Our Security in the Face of Global Challenges Gjata
By Aboki Associates
The information presented in Part One with with its recommendations will serve as a basis for understanding and applying the materials presented in Part Two and Three.
Uploaded by: ABOKI ASSOCIATES
The world is in a state of dynamism and African is not left out, a complete revolution in the security industry is occurring. Invasion of terrorists attacks in Nigeria (Niger Militants, Boko Horam, Omase and other groups) the September 11, 2001 attacks on World Trade Centre in New York and the Pentagon in Washington DC have shaken the security industry in Nigeria and the world in general, whether private or government.
Government involvement in security industry has become a must, whether the involvement is entirely positive or is heavy handed, as exemplified by the suggestion and partly implementation of a natural identification system which was truncated coupled with the security industry’s response to the going threat of world terrorism is the need to line up with an ever so rapidly changed technology used both in the industry and against it by criminals.
Protection of information as top secret has become even more complex. Computer system that contains all types of information as making life both more easier and complex. Information exchange occur just a click of a computer key. This exchange of information relies more on the internal and computer network connected to the internet is subject to attack by hackers and criminals.
This text only sought to outline the basic concept s or diverse components that make up the security function. Other general attacks like the world trade centre, pentagon, the Murray Federal Building in ‘Oklahoma City, the Nigeria Police Force Headquarters in Abuja, the United Nations Office in Abuja, all calls for an internal coalition to wage war against world terrorism and put the world citizens on alert.
The success of this text lies in the focus on current issues within the basic framework of security theory.
We equally maintain the faith that the principles have continuously become sophisticated and are changing; we still lock up war valuables, some uses (machine/ key and locks while others have sophisticated electronic tools that operate electronic locks, while other information is locked into data bases using information technology security, including encryption and passwords.
About the Author