Write a responce to each given post seperatly

Assignment Help English
Reference no: EM13782863

READ EACH POST AND RESPOND TO EACH SEPERATLY WITH 100-150 WORDS.

YOUR TASK READ AND RESPOND WITH DISCUSSION, RESPOND TO EACH WITH 100-150 WORDS AND 2 REFERENCES. DO THEM SEPARRATLY BUT ON SAME DOC.

Professor:

Please reseach more about information security policies. what information do you believe signifies that Pakistan is one of the greatest security threats to the United States? Regarding how our limited resources our effectively utilized it is important to note that many of the actions we use to fight the war on drugs are applicable to the war on terror. For example the resource we expend on border security have direct applicability to both hence it might not always be necessary to select or earmark what the money is anticipated for use when it has applicability to multiple causes.

Minera:

An information security policy is a combination of principles, regulations, methodologies, techniques and tools established to protect the organization from threats. These policies also help organizations to identify its information assets and define the corporate attitude to these information assets.

Information-security risk management is the overall process that integrates the identification and analysis of risks to which an organization is exposed, it provides an assessment of the potential impact on the business, and enables a decision regarding the action to be taken so as to eliminate or reduce the risk to an acceptable level.

Risk is a combination of the threats to one or more vulnerabilities, leading to a negative impact that is detrimental to one or more of the assets, risk management also establishes the basic security elements: assets, owner of the assets, threats, vulnerabilities, risks and measures (Bojanc & Jerman-Blazic, 2013).

Enterprise risk management is a process of managing exposure of uncertainties with emphasis on identifying, controlling, and eliminating or minimizing events that could possibly prevent business goals from being achieved. Identifying and evaluating information assets, completing assessments of the effects of security incidents, and the assessment of a likelihood of successful attacks on information systems, and a business assessment of the costs and benefits of an investment in security solutions (Bojanc & Jerman-Blazic, 2013). The risk-management process usually consists of two main stages: risk assessment, which identifies and evaluates the vulnerabilities and threats for each information asset and calculates the probability of an incident and the loss due to a security incident. The second is the risk treatment, which selects an appropriate treatment for each assessed risk. Then there is the comparison of the selected security measures and an economic analysis of the profitability of each measure.

It will be necessary to find the best relationship between costs and security. The costs of information security are represented by two components that are interconnected: the first is cost of implementing a measure (cost) which is the money an organization spends on an investment with which it reduces the security risk. The second is the costs of the incident (risk). This component increases by increasing the security of the system. Finding the optimum level of security that takes into account the cost of the incident and the costs of the measure is not an easy task. In order to determine the optimum level of information security, a cost benefit analysis is often required. The level of security or the protection you will get depends on how much money you will spend. The budget needs to be adequate, without a proper budget, organizations won't be equipped with sufficient resources to ensure information security, money will bring software, hardware, and consultants to achieve successful implementation of information security.

Personally I do not believe terrorist threats will cease anywhere, it seems there are new cell groups that develop and they target anyone who is not in agreement with how they want to do things, if you are fighting for a cause that is not on their belief you're dead. We see this every day when we turn on the news, the best example is the most recent of heinous crimes being committed by ISIS. The U.S President does not deal with terrorist and will not send money. I don't think we are over reacting or over- prioritizing this fight. We were attacked and now we have to watch over our shoulders at all times, we have to watch what we say and who we say things to. If keeping us protected in our country is an inconvenience then this is the way it should be. The one thing I think could be toned down is the listening in on our conversations that is violating our privacy. It is a shame when you have young people voluntarily going to join terrorists to be taught to kill whoever does not share the same ideals, beliefs or follow their laws.

Terrorism, drug trafficking and other forms of global organized crime are intertwined. Fighting terrorism includes targeting the global drug trade. Terror outfits are looking for financial opportunities to support their operations, the main concern of the United States seems to be the existing and potential links between the drug trade and terrorism. Sullum (2201) put it this way, "going after the illegal drug trade" is what allows terrorists to fund their operations with the artificial profits created by prohibition. He also goes on to say the US $40 - billion or so the United States spends on drug law enforcement represents a subsidy for murderers. This prohibition has contributed revenues to armed criminals around the world, including Bin Laden's organization which has benefitted indirectly from the drug trade by way of the opium money which supports his Taliban hosts in Afghanistan (Sullum, 2001). The war on drugs and the war on terrorism must be conducted simultaneously and Americans should be asking themselves which is scarier: a drug dealer selling an intoxicant to a willing buyer or a terrorist who murders people at random?

References

Bojanc, R., & Jerman-Blazic, B. (2013). A quantitative model for information-security risk management. Engineering Management Journal, 25(2), 25-37.
Sullum, J. (2001, Oct 16). Stop bombs, not drugs: Spending billions going after the illegal drug trade is not only ineffective, it wastes money that could be used more effectively in the war on terror.

Steph:

The information security policies and also the procedures. This is a four step process: The first one will be to identification and also the valuation of the information assets, the second one this is saying that the identification and also the assessment of the threats to the enterprise and also the information assets, the third one is talking about the identification and also the assessments of the vulnerabilities, then the very last one is saying that the determination of the countermeasure that have been and should be deployed, this will also include the cost-benefits and also the analysis of the feasibility of the implementing and also the countermeasure

I really don't think that the terrorist threat will ever stop anywhere, because of the fact that they will target everyone and anyone that isn't in a agreement and this is the way they want to do things. You can also see this kinda stuff on the news in the news papers.

What I found on the drug trafficking is that the terrorism this will be increasingly begin considered and this is also a very serious threat, this is also to state and also global security. Then the terrorism and also the narcotics trade, this has traditionally been treated as two different and also distinct threats and this is within security discourse. But in the 1990's the researchers and also the scholars they started to focus on the increasing association and this is between the organized crime also the terrorist organization. Then after the 9/11 attacks, the international community this will increasingly consider illicit drug trade and also terrorism and the two interconnected phenomena. But the major concerns is that the terrorist organization this can make us of drug trafficking networks and even generate funds for their arms and also equipment. But the U.S Department of the State there are fourteen out of thirty-six foreign terrorist organization they are involved in trafficking narcotics.

Reference no: EM13782863

Questions Cloud

Discuss organizational architecture and corporate culture : Discuss how organizational architecture and corporate culture are related. Use an example of a real-life firm and discuss how its corporate culture blends with its organizational architecture.
Strengths and limitations of this sampling technique : In 2-3 paragraphs discuss the sampling technique you plan to utilize in your research design? What are the strengths and limitations of this sampling technique
Developing an adt with overloaded operators : The purpose of this assignment is to practice developing an ADT with overloaded operators and separate compilation. For this project we will be developing an ADT for integers.
What skills does a non-legal person need as an employee : Consider how the world of business interacts with the legal realm. What skills does a non-legal person need as an employee
Write a responce to each given post seperatly : RESPOND TO EACH SEPERATLY WITH 100-150 WORDS. ATTACHED IS A SHORT DOCUMENT THAT YOU SHOULD READ AND IT WILL HELP YOU AGUE AS YOU RESPOND.
Discuss if telemedicine is viewed as a necessary reaction to : Discuss if telemedicine is viewed as a necessary reaction to a competitive threat or a new source of revenue?
What damages may she recover from johnny : Frida agrees to sell a car to Johnny for $900. However, Johnny reneges on the written contract. Frida is able to find another buyer for the car at $700. What damages may she recover from Johnny
Assignment on corporate cultures : Based on your research, and in your words, describe what you think about the culture of the company. Would you like to work for this company? Why or why not?
Discuss the interrelationship between vabes andbehavior in : Discuss the interrelationship between VABEs andbehavior in the Rational Emotive Behavior (REB) model.

Reviews

Write a Review

English Questions & Answers

  Problem of obesity in america

Explore a specific issue related to the selected topic to develop a thesis statement and supporting ideas and specific details for your essay's content. Consider your purpose as you plan your essay. The purpose of your essay may be to evaluate (argue..

  Describe what global diversity means to youwhat is the

describe what global diversity means to you?what is the difference between traditional and non-traditional student?to

  What techniques for narration andor description outlined in

what techniques for narration andor description outlined in your text did you find in the essay on the death of my

  Question-which of the following can be hd as a disadvantage

question-which of the following can be ?h?d as a disadvantage of managed-care systems?huge amount of paperwork for

  Write a final report of between 1-2 pages that assesses

write a final report of between 1-2 pages that assesses your performance as a business ????er in this course. include

  While valuation analysis is a quantitative exercise

While valuation analysis is a quantitative exercise, there are a number of judgements that the analyst must make in constructing the valuation.Identify, prioritise, and discuss the most important analytical choices in terms of their impact on the out..

  Definition of science fiction

What is the main problem James sees in most definition of science fiction - Definition of science fiction

  What was your impression of the career prior to interview

What was your impression of the career PRIOR to the interview? What assumptions did you have about that career? How did the interview go? Reflect on comfort level, interaction in the interview, time allotted, etc.

  Recognize three external barriers to innovation propose two

identify three external barriers to innovation. recommend two actions on either a governmental or company level to

  Write a paper on kindred by octavia e butler

Write a paper on Kindred by Octavia E. Butler.

  Warmer lead in presentation in a suitable context and

how would you teach the form lsquobe going to infinitive used for future plans to a pre-intermediate class?outline

  Like any other endeavor that combines hardnosed factual

like any other endeavor that combines hardnosed factual analysis and creative freethinking the task of writing business

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd