We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Policy paper (stating the solutions to improve the security in Kenya using help from the international community) - Assignment Example

Comments (0)
Instructor Date Security Solutions for Kenya Security has become a major concern for Kenya since the rising of terrorist factions in their neighboring countries such as Somalia which have managed to leak their activities into the border (MacFarlane & Khong, 2006)…
Download full paper
Policy paper (stating the solutions to improve the security in Kenya using help from the international community)
Read TextPreview

Extract of sample
Policy paper (stating the solutions to improve the security in Kenya using help from the international community)

Download file to see previous pages... These solutions however cannot be handled by the country alone and the international community will have to chip in if they are to be successful in this endeavor. The resulting aim will be beneficial to all involved as a safer country will lead to a more prosperous environment which will allow for an increase in the co operation of countries and organizations in sectors such as business and other areas of international concerns (Hastings, 2012). The first step in ensuring that the security threat is efficiently dealt with is the creation of new policies that will enable Kenya and the cooperating countries to meet this menace head on. There are a number of policies that can be implemented that will assist in the achievement of this goal, they include: Military Support The main security threat facing the country consists of militants based in neighboring countries who happen to have armed forces at their disposal and use this resource to cause havoc in the areas that they wish to control (Prabhakaran, 2008). These areas includes places such as the countries borders where they have attempted to take control of the region so as to enhance their control and hold over the areas that they wish to take charge of. ...
Military support in this case will consist of the sending of troops to these areas to support the local military in their attempt to gain back control of the regions that have been most affected by the invasion of these terrorist armed forces. The additional provision of extra men will increase the country’s ability to fight back where necessary especially in the areas that have been suffering frequent attacks form these militants and will enhance the probability of victory during battles (Prabhakaran, 2008). The troops will also provide extra man power for activities such as border control that will allow them to cover the areas that are patrolled more efficiently and without the exhaustion of the resources at the country’s disposal. Military support can also include the sending of weapons that will allow the country to fight these attacks more efficiently and hopefully in the process discourage the militants from attempting to wage war on the soldiers that have been sent to these regions (Prabhakaran, 2008). It should be noted that the individuals kidnapped from this region are not always of Kenyan origin and some are expatriates who happen to be working in the area at that point in time thus this support will not only be for the protection of the Kenyan people alone but also the citizens of other international areas who operate in this region. Access Control This can be described as the restrictive control of regions of concern that will make it difficult for unauthorized people to enter these areas (Prabhakaran, 2008). Access control can also refer to restrictive prohibitions of other items such as Visas that allow entry into the country without a stern background check to confirm that the individual in question does not harbor any ill will that may be the ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Community Solutions
are the evergreen slogans in the history of political movements that have happened in the world. But despite years of planning and aggressive strategies worldwide, the cry for poverty eradication is till heard in many parts of the world. For the United Nations, ‘End poverty by 2015’ is one of the Millenium Developemnt goals (United Nations, September 2010).
7 Pages(1750 words)Research Paper
Information Security Policy Document (ISPD)
tory ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 9 Analysis of ISPD ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Page 9-11 Conclusion ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 11-12 References ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 13 Introduction and Methodology As this is an information age, information is now in the form of digits that flows on an electronic computerized network.
9 Pages(2250 words)Assignment
Security Solutions: Questions
The change will help the company to improve its liquidity position because it has now more time to pay its creditors and hence it can try to collect its debtors early in order to take advantage of the room between days payable and debtor’s turnover in days.
4 Pages(1000 words)Assignment
Wireless Security Policy
Wireless Security Policy. A wireless network may be described as the wireless connectivity of computer networks generally using, but not limited to, radio waves. The connectivity links business enterprises, telecommunication networks and homes while avoiding the costly and labor intensive cabling infrastructures (NIST, 2003).
5 Pages(1250 words)Assignment
Opportunities to improve international business prospects
As the president of C&C Industries, you have provided strong leadership that is fundamental to the company’s success. The company has received numerous awards for its good corporate image,
3 Pages(750 words)Assignment
Information Systems Use Security Policy
For example, service delivery advancements, creation of new business models and using just-in-time inventory would not be possible if it were not for the use of information systems. However, using the information systems in a growing
3 Pages(750 words)Assignment
Security Measures Paper
With these and other factors, security issue gains top priority for all companies where information technology use is inevitable. As a security administrator of a major organization recently breached by social engineer, below are the
4 Pages(1000 words)Assignment
International environment policy
(II) Access to new markets where globalization can lead to free trade between countries. Access to new markets help companies in innovation. (III) Widening disparity in incomes where
1 Pages(250 words)Assignment
Acceptable Use Policy & Security Audit
For instance, in the case where college is the IT resources and internet owner, the college’s authorized personnel is at liberty to change
2 Pages(500 words)Assignment
Policy Paper
Some of the serious damages and loses that could happen to a computer due to antivirus, spyware, and adware invasion include data loss, sharing
5 Pages(1250 words)Assignment
Let us find you another Assignment on topic Policy paper (stating the solutions to improve the security in Kenya using help from the international community) for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us