Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Can Security Countermeasures be Overdone - Essay Example

Comments (0) Cite this document
The audacity, the colossal destruction of life and property, and the fact that it was perpetrated against the most powerful and vigilant of nations with ease, stunned the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
Can Security Countermeasures be Overdone
Read TextPreview

Extract of sample "Can Security Countermeasures be Overdone"

Download file to see previous pages Iraq sans UN approval, to choking off funds-flow to terrorist elements, compulsory screening, finger printing, strip & search of all non-nationals or even suspect nationals at all points of entry and exit, installation of electronic eavesdropping devices / phone tapping / mail interception, passing of draconian laws in the face of strong opposition from Human Rights activists, etc. and a myriad of other methods. Orwellian ‘Big brother is watching you’ (Orwell, 1949) has become a fact of life. All these signify the hard line, no nonsense approach, led especially by the governments in the USA and UK. They were primarily intended to assuage the injured American pride in the name of ‘war on terror’. Institutions, businesses and citizens did not lag far behind in this era of panic and paranoia.
Overdoing ‘hardware intensive’ and ‘legislative’ countermeasures seem to be only partly effective in containing terrorism. Afghanistan and Iraq, in déjà vu, will testify this premise. The sweeping actions of the Department of Homeland Security (DHS), Department of Justice (DOJ) and other investigation agencies on the one hand, and the poor record of conviction secured by them, point to the limited effectiveness of the countermeasures. That is not to say that there has been no success at all. On the contrary, some of the administrative countermeasures like enactment of The USA Patriot Act or the creation of the DHS certainly enabled putting a check on terrorist activities.
“The USA PATRIOT Act equips federal law enforcement and intelligence officials with the tools they need to mount an effective, coordinated campaign against our nation’s terrorist enemies. The Act revised counterproductive legal restraints that impaired law enforcement’s ability to gather, analyze, and share critical terrorism-related intelligence information. The Act also updated decades-old federal laws to account for the technological breakthroughs seen in recent years. For example, ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Can Security Countermeasures be Overdone Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Can Security Countermeasures be Overdone Essay Example | Topics and Well Written Essays - 2500 words. Retrieved from
(Can Security Countermeasures Be Overdone Essay Example | Topics and Well Written Essays - 2500 Words)
Can Security Countermeasures Be Overdone Essay Example | Topics and Well Written Essays - 2500 Words.
“Can Security Countermeasures Be Overdone Essay Example | Topics and Well Written Essays - 2500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Can Security Countermeasures be Overdone

IT Security Threats and Countermeasures

Alongside all the advantages of IT, there exists an appalling consequence that compels the organizations to invest hefty amounts- IT security threats. This paper shall discuss the most commonly witnessed IT security threats, along with the counter measures that are used to safeguard data and systems. 2. Overview Computer technology has evolved with the passage of the years. These incremental improvements have been coupled with the increasing spiteful activities in the world of technology. Intruders and hackers have gotten more technology savvy with the evolution of newer systems and technologies. Cyber crimes are increasing drastically every year even in the presence of effective security systems. “Computer crime reports increase...
8 Pages(2000 words)Research Paper


This is majorly done through passwords without strong authentication. Some of the major security concerns related to passwords include phising, reuse and the use of easy to guess passwords. Malware infection is also a major challenge to the use of passwords realized in many situations. In light of these challenges, authentication is therefore very critical and this can be achieved through two-step verification. Google has introduced a verification feature called 2sv. In using the verification, one logs into the Google account and after the normal username and password process they are required to submit a six digit verification which might be sent to them through a phone text message. This feature also allows for revocation of th...
4 Pages(1000 words)Essay


Computers had literally made the task of computing very fast and ultra accurate; people expect results within minutes or seconds. Scientific, medical, and technological progress had been achieved with the use of all the computer technologies currently available, accelerating human advancement by several degrees if compared to the prior centuries and millennia before the advent of computers. Other areas of human endeavors have likewise benefited from this computer-related development such as in the business and industry sectors, in the telecommunications, banking, trading and commerce sectors as well as in almost all aspects of human life. Today, there is no escaping the fact of interacting with computer-related equipment as peopl...
6 Pages(1500 words)Case Study

Research on brand strategy, Chinese brand issue and countermeasures

... which includes loyal customers, higher market share and larger revenues. Brand strategy helps brands adopt a differentiation strategy and focus on specific elements. Citing the examples of Haier and Lenovo, the study finds that an effective brand strategy can help domestic Chinese brands to achieve success in the international markets. Through brand positioning, through a planned growth strategy, Chinese brands can develop sustained competitive advantage even in foreign markets. An effective brand strategy helps overcome the negative perception associated with Chinese brands. The study concludes by suggesting counter measures that Chinese brands can adopt to establish in international markets. Limitations to the study have been highlighted...
40 Pages(10000 words)Dissertation

Countermeasures to Automobile-Exhaust Pollution

Pollution from vehicles is a universally acknowledged problem. However, it varies depending on the nation and its population. For example, pollution from cars contributes to between 50 to 90 percent of the total in urban areas. This may not be the same for rural areas. However, motor vehicles still present a disadvantage to the environment and human life. It is, therefore, prudent to develop countermeasures to automobile-exhaust pollution.
Most of the world’s vehicles are operated on conventional hydrocarbons such as diesel and gasoline. By switching to fuel that maintains less pollution, the environmental impact of vehicles can be minimized. An alternative fuel technology that has the potential to meet this challenge is fuel...
10 Pages(2500 words)Research Paper


...Security ID Introduction Security is of extreme importance to everyone and this has been identified as such in the everyday affairs in society. This importance is consistent with Maslow’s need hierarchy in which security represents one of the lower order needs that needs to be satisfied before others can be dealt with. It is therefore significant that security is assessed in different contexts. Events in medieval England that led to the creation of private watches and patrols In their examination of the origins and development of security in medieval England Fischer et al (2008) indicate that throughout history the concept of security can be traced to changes in the society as it mirrors the social structure as well as its economic...
7 Pages(1750 words)Essay


... of power are represented by the large networks. The networks are now prepared in order to generate consistency and competency in communication, so that the movement of information could not rely on another person or could not be controlled by other person or computer. For this reason, the larger networks are now become as Anarchic. The assistance and facilitation of these resources enables an ordinary man or Internet user to communicate and share ideas, assist others with similar interest groups and take assistance from others as well via this medium. The information that is unpopular, uncommon or politically sensitive issues is also shared worldwide via Internet. Many people think that the networks can generate new exciting possibilities...
6 Pages(1500 words)Essay


As technology grows, it has become much easier to work. You can store a lot of information and retrieve it very fast at the touch of a button. Well, this has brought to end the carrying of books and pens to meetings. This trend has also been picked up by hotels. They are introduced touch pad registers to manage their work efficiently and easily. A fast food franchise introduced touch pad registers. They issued each register with a password and a user ID to log into the system. It allowed them to input their passwords four times before the system locked. With time the system became harder to operate. The touch pads became greasy and some of the of the workers forgot the passwords.
The system was a good idea, but it had several...
5 Pages(1250 words)Case Study


...Security Security I agree with the first and third claims made by the healthcare IT staff. The certification criteria used by HIPAAto justify and fund the shift from paper records to electronic ones is also essential. First, I agree that application-level data security is claimed to be sufficient for HITECH and HIPAA compliance. Application-level data security builds an all-inclusive security program. It is important for healthcare providers to consider and serve in terms of a holistic data security program that integrates security around patient information to hinder its access by unauthorized parties. HIPAA requires such programs to comply with and apply its rough, role-oriented, access control, authorization, and authentication...
2 Pages(500 words)Essay

Security System In Reference To Immigration

 When James Hollifield delivered this paper at the 1989 Annual Meeting of the American Political Science Association barely three months before the descend of the Berlin Wall he seemed to foretell the crisis situation which the member states of the European Union (at that time the European Community) and the United States would visage when coming to terms with the unprecedented international migration flows they experienced in the early 1990s. With the collapse of communism in Europe and the subsequent rise of irredentist and nationalist tendencies on a global scale, both Western Europe and the United States were faced with the challenge of sustained wide-scale migration flows into their territory throughout the early half of...
11 Pages(2750 words)Report

Social Security: Is It in Danger and What Should Be Done

A country that realized the importance of giving the elderly the respect and financial stability they deserve for their lifetime efforts is the United States of America. There was a need for a system that would guarantee a monthly income for retired people. The Great Recession of 1929 left a sour taste in the minds of most American citizens and created greater instability for the nation.  On August 14, 1935, the Social Security Act was passed which created the social security system under the mandate of President Franklin D. Roosevelt (Social security). In 1962 the program was expanded to include medical insurance benefits. Social security has helped bring social justice to American retirees for over 70 years. 
6 Pages(1500 words)Term Paper

The Relationship Between Security, Risk and Health in a Large Organisation

Managers in modern organizations tend to use appropriately customized policies – in accordance with their firms’ needs and resources (employees, funds, technology) available. The current paper focuses on the examination of the various aspects of security, risk, health and safety within large organizations; Particular emphasis is paid on the fact that the demands of each one of these factors may be differentiated under the pressure of the market conditions and the organizational priorities. The case of Shell in Nigeria has been used as an example in order to show the potential co-existence and interaction of these factors within a specific organizational environment. The measures required and the role of the security ma...
9 Pages(2250 words)Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages(1500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Security Options

... security policies. Every reason has a different credence based on the nature of the industry. The primary cause for most institutions to create written policies is to lessen the risk of responsibility because of a breach or loss of customer information. In certain cases, a data violation can cost huge amount and nearly wipe out a company. Yet another significant reason to establish policies is to organize the multifaceted tasks of information security. Appropriate data protection entails diverse technology that handles a large amount of information, which is handled by various people. Absence of written guidelines or policies it is almost impossible for a big organization to control perceptive information (, 2008).  Juvenile...
8 Pages(2000 words)Assignment

Role of the Police and Private Security

... of Criminal Justice in the Office of the Attorney General, and other law enforcement agencies specifically designated by the Director” (Mission and Executive order # 5). It also appears from various reports that terrorism is the primary crime that brings all these agencies together. Role of the police and private security personnel: The role and duty of state and local police officers have already been discussed earlier. But as you might be knowing, there is a parallel security force in the country that is not funded by the government, usually referred to as private security or private police. There are many companies and individuals offering security for corporations and individual citizens. Its staff can be hired for a specific fee...
8 Pages(2000 words)Case Study

Current Cyber Attacks & Its Countermeasures

... by organizations or individuals to hack into the site of the rivals and get the credible, secret and valuable information. Sometimes, they are even appointed to track the system of their particular employer and then analyze the shortcomings of the employer. It can be alternatively used by the employer himself to make the system more secured and stronger. Another sort of category of people who are into cyber attacks are the discontented employees who are either fired from their respective jobs or are very much dissatisfied with the employer or the job they are doing. Thus, there is a mentality of revenge working within these individuals and sometimes they do it out of fun too. This kind of cyber attacks are mostly viewed in the developed...
7 Pages(1750 words)Coursework

Comprehensive Security Plan

... barriers, which serve as a means of, prevent or delaying the attacks. It should incorporate the use of internationally recognized companies to provide the required level of security measures of the valuable items in the library. Due to the huge area that the library covers, it is important for the facility to incorporate the use of CCTV cameras to monitor any activities in the library. Alarm systems ought to be placed at various strategic locations of the facility to detect any form of intrusion. The facility can also incorporate the use of access control procedures that enables any individual accessing the facility to identify themselves and to be screened to prevent any form of unwanted and unauthorized entry (Pressman, 2007). Property...
7 Pages(1750 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Can Security Countermeasures be Overdone for FREE!

Contact Us