance, and supervise recovery endeavours. This policy has long been effective and has always been successful. Food security According to Pinstrup-Andersen ands Herforth (2008), foods could be purposely contaminated for reasons of deceit, terrorism, or other detrimental purpose.

For this reason, security introduced policies that were intended to offer food safety, and protect foods against accidental contaminants, like pesticide residues or communicable micro-organisms. Ever since the 9/11 terrorist attacks, security in most countries have focused more on food security, especially on the food supply safety from purposeful or deliberate acts of interference or contamination (Qi, Liu, Liu, & Yao, 2013). Evidently, extensive food-borne epidemics can make a lot of people sick, and also sales of contaminated commodities consumed by the public can lead to suffering.

A deliberate occurrence of food contagion, particularly when perceived as a terrorism act, can have solemn fiscal significances, so the security policy for food defence has been successful owing to the fact that there has been no occurrence of such. Terrorism Presently, terrorism is still an international threat that presents risks to worldwide concerns originating from and attested in both the domestic and international setting. Essential to security attempts to deal with international terrorism are steps followed to identify, prevent, and overpower terrorists (Malone, 2004).

Whereas knowing that many other terrorist groups could be yearning to damage worldwide security concerns, security policy has principally concentrated on handling terrorist threats, its allied institutes, as well as supporters to its aggression-established philosophy. Experts are of the view that instead of attempting to directly battle all terrorist groups irrespective of whether they have the intention or means to show aggression to U.S, President, the national security counterterrorism policy should concentrate much on terrorists as well as its supporters.

Comprehending how terrorists continue to develop into an international body with varied set of abilities as well as actors is vital in formulation of effective calculated policy and managing its effectual accomplishment: thus, it there is need for improvements on counterterrorism and security management policy. Cyber Security Cybercrime is a threat posed by unreliable or criminal actions of computer users manipulating the widespread utilisation of computer networks.

Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us