Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask English Expert

READ EACH POST AND RESPOND TO EACH SEPERATLY WITH 100-150 WORDS.

YOUR TASK READ AND RESPOND WITH DISCUSSION, RESPOND TO EACH WITH 100-150 WORDS AND 2 REFERENCES. DO THEM SEPARRATLY BUT ON SAME DOC.

Professor:

Please reseach more about information security policies. what information do you believe signifies that Pakistan is one of the greatest security threats to the United States? Regarding how our limited resources our effectively utilized it is important to note that many of the actions we use to fight the war on drugs are applicable to the war on terror. For example the resource we expend on border security have direct applicability to both hence it might not always be necessary to select or earmark what the money is anticipated for use when it has applicability to multiple causes.

Minera:

An information security policy is a combination of principles, regulations, methodologies, techniques and tools established to protect the organization from threats. These policies also help organizations to identify its information assets and define the corporate attitude to these information assets.

Information-security risk management is the overall process that integrates the identification and analysis of risks to which an organization is exposed, it provides an assessment of the potential impact on the business, and enables a decision regarding the action to be taken so as to eliminate or reduce the risk to an acceptable level.

Risk is a combination of the threats to one or more vulnerabilities, leading to a negative impact that is detrimental to one or more of the assets, risk management also establishes the basic security elements: assets, owner of the assets, threats, vulnerabilities, risks and measures (Bojanc & Jerman-Blazic, 2013).

Enterprise risk management is a process of managing exposure of uncertainties with emphasis on identifying, controlling, and eliminating or minimizing events that could possibly prevent business goals from being achieved. Identifying and evaluating information assets, completing assessments of the effects of security incidents, and the assessment of a likelihood of successful attacks on information systems, and a business assessment of the costs and benefits of an investment in security solutions (Bojanc & Jerman-Blazic, 2013). The risk-management process usually consists of two main stages: risk assessment, which identifies and evaluates the vulnerabilities and threats for each information asset and calculates the probability of an incident and the loss due to a security incident. The second is the risk treatment, which selects an appropriate treatment for each assessed risk. Then there is the comparison of the selected security measures and an economic analysis of the profitability of each measure.

It will be necessary to find the best relationship between costs and security. The costs of information security are represented by two components that are interconnected: the first is cost of implementing a measure (cost) which is the money an organization spends on an investment with which it reduces the security risk. The second is the costs of the incident (risk). This component increases by increasing the security of the system. Finding the optimum level of security that takes into account the cost of the incident and the costs of the measure is not an easy task. In order to determine the optimum level of information security, a cost benefit analysis is often required. The level of security or the protection you will get depends on how much money you will spend. The budget needs to be adequate, without a proper budget, organizations won't be equipped with sufficient resources to ensure information security, money will bring software, hardware, and consultants to achieve successful implementation of information security.

Personally I do not believe terrorist threats will cease anywhere, it seems there are new cell groups that develop and they target anyone who is not in agreement with how they want to do things, if you are fighting for a cause that is not on their belief you're dead. We see this every day when we turn on the news, the best example is the most recent of heinous crimes being committed by ISIS. The U.S President does not deal with terrorist and will not send money. I don't think we are over reacting or over- prioritizing this fight. We were attacked and now we have to watch over our shoulders at all times, we have to watch what we say and who we say things to. If keeping us protected in our country is an inconvenience then this is the way it should be. The one thing I think could be toned down is the listening in on our conversations that is violating our privacy. It is a shame when you have young people voluntarily going to join terrorists to be taught to kill whoever does not share the same ideals, beliefs or follow their laws.

Terrorism, drug trafficking and other forms of global organized crime are intertwined. Fighting terrorism includes targeting the global drug trade. Terror outfits are looking for financial opportunities to support their operations, the main concern of the United States seems to be the existing and potential links between the drug trade and terrorism. Sullum (2201) put it this way, "going after the illegal drug trade" is what allows terrorists to fund their operations with the artificial profits created by prohibition. He also goes on to say the US $40 - billion or so the United States spends on drug law enforcement represents a subsidy for murderers. This prohibition has contributed revenues to armed criminals around the world, including Bin Laden's organization which has benefitted indirectly from the drug trade by way of the opium money which supports his Taliban hosts in Afghanistan (Sullum, 2001). The war on drugs and the war on terrorism must be conducted simultaneously and Americans should be asking themselves which is scarier: a drug dealer selling an intoxicant to a willing buyer or a terrorist who murders people at random?

References

Bojanc, R., & Jerman-Blazic, B. (2013). A quantitative model for information-security risk management. Engineering Management Journal, 25(2), 25-37.
Sullum, J. (2001, Oct 16). Stop bombs, not drugs: Spending billions going after the illegal drug trade is not only ineffective, it wastes money that could be used more effectively in the war on terror.

Steph:

The information security policies and also the procedures. This is a four step process: The first one will be to identification and also the valuation of the information assets, the second one this is saying that the identification and also the assessment of the threats to the enterprise and also the information assets, the third one is talking about the identification and also the assessments of the vulnerabilities, then the very last one is saying that the determination of the countermeasure that have been and should be deployed, this will also include the cost-benefits and also the analysis of the feasibility of the implementing and also the countermeasure

I really don't think that the terrorist threat will ever stop anywhere, because of the fact that they will target everyone and anyone that isn't in a agreement and this is the way they want to do things. You can also see this kinda stuff on the news in the news papers.

What I found on the drug trafficking is that the terrorism this will be increasingly begin considered and this is also a very serious threat, this is also to state and also global security. Then the terrorism and also the narcotics trade, this has traditionally been treated as two different and also distinct threats and this is within security discourse. But in the 1990's the researchers and also the scholars they started to focus on the increasing association and this is between the organized crime also the terrorist organization. Then after the 9/11 attacks, the international community this will increasingly consider illicit drug trade and also terrorism and the two interconnected phenomena. But the major concerns is that the terrorist organization this can make us of drug trafficking networks and even generate funds for their arms and also equipment. But the U.S Department of the State there are fourteen out of thirty-six foreign terrorist organization they are involved in trafficking narcotics.

English, Academics

  • Category:- English
  • Reference No.:- M91353016
  • Price:- $25

Guranteed 24 Hours Delivery, In Price:- $25

Have any Question?


Related Questions in English

As discussed in chapter 5 of our text and in the video

As discussed in Chapter 5 of our text and in the video Building Literacy Competencies in Early Childhood, exposure to stories, poetry, nursery rhymes, and songs encourages literacy development (Coats, 2013). Identify a p ...

Chose an age level within the birth to age 8grade 3

Chose an age level within the Birth to Age 8/Grade 3 group. Choose five different types of modern fantasy books for that age level. Create a 10-15 slide presentation that introduces the learners to selections and activit ...

Case study gen y in the workforce by tamara j ericksonin

Case Study : Gen Y in the Workforce By Tamara J. Erickson In this fictional case study, a Generation X manager at a multimedia production and distribution company must decide how to work effectively with her recently hir ...

Question 1watch a documentary about any subject that

Question: 1. Watch a documentary about any subject that interests you. Please do remember that this is a college course and avoid inappropriate topics. You can find free documentaries on any number of outlets including y ...

Question 1 what is the authors purpose what is the thesis

Question: 1. What is the author's purpose? What is the thesis or main idea of the article? 2. Who is the intended audience? How do you know? 3. Identify the types of appeals made by the author (logos, pathos, ethos). How ...

Question for this essay you will1watch the disney film

Question: For this essay you will: 1. Watch the Disney film "Hercules". Netflix and Amazon are just a few of the possibilities for finding and watching the film. 2. Then you will read the novel, screenplay or stage play ...

Question for this assignment you will research and analyze

Question: For this assignment, you will research and analyze a communication theory. Your paper should be at least 1200 words, use at least four authoritative sources of which at least two are peer-reviewed journal artic ...

In your own words describe what critical thinking

In your own words, describe what critical thinking involves. Discuss a time in your work life when you needed to use critical thinking. How would you show a potential employer that you have solid critical thinking skills ...

Assignment creating a text messageyour internet was down

Assignment : Creating a Text Message Your internet was down last night and you weren't able to turn in your last assignment. Your professor is away from her office, so you know the quickest way to reach her is via text m ...

Question write a blog post about your bucket list 8-12

Question: Write a blog post about your Bucket List (8-12 things you want to do before you die), or a Top Ten List, which you can interpret as you choose. Each item on your list should have at least two pictures, although ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As