Featured Post

Tres Zapotes (Mexico) - Olmec Capital City in Veracruz

Tres Zapotes (Mexico) - Olmec Capital City in Veracruz Tres Zapotes (Tres sah-po-tes, or three sapodillas) is a significant Olmec archeol...

Saturday, January 25, 2020

Examining The Concept Of Physical Security Information Technology Essay

Examining The Concept Of Physical Security Information Technology Essay INTRODUCTION THE concept of physical security has evolved over time from history to the present day, and has impacted on the tactics used in modern day security. This is evidence in the well defined physical security strategies employed in the military defense structures of the ancient empires and colonies in which the soldiers served as a form of intrusion detection and the access into the city walls were made through the city gates, while the city walls served as perimeter protection and access control. This is also evidence in the nineteenth century fortress and royal castles. Throughout recorded history, man has needed to feel safe and secure. The philosophy of physical security remains the same but the technology varies in application over the years. The security of an organizations resources and sensitive information is very vital to its existence and business continuity. The physical and environmental security domain examines the vulnerabilities, threats, risks and countermeasures that can be taken to physically secure the organization and its assets. In other words, physical security mechanism involves the physical measures designed to protect people, data, infrastructures, equipments, system and information pertaining to an organization. Thesis statement In this term paper, one of the commonly used approaches in physical security program development will be examined. The approach to be examined is known as the crime prevention through environmental design (CPTED). It should be noted that the level of security required in an organization will vary from facility to facility depending on risk assessment and threat analysis of such organization. In essence, it is important for the organization to conduct a detailed risk analysis by understanding the common threat to the facility, identifying the threats and ultimately ensure proper countermeasures are implemented. Body of the term paper Most professionals in the field of information security do not think so much about physical security as they do about computer and network security and associated viruses, hackers, and technology-orientated countermeasures. Therefore the need arise for a security professional to view security from a broad perspective because danger can come from anywhere, taking any shapes and different formats which can result into different level of severity in terms of damage. Physical security has a different set of vulnerabilities, threats, and countermeasures as compared to computer, network or information security. Physical security focuses on protecting all the personnel and assets of the organization and also the enhancement of productivity, the AIC security triad will enhance the availability of company resources, the integrity of the assets and environment and finally the confidentiality of the data and business processes. The objectives of the physical security program largely depend on the desired level of protection required for different assets of the organization, which is also determined by the organizations acceptable risk level. The threat profile of the organization including the laws and regulations with which the organization must comply dictates the acceptable risk level of the organization. In other words, the objectives of physical security should address crime and disruption prevention through deterrence (e.g. the use of fences, security guards), reduction of damage through the use of delay mechanisms (e.g. physical locks, barriers, security personnel), crime or disruption detection gadget (e.g. smoke detectors, CCTV), incident assessment (e.g. response to detected incidents and determination of level of damage) and finally the response procedures (e.g. the emergency response process in place, the fire suppression mechanism in the advent of fire). These objectives form the basics of the layered defense model on which the physical security is implemented. The layers are implemented at the perimeter of the facility and moving towards the primary assets of the organization. In essence, as much as the organization tries to prevent crimes and disruption from occurring, there should also be necessary plans in place to deal with them when they do happen. The major threats that contend with physical security are theft, physical damage, compromised system and environment integrity, interruption to services and unauthorized access. Threats faced by organizations can be classified under different categories namely (i) Natural environmental threats examples include floods, earthquakes, fire and so on. (ii) Supply system threats such as power distribution outrages, communication interruptions and interruption of other natural energy resources, examples include water, steam, gas and so on. (iii) Manmade threat such as vandalism, theft, fraud, unauthorized access, employee errors and accidents, just to mention a few. (iv) Political motivated threats such as strikes, riots, civil disobedience, terrorist attacks and so on Crime prevention through environmental design (CPTED) remains one of the commonly used physical security approaches. It is described as a multi-disciplinary approach to deterring criminal behavior through environmental design [3]. It is also commonly known as proactive crime prevention environmental design strategy utilized by planners, police services, architects and security professionals. The concept used in CPTED is built upon the effect a proper design of a physical environment can have on human behavior in relation to crime rate in such environment. This approach provides guidance in crime prevention by putting in place proper facility construction and well designed environmental components. The CPTED strategies were developed midway into the twentieth century and have evolved and matured along with our environments and crime rates and types. Overtime, this approach was not only used in corporate organizational security programs but also implemented in large scale development projects such as cities, towns and neighborhoods. An effective design or problem solving environmental design begin by evaluating the purpose of the designated space, how the space is defined and considering how well the physical design support the intended function of the space. In effect, the crux of CPTED is that the physical environment can be manipulated to create behavioral changes that will reduce or eliminate crime and the fear of crime and improve quality of life. It places emphasis on physical environment, productive use of space, and behavior of people to create environments that are void of environmental cues that can result into opportunities for crime to occur [4]. It is can be considered as a social engineering tool that can be used for security, which encompasses the physical, social, psychological needs of the users in different types of environments which can be used to predict behaviors of these users and that of the likely offenders [2]. In other words, CPTED strategies rely upon the ability to influence offender decisions that precede carrying out criminal acts. It brings to mind that if a site is well laid out, the likelihood of it being targeted for a crime may be reduced. There are four major strategies used in CPTED to increase the overall protection include natural access control, natural surveillance, territorial reinforcement and maintenance. Natural Access Control The natural access control serve as a guide for the movement of people in and out of a facility such as placements of doors, fences, lighting and in some cases landscaping to deny admission to a crime target and to create awareness among offenders that there is a risk in selecting the intended target. The use of physical and mechanical means of access control locks, bars and alarms can supplement natural access control if need be. Natural Surveillance The natural surveillance is a concept purposely designed at keeping intruder under observation. It entails the use and placement of physical environment features, personnel walkways and design of activity areas in such a way as to maximize visibility. The physical design of the facility and proper placement of windows, lightings and landscaping increases the ability of those within the vicinity to observe intruders as well as regular users, and thus gives the opportunity to challenge any irregularities or inappropriate behavior [5]. The goal of natural surveillance is to eliminate criminal activities by providing an open and well designed environment and thereby making it uncomfortable for potential criminals to operate. It maximizes the potential to deter crime by providing a good visual connection across the facility. Territorial Reinforcement Territorial reinforcement can be accomplished through the use of walls, lighting, flags, clearly marked addresses and fences. The goal of territorial reinforcement is to create physical designs that emphasize the companys area of influence to give legitimate owners a sense of ownership and a dedicated community, which makes the employees have a sense of belonging and a willingness to defend if required to do so. Maintenance Proper care and maintenance is needed for continuous use of the space for its intended purpose. Deterioration indicates less concern and control by the intended owners (organization) of the site and further indicates tolerance of disorder thereby defeating the purpose of the CPTED. It should however be noted that CPTED is not the same as target hardening. The main focus of target hardening is to deny access through physical or artificial barrier, which in most cases lead to restriction in use, enjoyment and aesthetics of the environment. Most corporate organizations use a mix of both CPTED and target hardening approaches. Conclusion The broad nature of CPTED approach and its implementation in any facility setting enables it to adapt to different physical security design which shows it is an effective approach to prevent crime. Therefore including it from the construction stage will make the facility safer from the onset, rather than wait until crime problems occur before implementing the CPTED approach. For future work, I propose that more research be done on individual components and effects in various business settings. Acknowledgment This paper has written under the kind feedback of Mr. Francis Gichohi. I am thankful to him for his support and dedication to his students.

Friday, January 17, 2020

Infamous Robber on Loose

He has successfully escaped from prison three times and this is his fourth escape from his past few years. One of the guard witnessed that Gladden had escaped by breaking through the timber ceiling and lowering himself to the ground with a rope fashioned from bed sheets. The other guards said that he had been hit by Gladden, when trying to go after him. When the other guards came, Gladden was too fast to catch, even though they brought their dogs to track and hunt him. Gladden is an infamous American robber, burglar and thief.He was born into a poor family; he was apprenticed as a self-employer in tool supplier but took to theft and burglary in 2007, with little more than a year of his training to complete. He was arrested and imprisoned 4 times and escaped; making him an infamous public figure. When he was 6, his father died and no one continued his father Job's as a tool supplier. His mother then sent him to an elementary school. Gladden was treated badly and therefore became irres ponsible and brutal. He was never graduated from the school, so his mother took him back home, and let him continue his father's work .His business was not running well. He started his crime by robbing a woman in the market and stabbing her to death, because she did not want to give him her bag. He Is a small man, only 6'0†³ tall and medium built, but deceptively strong. He has a pale face with large, green eyes, a wide mouth, and a quick smile and has thick black hair. If anyone sees him, please report and call 333. He Is very dangerous person, whoso armed with handguns and a 9 millimeter rifle. There is a reward $50000 for Information leading directly to the arrest of John Stuart Gladden

Thursday, January 9, 2020

MBA Career Opportunities by Field of Study

An MBA (Master of Business Administration) degree opens up a wide variety of career opportunities, depending on the specialty you choose. Nearly every industry imaginable has the need for someone with an MBA. The type of job you can get will depend on your work experience, your MBA specialization, the school or program you graduated from, and your individual skill set. MBA Careers in Accounting MBA students who specialize in accounting could choose to work in public, private, or government accounting careers. Responsibilities may include managing accounts receivable or accounts payable departments and transactions, tax preparation, financial tracking, or accounting consultancy. Job titles may include accountant, comptroller, accounting manager, or financial accounting consultant. MBA Careers in Business Management Many MBA programs offer only a general MBA in management without further specializations. This inevitably makes management a popular career option. Managers are needed in every type of business. Career opportunities are also available in specific areas of management, such as human resources management, operation management, and supply chain management. MBA Careers in Finance Finance is another popular option for the MBA grad. Successful businesses always employ people who are knowledgeable about various areas of the financial market. Possible job titles include financial analyst, budget analyst, finance officer, financial manager, financial planner, and investment banker. MBA Careers in Information Technology The information technology field also needs MBA grads to oversee projects, supervise people, and manage information systems. Career options can vary depending on your MBA specialization. Many MBA grads choose to work as project managers, information technology managers, and information systems managers. MBA Careers in Marketing Marketing is another common career path for MBA grads. Most large businesses (and many small businesses) use marketing professionals in some way. Career options could exist in areas of branding advertising, promotions, and public relations. Popular job titles include marketing manager, branding specialist, advertising executive, public relations specialist, and marketing analyst. Other MBA Career Options There are many other MBA careers, including entrepreneurship, international business, and consulting. The MBA degree is highly respected in the business world, and if you network properly, update your skills regularly, and stay abreast of the industry you are interested in, your career options are virtually endless. Where to Find MBA Careers Most quality business schools have a career services department that can assist you with networking, resumes, cover letters, and recruiting opportunities. Take full advantage of these resources while you are in business school and after graduation. Online sites specifically dedicated to MBA graduates are another good source for your job hunt. A few to explore include: MBACareers.com - A place to search for jobs, post a resume, and explore career resources.MBA Highway - Provides online networking community, job search resources, and a job search engine powered by Indeed.The Best Consulting Firms for MBAs - A list of ThoughtCos best places to work as a consultant using your MBA degree. MBA Career Earnings There is really no limit to what you can earn throughout an MBA career. Many jobs pay in excess of $100,000 and allow for opportunities to earn bonuses or additional income. To determine average earning for a specific type of MBA career, use a Salary Wizard and enter the job title and location.

Wednesday, January 1, 2020

20 Most Famous Quotes From the Roman Poet Ovid

Ovid, born Publius Ovidius Naso, was a Roman poet best known for his epic work, Metamorphoses, his love poems, and his mysterious banishment from Rome.   Metamorphoses is a narrative poem comprised of 15 books and stands as one of the most important works of classical mythology. It recounts the history of the world from the creation of the universe up until the life of Julius Caesar by telling over 250 myths.   Born to a well-to-do family in 43 BCE, Ovid pursued poetry despite his father’s hopes that he would delve into law and politics. The young man made a wise choice. His first book, Amores (The Loves), a collection of erotic poems, proved an instant success. He followed that with two more impressive collections of erotic poetry,  Heriodes  (The Heroines), Ars Amatoria (The Art of Love), and a number of other works.   Sometime around 8 CE, Ovid was exiled from Rome by Emperor Augustus and his books were ordered removed from Roman libraries. Historians are not certain what the writer did to offend the rules, but Ovid, in a poem called Epistulae ex Ponto, claimed  that â€Å"a poem and a mistake† were his undoing. He was sent to the Black Sea city of Tomis in what is now Romania. He died there in 17 CE. Whatever his crimes, his work endures and he ranks among the most important and influential poets of his time. Here are 20 of his most famous quotes on love, life, and more. Keeping an Optimistic Outlook Be patient and tough; someday this pain will be useful to you. /  Dolor hic  tibi  proderit  olim There are a thousand forms of evil; there will be a thousand remedies. On Bravery The gods favor the bold. Courage conquers all things; it even gives strength to the body. On Work Ethic   He who is not prepared today will be less so tomorrow. /  Qui  non  est  hodie  cras  minus  aptus  erit Either do not attempt at all or go through with it. A burden which is done well becomes light. /  Leve fit, quod bene  fertur,  onus   Take rest; a field that has rested gives a bountiful crop. The workmanship surpassed the subject matter. /  Materiam  superabat  opus   Dripping hollows out a rock. /  Gutta  cavat  lapidem   On Love To be loved, be lovable. Every lover is a soldier and has his camp in Cupid. /  Militat  omnis  amans  et  habet  sua  castra Cupido Wine gives courage and makes men more apt for passion. Everyone is a millionaire where promises are concerned. General Words of Wisdom It is art to conceal art. /  Ars est  celare  artem Often the prickly thorn produces tender roses. /  Saepe  creat  molles  aspera  spina  rosas We are slow to believe that which if believed would hurt our feelings. Habits change into character. In our play we reveal what kind of people we are. He who has lived in obscurity has lived well. /  Bene  qui  latuit  bene  vixit