Security

Security

6 Followers | 32 Entries

Entries on Security

Our Security in the Face of Global Challenges Gjata

Our Security in the Face of Global Challenges Gjata

Uploaded by ABOKI ASSOCIATES

The invasion of terrorist attacks has changed the face of security operation worldwide. Security has become a common theme considered by almost every person around the world. However, as security personnel already know, the basic concepts and theories of security and loss prevention are not changed by a single event. Antiterroristsprofessionalshadbeenpredicting much of what happened on 9/11 in USA as well as terrorist attacks in Africa in general terms for the past several decades. What is important is that we learn lessons that are present in the development of security operations, apply those that relates to our present situation, modify those that have potential to assist us in our efforts and discard outdated and outmodel ideas and technology. The information presented in Part One with with its recommendations will serve as a basis for understanding and applying the materials presented in Part Two and Three.

 
0.0 (0 reviews)
Gideon Jata the Chief Security

Gideon Jata the Chief Security

Uploaded by ABOKI ASSOCIATES

The invasion of terrorist attacks has changed the face of security operation worldwide. Security has become a common theme considered by almost every person around the world. However, as security personnel already know, the basic concepts and theories of security and loss prevention are not changed by a single event. Antiterroristsprofessionalshadbeenpredicting much of what happened on 9/11 in USA as well as terrorist attacks in Africa in general terms for the past several decades. What is important is that we learn lessons that are present in the development of security operations, apply those that relates to our present situation, modify those that have potential to assist us in our efforts and discard outdated and outmodel ideas and technology.

 
0.0 (0 reviews)
Family & Love

Family & Love

Family and Love transited Human existence.

 
5.0 (1 reviews)
Africa and the Resurgence of Terrorism: Revisiting the Fundamentals

Africa and the Resurgence of Terrorism: Revisiting the Fundamentals

Uploaded by Israel Adoba

The rise of terrorism in Africa is as a result of the instability, crisis, precarious situations and quagmires among others which are on top notch. These problems, though complex and disturbing, had followed a particular trend in term of terrorism with the rise of insurgents’ as Al-Qaeda, Boko Haram, Hamas and Hezbollah in various states in Africa. Solutions that have been propounded to the issues on terrorism and how to stop the insurgency have failed. The negativism and inherent political intrigues in solution findings towards resolving the terrorist question are but obvious. Thus, the bombing of the US Embassy in Kenya in 1998, the Bombing of the United Nations Headquarters, Abuja, 2009 have therefore brought terrorism to the highest rung of the ladder. Therefore, this paper therefore seeks to revisit the concept of terrorism in light of the terrorist groups in Nigeria, Mali and Kenya and also revisit the fundamentals which have been ignored by the agencies set up to curb the stigma of terrorism as well as propound strategies for covering terrorism. Keywords: Terrorism, Negativism, Political Intrigues, Instability and Insurgency.

 
0.0 (0 reviews)
Security Qos Profiling Against Cyber Terrorism in Airport Network Systems

Security Qos Profiling Against Cyber Terrorism in Airport Network Systems

Attacks on airport information network services in the form of Denial of Service (DoS), Distributed DoS (DDoS), and hijacking are the most effective schemes mostly explored by cyber terrorists in the aviation industry running Mission Critical Services (MCSs).This work presents a case for Airport Information Resource Management Systems (AIRMS) which is a cloud based platform proposed for the Nigerian aviation industry. Granting that AIRMS is susceptible to DoS attacks, there is needed to develop a robust counter security network model aimed at pre-empting such attacks and subsequently mitigating the vulnerability in such network. Existing works in literature regarding cyber security DoS and other schemes have not explored embedded Stateful Packet Inspection (SPI) based on OpenFlow Application Centric Infrastructure (OACI) for securing critical network assets. As such, SPI-OACI was proposed to address the challenge of Vulnerability Bandwidth Depletion DDoS Attacks (VBDDA). A characterization of the Cisco 9000 router firewall as an embedded network device with support for Virtual DDoS protection was carried out in the AIRMS threat mitigation design. Afterwards, the mitigation procedure and the initial phase of the design with Riverbed modeller software was realized. For the security Quality of Service (QoS) profiling, the system response metrics (i.e. SPI-OACI delay, throughput and utilization) in cloud based network were analysed only for normal traffic flows. The work concludes by offering practical suggestion for securing similar enterprise management systems running on cloud infrastructure against cyber terrorists.

 
0.0 (0 reviews)
The Biggest Obstacles to Saving and Investing of Money and How the Nigerian Stock Exchange Can Help

The Biggest Obstacles to Saving and Investing of Money and How the Nigerian Stock Exchange Can Help

The Nigerian Stock Exchange The Nigerian Stock Exchange was created in 1960 as the Lagos Stock Exchange. In the year 1977; the name was altered from the Lagos Stock Exchange to the Nigerian Stock Exchange. In June 28, 2016; it comprised of 180 listed companies with a general market capitalization of almost 10.16 trillion. All listings are stated in the Nigerian Stock Exchange All Shares Index. In respect to Market Capitalization; the Nigerian Stock Exchange is the third highest Stock Exchange in Africa.

 
0.0 (0 reviews)
The Future of Nuclear Security (Commitments and Actions)

The Future of Nuclear Security (Commitments and Actions)

The Nuclear security summit was launched by the United States President, Barrack Obama on April 2009 with the essence of carrying out a world summit in respect to nuclear summit in 2010 as this was part of the motive in acquiring all vulnerable nuclear weapon around the globe within four years. The main purpose and objective of the summit agenda was to discuss the threat of nuclear terrorist attack by securing and reducing weapons-sophisticated nuclear equipment’s, promoting global cooperation to eliminate the illegal acquisitions of nuclear weapons by non-state players such as smugglers and terrorist groups as well as carrying out necessary precautions in enhancing the world nuclear security system.

 
0.0 (0 reviews)