Unit 5
Unit 5
Unit 5
LEARNING OUTCOMES
INTRODUCTION
Security and safety challenges rank among the most pressing issues of modern times.
Challenges such as, cyber-crime, terrorism, environmental disasters and threats to campus
securit; impact the lives of millions across the globe. These issues also rank high on the agenda
of politicians, international organizations, businesses and educators. In the current,
interconnected world, security challenges are becoming increasingly complex. Facilitated by
developments as globalization and the spread of networked and hyper-connected technologies,
new safety and security challenges arise and impact local, national, regional and international
levels, which dramatically increases their complexity and scale. As such, solutions to
contemporary security challenges require a wide array of actors operating on multiple levels of
governance. The topic will introduce you to the broad theme of security and safety in an
increasingly complex world. Together we will search for answers to important questions: what is
security and safety? How can we understand complex modern-day security and safety
challenges? And how do we deal with such challenges? This topic also elaborate the different
measures to national, human, information, as well as campus security.
Learning Objectives:
What is Security?
Security is highly focused on the deliberate actions that are geared towards inflicting harm to an individual, organization, or even assets.
What is Safety?
The term safety is used to refer to the condition of being protected from the aspects that are likely to cause harm. In addition, the term
safety can be used to refer to the state at which one has the control of the risk causing aspects hence protecting himself or herself against
risk that is fully unintended.
Difference Between Safety and Security
SECURITY SAFETY
Deliberate and
Unintended Deliberate Threats Unintended Threats
One of the primary difference between the two terms is their definition. Security refers to the protection of individuals, organizations, and
properties against external threats that are likely to cause harm. It is clear that security is generally focused on ensuring that external
factors do not cause trouble or unwelcome situation to the organization, individuals, and the properties within the premises. On the other hand,
safety is the feeling of being protected from the factors that causes harm. It is also important to highlight that an individual who controls the
risk causing factors has the feeling of being safe.
Emotional Aspect
The second difference is that the feeling of being safe is an emotional aspect while security has to do with physical aspect. An
individual feels safe when he or she is embraced by the loved ones which means that his or her emotional safety has been taken care of.
Similarly, young children have the sense of being safe when they are close to their mother or father because he or she provides for both emotional
and physical aspect. On the other hand, the aspect of security comes with physical aspects like tall walls that are protecting an individual
from external threats. In addition, an individual has the sense of security if he or she has a physical weapon like gun that can be used to deal
with external threats.
External Versus Internal
It is important to highlight that security is mostly an external affair while safety is an internal aspect. People looking for security ensure that
they are highly protected against external factors that are likely to harm them. On the other hand, an individual within the organization might cause the
essence of lacking safety or a party might make himself or herself not to feel safe. For example, security analyst and the forces mandated with
ensuring security secure the perimeter of the organization, assets, or even an individual hence shielding against any external threats. However, they are not
concerned with the internal aspects. A person might have large security force but may be feeling the absence of safety, especially if he or she does
not have peace with personal being.
Deliberate and Unintended
The other notable difference between security and safety is that security is the protection against deliberate threats while safety is the aspect
of being secure against unintended threats. People and properties are usually protected against deliberate threats that are caused by criminals
who have the intention to sabotage the operations of the company, steal resources of the organization, or harm an individual. This means that security
is geared towards the protection against criminal activities that are perpetuated by criminals. On the other hand, the safety of a person is mostly
installed so that a person can be protected against unintended accidents. For example, individuals are required to wear safety clothes in an
organization that deals with chemicals so that they can be protected against the accidents.
Coverage
The broadness at which each term covers seems to be significantly different. Security is a major affair that covers a wide area and goes even
further to be an international aspect. Countries ensure the safety of their citizens by instilling security measures at the borders and at their
airspace. One of the major roles of the government is to provide sufficient security, especially against external threats. Safety does not
cover wide coverage and usually involves the premises of a house, company, and institution. It is also essential to highlight that there can be not
safety if security is not guaranteed.
THREATS T O N A T I O N A L SECURITY
National Security – is a state or condition where our most cherished values and beliefs our democratic way of life, our institutions of governance and our unity, welfare and
well- being as a nation and people are permanently protected and continuouslyenhanced.
F undamental E lements:
There are seven ( 7 ) fundamental elements that lie at the core which therefore further amplify our definition of national security. At the same time, they constitute the most
important challenges we face as a nation and people.
1.socio – political stability-We must achieve peace and harmony among all Filipinos, regardless of creed, ethic origin or social station. The government and the people must
engage in nation – building under the rule of law, constitutional democracy and the full respect for human rights.
2.territorial integrity- we must ensure the permanent inviolability of our nation territory and it’s effective control by the government and the state.
3.Economic solidarity and strength – we must vigorou pursue a free – market economy through responsible entrepreneurship based on social conscience, respect for the
dignity of labor and concern for the public interest.
4.ecological balance – national survival rests upon the effective conservation of our natural environmental in the face of industrial and agricultural expansion and population
growth.
5.cultural cohesiveness – our lives as a people must be ruled by a common set of values and believe grounded on high moral and ethical standards, drawn from our heritage
and embodying a Filipino standard identity transcending religious, ethic and linguistic differences.
6.Moral – spiritual consensus – we must be propelled by a nationalvision inspired and manifested in our words and deeds, by patriotism national pride and the advancement
of national goal and objective.
7.external peace – we must pursue constructive and cordial relations with all nations and peoples, even as our nations itself must chart an independent course, free
from external control, interference or threat or aggression.
INTERNAL THREATS
our national security environment is infused with four important dimensions. Internal threats to our national security make up the first dimension.
1.Moro Islamic Liberation Front ( MILF ) – the MILF in constructive peace negotiation, the armed activities of the group continue to be a source of serious concern,
particularly the build-up its defensive and offensive capabilities. Hand in hand with this security problem is the threat from the Abu Sayyaf Group (ASG), a small band of
highly mobile terrorists with suspected links to international networks.
2. The Communist Party of the Philippines/New People’s Army/National Democratic Front (CPP/NPA/NDF)-continuous ton pose a serious threat to national security,
although presently weakened in comparison with their peak strength in the period 1985-87.
3. The Communist Party of the Philippines/New People’s Army/National Democratic Front (CPP/NPA/NDF)-continuous ton pose a serious threat to national security,
although presently weakened in comparison with their peak strength in the period 1985-87.
4. Grave incidence of poverty -is also a serious threat top national security, especially to the extent that it breeds rebellion, crime and dissidence. Poverty incidence affects
about one-third (1/3) of Filipino nationwide.
5. Economic sabotage- undermines the market economy, the financial system and the nation’s resources. Under this category are underground activities such as
counterfeiting, money laundering, large-scale smuggling, inter-oceanic poaching and commercial dumping.
6. Graft and corruption -has become another threat to our national security by virtue of the huge scale by which it saps public resources, undermines the morale of the civil
service and affects the delivery of quality basic services.
7. Severe calamities - cause serious food shortages, abet hoarding and profiteering tool stands at more than 13,000 lives lost and p179 Billion worth of property destroyed.
8. Persistent environment degradation –poses a long term security threat. The attrition of forest and watersheds, air-land-water pollution and the proliferation of toxic
substances are a cause of sickness, death and the diminution of national productivity and well- being.
EXTERNAL THREATS
1. The multi lateral dispute over the Spratly Island, is a source of intermittent tensions, owing to the build up structures, believed to be military -oriented , by some claimant
countries in the area.
2. The smuggling firearms and contraband, illegal migration and occasional movement of foreign terrorists through the porous borders of our southwestern frontier have
elicited transnational concern. Philippine law enforcement agencies work closely with international police organizations, bilaterally and multilaterally, to check these
activities.
3. The lingering effects of the currency crisis affecting the countries within the Association of South East Asian Nations ( ASEAN ) are a cause of regional anxieties
which tend to aggravate the political instabilities and socio-economic dislocations involving the poorest people.
4. The serious economic disparity between rich and poor nations keeps the world in a state of instability and virtually on the brink or war in many places.
5. Ethnic, religious and cultural conflict pervades many regions and nations including our own. It is constantly exacerbated by mass poverty, limited access to
resources, denial of human rights, lack of national integration and international issues.
Please watch the video
https://youtu.be/LeZhLkF0Bfo
Freedom for Fear
Different from "Freedom from Fear", it expands the focus beyond violence
with emphasis on development and security goals.
HUMAN
SECURIT
Y
CATEGO
RIES
Economic Security Food Security
Some of the criteria associated with economic security include Food security requires that all people at all times have both physical and
economic access to basic food. According to the United Nations, the
insured basic income and employment, and access to such social overall availability of food is not a problem, rather the problem often is the
poor distribution of food and a lack of purchasing power. According to
e.g. freedom from poverty UN, the key is to tackle the problems relating to access to assets, work and
safety net.
assured income (related to economic security).
Health Security
is more complex, and covers many different issues such as access to safe water,
living in a safe environment, access to health services, access to safe and
affordable family planning and basic support during pregnancy and delivery,
prevention of HIV/ AIDS and other diseases, and to have basic knowledge to
live a healthy life.
e.g. access to health care and protection from diseases
Personal Security
aims to protect people from physical violence, whether from the state or
Environmental Security external states, from violent individuals and sub-state actors, from
domestic abuse, or from predatory adults. For many people, the greatest
is straightforward and cover such issues as prevention of water pollution, source of anxiety is crime, particularly violent crime.
prevention of air pollution, prevention from deforestation, irrigated land
conservation, prevention of natural hazards such as droughts, floods, cyclones, e.g. physical safety from such things as torture, war,
earthquakes etc. criminal attacks, domestic violence, drug use, suicide, and
e.g. protection from such dangers as environmental pollution and depletion even traffic accidents
Political Security
Community Security
is concerned with protection of human rights and well-being of all people. It also
on the other hand covers conservation of traditional and cultures, languages
includes protection against people from state repression such as freedom of press,
and commonly held values. It also includes abolishment of ethnic
freedom of speech, and freedom of voting. Abolishment of political detention,
discrimination, prevention of ethnic conflicts, and protection of indigenous
e.g. survival of traditional cultures and ethnic groups as well as the imprisonment, systematic ill treatment, and disappearance are also covered under
physical security of these groups political security.
e.g. enjoyment of civil and political rights, and freedom from political
oppression
Assessment
Essay Rubric
Category 4 3 2 1
Focus on There is one clear Main idea is not Main idea is The main idea is not
Topic(content) well focused topic. supporting somewhat clear but clear. There is
Main idea stands out information in there is a need for random collection of
and is supported my general. supporting information.
detailed information.
information.
Support for topic Relevant quality Supporting details Supporting details Supporting details
(content) details give the and information are and information are and information are
reader important relevant, but one key relevant, but several typically unclear or
information issue of the storyline key issues of the not related to the
is unsupported. storyline are topic.
unsupported.
Grammar and Makes no errors in Makes 1-2 errors in Makes 3-4 errors in Makes 4 errors in
spelling grammar or spelling grammar or spelling grammar or spelling grammar or spelling
that distract the that distract the that distract the that distract the
reader from the reader from reader from the reader from the
content. content. content.
Defendants in tort cases can either be natural or artificial being. Corporations are civilly liable in the same manner as natural persons.
Any person who has been injured by reason of a tortious conduct can sue the tortfeasor.
The primary purpose of a tort action is to provide compensation to a person who was injured by the tortious conduct of the defendant.
Preventive remedy is available in some cases.
The obligation imposed by article 2176 is demandable not only for one’s own acts or omissions, but also for those of persons for whom one is responsible.
“Whoever, by act or omission causes damage to another, there being fault or negligence, is obliged to pay for the damage done. Such fault or negligence, if there is no
pre-existing contractual relations between the parties, is called a quasi-delict and is governed by the provisions of this Chapter.” when the persons herein mentioned prove
that they observed all the diligence of a good father of a family to prevent damage.
Liability by teachers, school administrators and educational institutions arising from negligence
Liability by teachers, school administrators and schools for injuries caused by persons in their custody or employment arising from negligence
Liability by teachers and school administrators resulting to reckless imprudence due to gross or inexcusable lack of precaution
Subsidiary liabilityby employers, teachers and other persons for crimes committed by their pupils, workmen, apprentices, employees or servants
Liability by educational institutions for breach of contract in ensuring that adequate steps are taken to protect students’
Liability by
Teachers and
School
Negligence is not necessarily implied whenever someone is injured. The questions to be considered are:
Adminstrators Article 2176 (Philippine Civil Code)
“Whoever, by act or omission causes damage to another, there being fault or negligence, is obliged tom pay for the damage done. Such fault or negligence, if there is no
pre-existing contractual relations between the parties, is called a quasi-delict and is governed by the provisions of this Chapter.”
Q: Aside from the teacher and head of the school, can the school itself be made liable?
A: In general, the liability of the teacher does not extend to the school.
Principle of Vicarious Liability:
U.S- negligence of the employee is conclusively the negligence of the employer
Philippines- employer is not liable for the negligence of the employee, students or apprentice
Q: May a teacher escape liability for outings and activities held outside the school but authorized by the school?
A: Art 218 of the Family Code states that “authority and responsibility shall apply to all authorized activities whether inside or outside
the premises of the school, entity or institution.”
Liability by
Educational
Institutions and
Adminstrators Art. 2180 (Civil Code).
The obligation imposed by article 2176 is demandable not only for one’s own acts or omissions, but also for those of persons for whom one is responsible.
The responsibilityfor Damages
treated of in this article shall cease when the person herein mentioned proved that they observed all the diligence of a good father of a family to prevent
damage.
caused by
Employees
Liability by
Teachers and
Adminstrators
This is due to gross or inexusable lack of precaution in doing or failing to do an act resulting in material damage to another.
due to Reckless
Teachers and school administrators may also be held criminally liable for imprudence (negligence) should they be found guilty of inexcusable lack of
precaution in doing or failing to do an act which results in material damage to another, taking into consideration their employment and occupation, intelligence,
physical condition and otherImprudence
circumstances regarding persons, time and place in determining the degree of care which is required in each particular situation.
Liability will be based on criminal negligence (culpa criminal) under Article 365 of the
Liability by
Teachers for
As long as students are in attendance at school including recess time and class time
Damages caused Art. 2180. (Civil Code)
Lastly, teachers or heads of establishments of arts and trades shall be liable for damages caused by their pupils and students or apprentices, so long as they remain in their
custody. by Students
In case the party causing the damage or injury to students are not members of the educational community, educational institutions may still become liable for breach of
contractual obligation of providing students with an atmosphere that promotes or assists in attaining its primary undertaking of imparting knowledge. Hence, the school
must ensure that adequate steps are taken to maintain peace and order within its campus premises and prevent its breakdown.
Q: Will the school be held liable for the death of a student inside the school’s premises caused by outside assailants?
DEFENS
1. The school must take appropriate precautions to prevent injury through care in enforcing discipline and observance of school rules and regulations upon
students.
2. The school must impose sanctions, guidelines and prohibitions upon teachers and staff.
3. The teacher must prove that due diligence was observed in all things. As to the kind of due diligence, the last paragraph of Art 2180 is clear
“The persons must prove that they have observed all the diligence of a good father of a family to prevent damage”.
WAIVERS
Q: Can a teacher or school escape responsibility by asking parents to file a waiver during field trips and outings?
A: This issue is closely related to liabilities
outside school and Art 2180 is clear that “authority and responsibility shall apply to all authorized activities whether inside or outside the premises of the school, entity or
institution.”
Teacher
asFamily
Acc. To the a Code and Civil Code of the Philippines
Article 218 (Family Code)
The school, its administrators and teachers, or the individual, entity or institution engaged in child care shall have special parental authority and responsibility over the
minor child while under their supervision, instruction or custody.
Authority and responsibility shall apply to all authorized activities whether inside or outside the premises of the school, entity or institution.
Clearly, a teacher or school personnel required to exercise special parental responsibility (in loco parentis) but who fails to observe all the diligence of a good
father of a family in the custody and care of the pupils and students, shall be held liable for gross neglect of duty.
RECOMMENDING SECURITY MEASURES FOR INFORMATION SECURITY
INFORMATION SECURITY
Information Security is the practice of defending information from unauthorised access, use, disclosure, disruption, modification, recording or destruction.
Bradley Manning, US soldier: involved in the biggest breach of classified data (7 Lakh Classified files, battlefield videos & diplomatic cables) in US History for
providing files to Wikileaks.
A hacker stole a database from South Carolina‟s Deptt. Of Revenue, exposing 3.6 million Social Security numbers and 3.8 Lakh payment card records. More
than 6.5 Lakh businesses were also compromised.
As per recent article of Indiatimes: As India‟s 108 bn $ IT Service industry is becoming the world‟s favoured outsourcing centre, India is emerging as a top
destination for cyber data theft.
Computer Security Losses
DID YOU KNOW?
In 1980 a computer cracked a 3-character password within one minute.
In 1999 a team of computers cracked a 56- character password within one day.
Computer Viruses
Trojan Horse
Address Book Theft
Domain Name System Poisoning
Zombies (Enslaving of Computers), IP Spoofing (Replicating IP adress)
Password grabbers
Network Worms
Hijacked Home Pages
Denial of Service attacks
Phishing
Identity theft
Social Engineering
Social Engineering
Social Engineering is the art of deceptively influencing a person face to face, over the phone, via e mail, etc. to get the desired information. For an organisation with more
than 30 employees one expert puts the success rate of social engineering at 100%.
For eg.-
Convincing an employees to share a company password over the phone or chat
Tricking someone into opening a malicious e mail attachment
Sending a “free” hardware that‟s been pre- infected
Typical Symptoms
File deletion
File corruption
Visual effects
Pop-Ups
Computer crashes
Threat Consequences
Unauthorized Disclosure
exposure, interception, inference, intrusion
Deception
masquerade, falsification, repudiation
Disruption
incapacitation, corruption, obstruction
Usurpation
misappropriation, misuse
Data Data
Integrity Confidentiality
CONFIDENTIALITY INTEGRITY
Preventing disclosure of information to unauthorised individuals or Maintaining and assuring the accuracy and consistency of data
systems. For eg. A Credit Card transaction. over its entire life- cycle. This means the data cannot be modified
The system attempts to enforce confidentialityby encrypting in an unauthorised or undetected manner.
the card number during transmission from buyer to seller.
AVAILABILITY
The information must be available when it is needed, to ensure its
utility. This means that the computing systems used to store and
process the information, the security controls used to protect it ,
and the communication channels used to access it must be
functioning correctly.
Measures for Information Security
Make sure operating system and virus protection are up- to-date
This will avoid vulnerability to hackers and others looking to steal information.
Learn to be security-aware
Being aware and alert to the environment can prevent any disaster.
Important Points
Classified documents should be kept in special filing cabinets, special vaults etc.
It should be in the personal custody of the concern authorised official
These should be kept locked when not in use.
These should be numbered and logged
When passing from one authorised person to the next , written signed receipt should be taken.
Shouldn‟t be taken out of premises ideally , otherwise they should be sent only in sealed boxes in double
sealed cover
IBasic Guidelines ISecurity Technologies Used
Do not take unusual precautions –this will attract attention – act normal
Persons having the confidential information should be made personally
responsible for protecting the same
Security must be sensible or low profile
Security should be organised in depth
Enforce control of copies of documents
Proper control of waste paper and destruction
Check all meeting places for „bugs‟
Be wary of consultants
Edit your journals
Nothing will remain secret, if more than two persons share the same
Feedback
Direction: Read each statement or question below carefully and fill in the
blank(s) with the correct answer. Answers may be more than one word.
1. Maintaining and assuring the accuracy and consistency of data over its
entire life- cycle. Is data _______________________.
2. ___________________ is the art of deceptively influencing a person
face to face, over the phone, via e mail, etc. to get the desired information.
3. ______ law concerns civil wrongs and addresses the duty, breach and
injury sustained to one individual as a result of another’s conduct. An
unlawful violation of private right, not created by contract, and which
gives rise to an action for damages.
4. A ________ is an essential document that informs participants of the
risks involved in certain activities and also protects you from liability.
5. In year _________ a computer virus infected 1 million computers
within one hour.
6. __________is the collective name for a number of malicious software
variants, including viruses, ransomware and spyware.
7. Information Security is the practice of defending _______________
from unauthorised access, use, disclosure, disruption, modification,
recording or destruction.
8. ___________ is the method by which information is converted into
secret code that hides the information's true meaning.
9. The information must be available when it is needed, to ensure its
_______.
10. Art 218 of the _______ Code states that “authority and responsibility
shall apply to all authorized activities whether inside or outside the
premises of the school, entity or institution.”.
TRUE OR FALSE
__________ 1. When the database and software library are made available
to persons not entitled to have access it is referred to as unauthorized use.
(F)
____________ 3. Firewalls act as filters and barriers that restrict the flow
of data to and from the firm from the World Wide Web. (F)
MULTIPLE CHOICE
Choose the best answer
1. Which of these is not a feature of the safety assessment whereby
students, parents, and staff "map" the vulnerable spaces and times in their
school and campus?
A. providing students, staff, and parents with copies of the school's
floor plans
B. asking students to show on a floor plan the areas they perceive as
less safe
C. considering the times of day and the level of supervision available
in each space
D. adding a school resource officer to the staff to supervise transitions
8. How can we define the role of the state in achieving human security?
https://www.hseblog.com/difference-between-the-safety-and-security/
http://www.differencebetween.net/language/words-language/difference-
between-safety-and-security/
https://en.wikipedia.org/wiki/National_security
https://www.slideshare.net/odrithegreat/campus-security-safety-40109474
https://www.slideshare.net/johannavillareal/threats-to-national-security
Answer Key:
FEEDBACK ASSESSMENT
T/F
1.(INTEGRITY) 1. False 6.False
2.(SOCIAL ENGINEERING) 2. True 7. True
3.(TORT) 3. False 8. False
4.(WAIVER) 4. True 9. False
5.(2004) 5.True 10. True
6.(MALWARE). Multiple Choice
7.(INFORMATION) 1. D 6. C
8.(ENCRYPTION) 2. C 7. D
9.(UTILITY) 3. B 8. D
10.(FAMILY) 4. A 9. A
5.A 10. A