Unit 5

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 44

UNIT 5: NATIONAL SAFETY AND SECURITY

LEARNING OUTCOMES

At the end of the unit, students will be able to:

1. Differentiate safety and security.


2. Identify the different types of threats.
3. Determine the concept of human security
4. Enumerate the measures to ensure campus security and data.

INTRODUCTION

Security and safety challenges rank among the most pressing issues of modern times.
Challenges such as, cyber-crime, terrorism, environmental disasters and threats to campus
securit; impact the lives of millions across the globe. These issues also rank high on the agenda
of politicians, international organizations, businesses and educators. In the current,
interconnected world, security challenges are becoming increasingly complex. Facilitated by
developments as globalization and the spread of networked and hyper-connected technologies,
new safety and security challenges arise and impact local, national, regional and international
levels, which dramatically increases their complexity and scale. As such, solutions to
contemporary security challenges require a wide array of actors operating on multiple levels of
governance. The topic will introduce you to the broad theme of security and safety in an
increasingly complex world. Together we will search for answers to important questions: what is
security and safety? How can we understand complex modern-day security and safety
challenges? And how do we deal with such challenges? This topic also elaborate the different
measures to national, human, information, as well as campus security.

Topic 1: National and Human Security and Types of Theats

Learning Objectives:

At the end of the topic, students will be able to:

1. Define security and safety.

2. Identify the different threats to national security.

3. Determine the diffrent categories of human security.


Presentation of Content

What is Security?

Security is highly focused on the deliberate actions that are geared towards inflicting harm to an individual, organization, or even assets.

What is Safety?

The term safety is used to refer to the condition of being protected from the aspects that are likely to cause harm. In addition, the term
safety can be used to refer to the state at which one has the control of the risk causing aspects hence protecting himself or herself against
risk that is fully unintended.
Difference Between Safety and Security

SECURITY SAFETY

Protection against external Protection against internal


By Definition threats threats

Emotional Aspect It s physical aspect It is emotional aspect.

External Vs Internal External Internal

Deliberate and
Unintended Deliberate Threats Unintended Threats

Coverage Broad Coverage Narrow Coverage


Definition Aspect

One of the primary difference between the two terms is their definition. Security refers to the protection of individuals, organizations, and
properties against external threats that are likely to cause harm. It is clear that security is generally focused on ensuring that external
factors do not cause trouble or unwelcome situation to the organization, individuals, and the properties within the premises. On the other hand,
safety is the feeling of being protected from the factors that causes harm. It is also important to highlight that an individual who controls the
risk causing factors has the feeling of being safe.
Emotional Aspect

The second difference is that the feeling of being safe is an emotional aspect while security has to do with physical aspect. An
individual feels safe when he or she is embraced by the loved ones which means that his or her emotional safety has been taken care of.
Similarly, young children have the sense of being safe when they are close to their mother or father because he or she provides for both emotional
and physical aspect. On the other hand, the aspect of security comes with physical aspects like tall walls that are protecting an individual
from external threats. In addition, an individual has the sense of security if he or she has a physical weapon like gun that can be used to deal
with external threats.
External Versus Internal

It is important to highlight that security is mostly an external affair while safety is an internal aspect. People looking for security ensure that
they are highly protected against external factors that are likely to harm them. On the other hand, an individual within the organization might cause the
essence of lacking safety or a party might make himself or herself not to feel safe. For example, security analyst and the forces mandated with
ensuring security secure the perimeter of the organization, assets, or even an individual hence shielding against any external threats. However, they are not
concerned with the internal aspects. A person might have large security force but may be feeling the absence of safety, especially if he or she does
not have peace with personal being.
Deliberate and Unintended

The other notable difference between security and safety is that security is the protection against deliberate threats while safety is the aspect
of being secure against unintended threats. People and properties are usually protected against deliberate threats that are caused by criminals
who have the intention to sabotage the operations of the company, steal resources of the organization, or harm an individual. This means that security
is geared towards the protection against criminal activities that are perpetuated by criminals. On the other hand, the safety of a person is mostly
installed so that a person can be protected against unintended accidents. For example, individuals are required to wear safety clothes in an
organization that deals with chemicals so that they can be protected against the accidents.

Coverage

The broadness at which each term covers seems to be significantly different. Security is a major affair that covers a wide area and goes even
further to be an international aspect. Countries ensure the safety of their citizens by instilling security measures at the borders and at their
airspace. One of the major roles of the government is to provide sufficient security, especially against external threats. Safety does not
cover wide coverage and usually involves the premises of a house, company, and institution. It is also essential to highlight that there can be not
safety if security is not guaranteed.
THREATS T O N A T I O N A L SECURITY

National Security – is a state or condition where our most cherished values and beliefs our democratic way of life, our institutions of governance and our unity, welfare and
well- being as a nation and people are permanently protected and continuouslyenhanced.

F undamental E lements:

There are seven ( 7 ) fundamental elements that lie at the core which therefore further amplify our definition of national security. At the same time, they constitute the most
important challenges we face as a nation and people.

1.socio – political stability-We must achieve peace and harmony among all Filipinos, regardless of creed, ethic origin or social station. The government and the people must
engage in nation – building under the rule of law, constitutional democracy and the full respect for human rights.

2.territorial integrity- we must ensure the permanent inviolability of our nation territory and it’s effective control by the government and the state.

3.Economic solidarity and strength – we must vigorou pursue a free – market economy through responsible entrepreneurship based on social conscience, respect for the
dignity of labor and concern for the public interest.

4.ecological balance – national survival rests upon the effective conservation of our natural environmental in the face of industrial and agricultural expansion and population
growth.

5.cultural cohesiveness – our lives as a people must be ruled by a common set of values and believe grounded on high moral and ethical standards, drawn from our heritage
and embodying a Filipino standard identity transcending religious, ethic and linguistic differences.

6.Moral – spiritual consensus – we must be propelled by a nationalvision inspired and manifested in our words and deeds, by patriotism national pride and the advancement
of national goal and objective.
7.external peace – we must pursue constructive and cordial relations with all nations and peoples, even as our nations itself must chart an independent course, free
from external control, interference or threat or aggression.

INTERNAL THREATS

our national security environment is infused with four important dimensions. Internal threats to our national security make up the first dimension.

1.Moro Islamic Liberation Front ( MILF ) – the MILF in constructive peace negotiation, the armed activities of the group continue to be a source of serious concern,
particularly the build-up its defensive and offensive capabilities. Hand in hand with this security problem is the threat from the Abu Sayyaf Group (ASG), a small band of
highly mobile terrorists with suspected links to international networks.

2. The Communist Party of the Philippines/New People’s Army/National Democratic Front (CPP/NPA/NDF)-continuous ton pose a serious threat to national security,
although presently weakened in comparison with their peak strength in the period 1985-87.

3. The Communist Party of the Philippines/New People’s Army/National Democratic Front (CPP/NPA/NDF)-continuous ton pose a serious threat to national security,
although presently weakened in comparison with their peak strength in the period 1985-87.

4. Grave incidence of poverty -is also a serious threat top national security, especially to the extent that it breeds rebellion, crime and dissidence. Poverty incidence affects
about one-third (1/3) of Filipino nationwide.

5. Economic sabotage- undermines the market economy, the financial system and the nation’s resources. Under this category are underground activities such as
counterfeiting, money laundering, large-scale smuggling, inter-oceanic poaching and commercial dumping.

6. Graft and corruption -has become another threat to our national security by virtue of the huge scale by which it saps public resources, undermines the morale of the civil
service and affects the delivery of quality basic services.

7. Severe calamities - cause serious food shortages, abet hoarding and profiteering tool stands at more than 13,000 lives lost and p179 Billion worth of property destroyed.
8. Persistent environment degradation –poses a long term security threat. The attrition of forest and watersheds, air-land-water pollution and the proliferation of toxic
substances are a cause of sickness, death and the diminution of national productivity and well- being.

EXTERNAL THREATS

1. The multi lateral dispute over the Spratly Island, is a source of intermittent tensions, owing to the build up structures, believed to be military -oriented , by some claimant
countries in the area.

2. The smuggling firearms and contraband, illegal migration and occasional movement of foreign terrorists through the porous borders of our southwestern frontier have
elicited transnational concern. Philippine law enforcement agencies work closely with international police organizations, bilaterally and multilaterally, to check these
activities.

3. The lingering effects of the currency crisis affecting the countries within the Association of South East Asian Nations ( ASEAN ) are a cause of regional anxieties
which tend to aggravate the political instabilities and socio-economic dislocations involving the poorest people.

4. The serious economic disparity between rich and poor nations keeps the world in a state of instability and virtually on the brink or war in many places.

5. Ethnic, religious and cultural conflict pervades many regions and nations including our own. It is constantly exacerbated by mass poverty, limited access to
resources, denial of human rights, lack of national integration and international issues.
Please watch the video

https://youtu.be/LeZhLkF0Bfo
Freedom for Fear

This school seeks to limit the practice of Human


Security to protecting individuals from violent conflicts
while recognizing that these violent threats are strongly
associated with poverty, lack of state capacity and other
forms of inequities.

This approach argues that limiting the focus to violence


is a realistic and manageable approach towards Human
Security.

Emergency assistance, conflict prevention and


resolution, peace-building are the main concerns of this
approach.
Freedom for Want

The school advocates a holistic approach in achieving human security and


argues that the threat agenda should be broadened to include hunger,
disease and natural disasters because they are inseparable concepts in
addressing the root of human insecurity and they kill far more people than

war, genocide and terrorism combined .

Different from "Freedom from Fear", it expands the focus beyond violence
with emphasis on development and security goals.
HUMAN
SECURIT
Y
CATEGO
RIES
Economic Security Food Security

Some of the criteria associated with economic security include Food security requires that all people at all times have both physical and
economic access to basic food. According to the United Nations, the

insured basic income and employment, and access to such social overall availability of food is not a problem, rather the problem often is the
poor distribution of food and a lack of purchasing power. According to
e.g. freedom from poverty UN, the key is to tackle the problems relating to access to assets, work and
safety net.
assured income (related to economic security).

e.g. access to basic nutrition, hygiene and food supply.

Health Security
is more complex, and covers many different issues such as access to safe water,
living in a safe environment, access to health services, access to safe and
affordable family planning and basic support during pregnancy and delivery,
prevention of HIV/ AIDS and other diseases, and to have basic knowledge to
live a healthy life.
e.g. access to health care and protection from diseases
Personal Security
aims to protect people from physical violence, whether from the state or
Environmental Security external states, from violent individuals and sub-state actors, from
domestic abuse, or from predatory adults. For many people, the greatest
is straightforward and cover such issues as prevention of water pollution, source of anxiety is crime, particularly violent crime.
prevention of air pollution, prevention from deforestation, irrigated land
conservation, prevention of natural hazards such as droughts, floods, cyclones, e.g. physical safety from such things as torture, war,
earthquakes etc. criminal attacks, domestic violence, drug use, suicide, and
e.g. protection from such dangers as environmental pollution and depletion even traffic accidents
Political Security
Community Security
is concerned with protection of human rights and well-being of all people. It also
on the other hand covers conservation of traditional and cultures, languages
includes protection against people from state repression such as freedom of press,
and commonly held values. It also includes abolishment of ethnic
freedom of speech, and freedom of voting. Abolishment of political detention,
discrimination, prevention of ethnic conflicts, and protection of indigenous
e.g. survival of traditional cultures and ethnic groups as well as the imprisonment, systematic ill treatment, and disappearance are also covered under
physical security of these groups political security.

e.g. enjoyment of civil and political rights, and freedom from political
oppression
Assessment

Essay. Write your own understanding on

How does human insecurity affect health?

Essay Rubric

Category 4 3 2 1
Focus on There is one clear Main idea is not Main idea is The main idea is not
Topic(content) well focused topic. supporting somewhat clear but clear. There is
Main idea stands out information in there is a need for random collection of
and is supported my general. supporting information.
detailed information.
information.
Support for topic Relevant quality Supporting details Supporting details Supporting details
(content) details give the and information are and information are and information are
reader important relevant, but one key relevant, but several typically unclear or
information issue of the storyline key issues of the not related to the
is unsupported. storyline are topic.
unsupported.
Grammar and Makes no errors in Makes 1-2 errors in Makes 3-4 errors in Makes 4 errors in
spelling grammar or spelling grammar or spelling grammar or spelling grammar or spelling
that distract the that distract the that distract the that distract the
reader from the reader from reader from the reader from the
content. content. content.

Topic 2: Campus and Data Security Measures


Learning Objectives:

At the end of the topic, students will be able to:

1. Identify the different measures to ensure campus security


2. Identify the different measures to information security.
Presentation of Content
 School Liability for Torts
 Legal Requirements to Avoid Liability
 Concept of Parental Authority &
Responsibility
 Best Practices & Red Flags
TORTS
Tort Law, concerns civil wrongs and addresses the duty, breach and injury sustained to one individual as a result of another’s conduct. An unlawful violation of private
right, not created by contract, and which gives rise to an action for damages. Torts such as assault, battery, libel, slander, defamation, false arrest, malicious prosecution
and invasion of privacy require proof of intent or willfulness; whereas simple negligence, as an unintentional tort, does not require such proof of intent or willfulness.

 Defendants in tort cases can either be natural or artificial being. Corporations are civilly liable in the same manner as natural persons.
 Any person who has been injured by reason of a tortious conduct can sue the tortfeasor.
 The primary purpose of a tort action is to provide compensation to a person who was injured by the tortious conduct of the defendant.
 Preventive remedy is available in some cases.

Article 80(Philippine Civil Code)

The obligation imposed by article 2176 is demandable not only for one’s own acts or omissions, but also for those of persons for whom one is responsible.

Article 2176 (Philippine Civil Code)

“Whoever, by act or omission causes damage to another, there being fault or negligence, is obliged to pay for the damage done. Such fault or negligence, if there is no
pre-existing contractual relations between the parties, is called a quasi-delict and is governed by the provisions of this Chapter.” when the persons herein mentioned prove
that they observed all the diligence of a good father of a family to prevent damage.
 Liability by teachers, school administrators and educational institutions arising from negligence

 Liability by teachers, school administrators and schools for injuries caused by persons in their custody or employment arising from negligence

 Liability by teachers and school administrators resulting to reckless imprudence due to gross or inexcusable lack of precaution

 Subsidiary liabilityby employers, teachers and other persons for crimes committed by their pupils, workmen, apprentices, employees or servants

in the discharge of their duties

 Liability by educational institutions for breach of contract in ensuring that adequate steps are taken to protect students’

Liability by
Teachers and
School
Negligence is not necessarily implied whenever someone is injured. The questions to be considered are:
Adminstrators Article 2176 (Philippine Civil Code)
“Whoever, by act or omission causes damage to another, there being fault or negligence, is obliged tom pay for the damage done. Such fault or negligence, if there is no
pre-existing contractual relations between the parties, is called a quasi-delict and is governed by the provisions of this Chapter.”
Q: Aside from the teacher and head of the school, can the school itself be made liable?
A: In general, the liability of the teacher does not extend to the school.
Principle of Vicarious Liability:
U.S- negligence of the employee is conclusively the negligence of the employer
Philippines- employer is not liable for the negligence of the employee, students or apprentice

Q: May a teacher escape liability for outings and activities held outside the school but authorized by the school?
A: Art 218 of the Family Code states that “authority and responsibility shall apply to all authorized activities whether inside or outside
the premises of the school, entity or institution.”

Liability by
Educational
Institutions and
Adminstrators Art. 2180 (Civil Code).
The obligation imposed by article 2176 is demandable not only for one’s own acts or omissions, but also for those of persons for whom one is responsible.
The responsibilityfor Damages
treated of in this article shall cease when the person herein mentioned proved that they observed all the diligence of a good father of a family to prevent
damage.
caused by
Employees
Liability by
Teachers and
Adminstrators
 This is due to gross or inexusable lack of precaution in doing or failing to do an act resulting in material damage to another.
due to Reckless
 Teachers and school administrators may also be held criminally liable for imprudence (negligence) should they be found guilty of inexcusable lack of
precaution in doing or failing to do an act which results in material damage to another, taking into consideration their employment and occupation, intelligence,
physical condition and otherImprudence
circumstances regarding persons, time and place in determining the degree of care which is required in each particular situation.
Liability will be based on criminal negligence (culpa criminal) under Article 365 of the

Liability by
Teachers for
As long as students are in attendance at school including recess time and class time
Damages caused Art. 2180. (Civil Code)
Lastly, teachers or heads of establishments of arts and trades shall be liable for damages caused by their pupils and students or apprentices, so long as they remain in their
custody. by Students

Liability by Educational Institutions Arising from Breach of Contract

In case the party causing the damage or injury to students are not members of the educational community, educational institutions may still become liable for breach of
contractual obligation of providing students with an atmosphere that promotes or assists in attaining its primary undertaking of imparting knowledge. Hence, the school
must ensure that adequate steps are taken to maintain peace and order within its campus premises and prevent its breakdown.
Q: Will the school be held liable for the death of a student inside the school’s premises caused by outside assailants?

DEFENS
1. The school must take appropriate precautions to prevent injury through care in enforcing discipline and observance of school rules and regulations upon
students.
2. The school must impose sanctions, guidelines and prohibitions upon teachers and staff.
3. The teacher must prove that due diligence was observed in all things. As to the kind of due diligence, the last paragraph of Art 2180 is clear
“The persons must prove that they have observed all the diligence of a good father of a family to prevent damage”.

WAIVERS
Q: Can a teacher or school escape responsibility by asking parents to file a waiver during field trips and outings?
A: This issue is closely related to liabilities
outside school and Art 2180 is clear that “authority and responsibility shall apply to all authorized activities whether inside or outside the premises of the school, entity or
institution.”
Teacher
asFamily
Acc. To the a Code and Civil Code of the Philippines
Article 218 (Family Code)
The school, its administrators and teachers, or the individual, entity or institution engaged in child care shall have special parental authority and responsibility over the
minor child while under their supervision, instruction or custody.
Authority and responsibility shall apply to all authorized activities whether inside or outside the premises of the school, entity or institution.

Article 219 (Family Code)


Those given the authority and responsibility under the preceding Article shall be principally and solidarily liable for damages caused by the acts or omissions of the
unemancipated minor. The parents, judicial guardians or the persons exercising substitute parental authority over said minor shall be subsidiariliy liable.
The respective liabilities of those referred to in the preceding paragraph shall not apply if it is proved that they exercised proper diligence required under the particular
circumstances.
All other cases not covered by this and the preceding article shall be governed by the provisions of the Civil Code on quasi-delicts.

Article 221 (Family Code)


Parents and other persons exercising parental authority shall be civilly liable for the injuries and damages caused by the acts or omissions of their unemancipated children
living in their company and under their parental authority subject to the appropriate defenses provided by law

Article 2176 (Civil Code)


Whoever by act or omission causes damage to another, there being fault or negligence, is obliged to pay for the damage done. Such fault or negligence, if there is no pre-
existing contractual relation between the parties, is called a quasi-delict and is governed by the provisions of this chapter.

Article 2180 (Civil Code)


The obligation imposed by article 2176 is demandable not only for one’s own acts or omissions, but also for those of persons for whom one is responsible.
Employers shall be liable for the damages caused by their employees and household helpers acting within the scope of their assigned tasks, even though the former are not
engaged in business or industry.
Lastly, teachers or heads of establishments of arts and trades shall be liable for damages caused by their pupils and students or apprentices, so long as they remain in their
custody. The responsibility treated of in this article shall cease when the persons herein mentioned prove that they observed all the times.

Clearly, a teacher or school personnel required to exercise special parental responsibility (in loco parentis) but who fails to observe all the diligence of a good
father of a family in the custody and care of the pupils and students, shall be held liable for gross neglect of duty.
RECOMMENDING SECURITY MEASURES FOR INFORMATION SECURITY
INFORMATION SECURITY
Information Security is the practice of defending information from unauthorised access, use, disclosure, disruption, modification, recording or destruction.

Why Information Security?


 Information is critical to any business and paramount to the survival of any organisation in today‟s globalised digital economy.
 Governments, military, corporations, financial institutions, etc. amass huge confidential information about their employees, customers, research & financial
status. Most of this information is stored on computers and transmitted across networks to other computers.
 Conventional warfare has been replaced by digital or cyber war. Rivals continue attempts to gain access to the adversaries information.
Examples:

 Bradley Manning, US soldier: involved in the biggest breach of classified data (7 Lakh Classified files, battlefield videos & diplomatic cables) in US History for
providing files to Wikileaks.
 A hacker stole a database from South Carolina‟s Deptt. Of Revenue, exposing 3.6 million Social Security numbers and 3.8 Lakh payment card records. More
than 6.5 Lakh businesses were also compromised.
 As per recent article of Indiatimes: As India‟s 108 bn $ IT Service industry is becoming the world‟s favoured outsourcing centre, India is emerging as a top
destination for cyber data theft.
Computer Security Losses
DID YOU KNOW?
In 1980 a computer cracked a 3-character password within one minute.

In 1999 a team of computers cracked a 56- character password within one day.

In 2004 a computer virus infected 1 million computers within one hour.

Reasons For Attack


 Fraud: These attacks are after credit card numbers, bank accounts, passwords…anything of use of themselves or sell for profit
 Activism: Activists disagree with a particular political or social stance one takes, and want only to create chaos and embarrass the opponent organisation.
 Industrial Espionage: Specific proprietary information is targeted either in rivalry or to make profit.
Forms of Threat

 Computer Viruses
 Trojan Horse
 Address Book Theft
 Domain Name System Poisoning
 Zombies (Enslaving of Computers), IP Spoofing (Replicating IP adress)
 Password grabbers
 Network Worms
 Hijacked Home Pages
 Denial of Service attacks
 Phishing
 Identity theft

Top Three Security Threat

 Malware (Malicious Software)

 Internet- Facing Applications

 Social Engineering
Social Engineering

Social Engineering is the art of deceptively influencing a person face to face, over the phone, via e mail, etc. to get the desired information. For an organisation with more
than 30 employees one expert puts the success rate of social engineering at 100%.
For eg.-
 Convincing an employees to share a company password over the phone or chat
 Tricking someone into opening a malicious e mail attachment
 Sending a “free” hardware that‟s been pre- infected

Typical Symptoms

 File deletion

 File corruption

 Visual effects

 Pop-Ups

 Erratic (and unwanted) behavior

 Computer crashes
Threat Consequences

 Unauthorized Disclosure
exposure, interception, inference, intrusion
 Deception
masquerade, falsification, repudiation
 Disruption
incapacitation, corruption, obstruction
 Usurpation
misappropriation, misuse

Pillars to Information Security : CIA


Data
Availability

Data Data
Integrity Confidentiality
CONFIDENTIALITY INTEGRITY
Preventing disclosure of information to unauthorised individuals or Maintaining and assuring the accuracy and consistency of data
systems. For eg. A Credit Card transaction. over its entire life- cycle. This means the data cannot be modified
The system attempts to enforce confidentialityby encrypting in an unauthorised or undetected manner.
the card number during transmission from buyer to seller.

AVAILABILITY
The information must be available when it is needed, to ensure its
utility. This means that the computing systems used to store and
process the information, the security controls used to protect it ,
and the communication channels used to access it must be
functioning correctly.
Measures for Information Security

Use a strong password


A strong password is the best way to protect yourself against identity theft and unauthorized access to your confidential information.

Protect confidential information


Varied people have access to information that must not be shared, including the password. Familiarize yourself with the applicable laws and policies which govern
these records and act accordingly.

Make sure operating system and virus protection are up- to-date
This will avoid vulnerability to hackers and others looking to steal information.

Use secure and supported applications


Any software you install has the potential to be exploited by hackers, so be very careful to only install applications from a trusted source. The use of pirated
software is illegal.

Be wary of suspicious e-mails


Don't become a phishing victim. Never click on a link in an email; if you're tempted, cut and paste the url into your browser. That way, there's a good chance your
browser will block the page if it's bad. And don't open email attachments until you've verified their legitimacy with the sender.

Store confidential information only on HSU servers


CDs, DVDs, and USB drives are all convenient ways to store data; the trouble is, they're just as convenient for thieves as for you. Wherever possible, store
confidential information in your network folder or other protected central space. If you must store confidential information locally, you must encrypt it and then
delete it as soon as you no longer need it.

Back up your data … and make sure you can restore it


If your computer becomes infected, the hardware fails, you may be unable to retrieve important information. So make sure your data is backed up regularly - and
test that backup from time to time to make sure that the restore works correctly.
Protect information in all its forms
Protecting your digital data is important. But paper and the human voice remain important elements of the security mix. Keep confidential printed information in
locked file cabinets and shredded when no longer required. If you're talking about confidential information on the phone, take appropriate steps to ensure you're
not overheard.

Learn to be security-aware
Being aware and alert to the environment can prevent any disaster.

Important Points

 Classified documents should be kept in special filing cabinets, special vaults etc.
 It should be in the personal custody of the concern authorised official
 These should be kept locked when not in use.
 These should be numbered and logged
 When passing from one authorised person to the next , written signed receipt should be taken.
 Shouldn‟t be taken out of premises ideally , otherwise they should be sent only in sealed boxes in double
sealed cover
IBasic Guidelines ISecurity Technologies Used

 Do not take unusual precautions –this will attract attention – act normal
 Persons having the confidential information should be made personally
responsible for protecting the same
 Security must be sensible or low profile
 Security should be organised in depth
 Enforce control of copies of documents
 Proper control of waste paper and destruction
 Check all meeting places for „bugs‟
 Be wary of consultants
 Edit your journals
 Nothing will remain secret, if more than two persons share the same
Feedback

Fill in the blanks

Direction: Read each statement or question below carefully and fill in the
blank(s) with the correct answer. Answers may be more than one word.

1. Maintaining and assuring the accuracy and consistency of data over its
entire life- cycle. Is data _______________________.
2. ___________________ is the art of deceptively influencing a person
face to face, over the phone, via e mail, etc. to get the desired information.
3. ______ law concerns civil wrongs and addresses the duty, breach and
injury sustained to one individual as a result of another’s conduct. An
unlawful violation of private right, not created by contract, and which
gives rise to an action for damages.
4. A ________ is an essential document that informs participants of the
risks involved in certain activities and also protects you from liability.
5. In year _________ a computer virus infected 1 million computers
within one hour.
6. __________is the collective name for a number of malicious software
variants, including viruses, ransomware and spyware.
7. Information Security is the practice of defending _______________
from unauthorised access, use, disclosure, disruption, modification,
recording or destruction.
8. ___________ is the method by which information is converted into
secret code that hides the information's true meaning.
9. The information must be available when it is needed, to ensure its
_______.
10. Art 218 of the _______ Code states that “authority and responsibility
shall apply to all authorized activities whether inside or outside the
premises of the school, entity or institution.”.

Enumerate 5 measures to prevent your data from threats.


Assessment

TRUE OR FALSE

Write TRUE if the statement is true otherwise FALSE.

__________ 1. When the database and software library are made available
to persons not entitled to have access it is referred to as unauthorized use.
(F)

_____________ 2. Information security threats can be internal as well as


external, and they can be accidental as well as intentional. (T)

____________ 3. Firewalls act as filters and barriers that restrict the flow
of data to and from the firm from the World Wide Web. (F)

_________4. If formal controls are to be effective, then top management


must participate actively in their establishment and enforcement. (T)

_____________ 5. The reasons for good health and safety are moral"


social and economic.  (T)

__________ 6. Where a country has no health and safety law  it


does not need to adoptany standards. (F)

__________ 7. Confidentiality refers to the protection of the


organizational data from unauthorized disclosure of customer and
proprietary data. (T)

________ 8. Integrity is nota primary goal of security. (F)

_________ 9. Security refers to the protection of individuals,


organizations, and properties against internall threats that are likely to
cause harm. (F)

______________ 10. Complexity is one of the barriers to


good standards of health andsafety. (T)

MULTIPLE CHOICE
Choose the best answer
1. Which of these is not a feature of the safety assessment whereby
students, parents, and staff "map" the vulnerable spaces and times in their
school and campus?
A. providing students, staff, and parents with copies of the school's
floor plans
B. asking students to show on a floor plan the areas they perceive as
less safe
C. considering the times of day and the level of supervision available
in each space
D. adding a school resource officer to the staff to supervise transitions

2. Another name for the information security triad is:


A.  The FBI triad.
B. The ISS triad.
C. The CIA triad.
D. The IST triad.

3. Which one of these represents the property of keeping an organization


information accurate, without error, and without unauthorized
modification?
A. Availability
B. Integrity
C. Confidentiality
D. Accountability

4. Which of these statements is advice shared by experts in addressing


school violence?
A. practice drills to safeguard your school
B. focus on youth, as they are the most likely perpetrators in
schools
C. rely completely on law enforcement for your crisis response
D. use codes that will be difficult for others to understand

5. Why should regular inspections of the workplace take place


A. To check whether the working environment is safe
B. To check everone is doing their job
C. To prepare for a visit from a HSE inspector
D. To check that all staff are present and correct
6. Accidents are best prevented by

A.  The Health and Safety Executive


B. Employers inspecting workplaces
C. People being aware of hazards and working in a safe manner
D.   The Managing Director

7. Which of the following conditions does not constitute 'human security'?


A.  A condition where people are given relief from the traumas that
afflict human development, are safe from threats and are protected
from hurtful disruptions to their daily lives.
B. A condition in which every citizen is free from the threat of
physical violence, regardless of their race, ethnicity or other
identity.
C. A condition where people are guaranteed the ability to live and
develop, free from political oppression or prejudice, safe from
threats posed by their own or external state actors.
D.  A condition where people exist independently of state support,
where human life is self-sufficient in that individuals do not require
the assistance of state apparatus in order to live securely.

8. How can we define the role of the state in achieving human security?

A. The state is the most prominent threat in terms of committing


violent acts against humans, thus directly threatening human
security.
B. The state has the greatest material resources and power with
which to secure the human referent object.
C. In the short term it is unhelpful to adopt a hands-off states and
policy approach, as there are many current crises in which people
need immediate relief from atrocities.
D. All of the above.

9. Which of the following is an external threat to a computer or a


computer network?
A. Ignorance
B. Trojan Horses
C. Adware
D. Crackers
10. Viruses are ______.
A. Man made
B. Naturally occur
C. Machine made
D. All of the above
References:

https://www.hseblog.com/difference-between-the-safety-and-security/
http://www.differencebetween.net/language/words-language/difference-
between-safety-and-security/
https://en.wikipedia.org/wiki/National_security
https://www.slideshare.net/odrithegreat/campus-security-safety-40109474
https://www.slideshare.net/johannavillareal/threats-to-national-security

Answer Key:
FEEDBACK ASSESSMENT
T/F
1.(INTEGRITY) 1. False 6.False
2.(SOCIAL ENGINEERING) 2. True 7. True
3.(TORT) 3. False 8. False
4.(WAIVER) 4. True 9. False
5.(2004) 5.True 10. True
6.(MALWARE). Multiple Choice
7.(INFORMATION) 1. D 6. C
8.(ENCRYPTION) 2. C 7. D
9.(UTILITY) 3. B 8. D
10.(FAMILY) 4. A 9. A
5.A 10. A

You might also like