Security can be categorized into four realms: Information technology (IT) realm such as network security, data security, computing security, application security, and, information security; Physical realm such as Airport security, food security, infrastructure security, and supply chain security; Political realm like public security, human security, international security and homeland security; and finally monetary realm such as financial security (Voss, Whipple, & Closs, 2009). Security Policies Security policy concerns have been a subject of concern for over a decade.
Arguably, there is no constitutional meaning of national security that depicts the extent of the organization as presently comprehended (Malesic, 2009). Basically, Continuity of government operations is an aspect of security that depicts the initiatives and programs utilized to make sure that governing bodies can recuperate from an extensive array of possible operational disruptions. In this regard, security policy with regards to continuity planning could be seen as a course that fits in preparedness abilities, which entails response strategies for the agency, worker training, recuperation strategies, as well as the standard operations continuation.
Such activities according to Shinoda (2009) are rooted partly to guarantee the preservation of civil power, support provision for victims of an occurrence, infrastructure maintenance, along with other activities in recovery support. Debatably, any response to emergency assumes the subsistence of a continuing, practical government to support, finance, and supervise recovery endeavours. This policy has long been effective and has always been successful. Food security According to Pinstrup-Andersen ands Herforth (2008), foods could be purposely contaminated for reasons of deceit, terrorism, or other detrimental purpose.
For this reason, security introduced policies that were intended to offer food safety, and protect foods against accidental contaminants, like pesticide residues or communicable micro-organisms. Ever since the 9/11 terrorist attacks, security in most countries have focused more on food security, especially on the food supply safety from purposeful or deliberate acts of interference or contamination (Qi, Liu, Liu, & Yao, 2013). Evidently, extensive food-borne epidemics can make a lot of people sick, and also sales of contaminated commodities consumed by the public can lead to suffering.
A deliberate occurrence of food contagion, particularly when perceived as a terrorism act, can have solemn fiscal significances, so the security policy for food defence has been successful owing to the fact that there has been no occurrence of such. Terrorism Presently, terrorism is still an international threat that presents risks to worldwide concerns originating from and attested in both the domestic and international setting. Essential to security attempts to deal with international terrorism are steps followed to identify, prevent, and overpower terrorists (Malone, 2004).
Whereas knowing that many other terrorist groups could be yearning to damage worldwide security concerns, security policy has principally concentrated on handling terrorist threats, its allied institutes, as well as supporters to its aggression-established philosophy. Experts are of the view that instead of attempting to directly battle all terrorist groups irrespective of whether they have the intention or means to show aggression to U.S, President, the national security counterterrorism policy should concentrate much on terrorists as well as its supporters.
Comprehending how terrorists continue to develop into an international body with varied set of abilities as well as actors is vital in formulation of effective calculated policy and managing its effectual accomplishment: thus, it there is need for improvements on counterterrorism and security management policy. Cyber Security Cybercrime is a threat posed by unreliable or criminal actions of computer users manipulating the widespread utilisation of computer networks.
Read More