Security Studies

In: Business and Management

Submitted By fredcheps
Words 3288
Pages 14
Securitization Theory
Author
Institution

Course title
Instructor
Date

Critically discuss the securitization theory – using the case study of War on terror in Afghanistan (2001-2012)
Introduction
Security study was in the past regarded as a sub-discipline of international relations underpinned in Anglo-American thinking. Until early 1990s, security studies were considered as a strategic studies focusing on a strong military focus. This traditional view of security involved the protection of the state and a scientific agenda to secure the state from definable threats and maintain the status quo. This is a positivist approach which was based on rationalism and realism. The Copenhagen School presented an alternative view of security studies by responding to the traditional approach of forming a clear sense of ‘what is security’. This approach is defined in three mechanisms: development of sectors approach to security, developing a regional focus on security and critically engendering a social constructivist theory of security through securitization studies. This theory will be the main focus of this discussion. To achieve a critical discussion of what securitization really entails, this paper will use the case study of USA’s war on terrorism in Afghanistan. The approach used by the US government to fight against terrorism in Afghanistan and Iraq can be considered as a securitization approach which has led to a resulted in security problems in the two countries rather than solving the issue. Securitization of USA’s war on Afghanistan can be viewed in three perspectives: securitization by the president and the government, securitization by the media and securitization by the society. In this case, the paper will attempt to explain how sectors such as political, social and economic sectors influence or result in securitization. This will be done with a…...

Similar Documents

Case Study Security Facilitiy Assesstment

...hint. 1. If the Run UltraLock.exe file is not already present on your drive: a. Download the UltraLock Premium installation file from the UltraLock website (www.ultra-lock.com) in the download directory. b. Connect the removable drive to a PC. c. Double-click the installation file to install the Run UltraLock.exe file to the drive. 2. If the Run UltraLock.exe is already present on your drive, then Double-click the Run UltraLock.exe file. 3. Review the license in the UltraLock End User License Agreement dialog box. 4. To accept the license agreement, click I Accept. (If the user does not accept it, they cannot use the software.) 5. For Enterprise mode setup, in the UltraLock Server Setup dialog box, enter the server connection URL in the Security Server URL box if the URL is not already displayed and enter your email address. You will also be required to verify your email address by entering it a second time. Then click OK. – or – If the server connection URL is displayed, click OK. If you want to learn more about Enterprise mode setup and features, please read Section IX of this document. Note: The UltraLock Server Setup dialog box only displays during Enterprise mode setup. 6. In the UltraLock User Setup dialog box, enter the password, hint information, and click OK. The UltraLock window that enables the user to perform encryption operations displays. Note: The password is case-sensitive and the hint answer must be eight characters or longer. II. Encrypting Files and......

Words: 2861 - Pages: 12

Securities Regualtions Study Guide

...XVI. Securities Regulation - 1933 Act A security is a contract, transaction or scheme whereby a person invests his money in a common enterprise and is led to expect profits solely from the efforts of a promoter or a third party (Howey test) Provide investors with information for securities offered for sale and to prohibit fraud in the sale of securities. The 1933 Act governs the public distribution of securities. It prohibits the offer or sale of securities to the public unless the offering is properly registered. A. Persons covered are underwriters, dealers and issuers. 1. Underwriter purchases securities from an issuer with the intent to distribute to dealers and/or the general public. E.g. UBS 2. Dealer sells or trades securities. E.g. Charles Schwab 3. Issuer is an entity whose securities are being sold. E.g. IBM B. Section 5 of the 1933 Securities Act It governs sales through interstate commerce. A registration statement must be filed with the SEC and a prospectus prepared. Periods are: 1. Pre-filing: It is unlawful for issuers, underwriters or dealers to sell securities. 2. Filing: The registration statement is effective 20 days after filing with SEC. Securities cannot be sold during the waiting period but offers such as “tombstone” ads are allowed. They include the name of the company, kind ...

Words: 2861 - Pages: 12

A Study of Captcha for Web Security

...A Study of CAPTCHA for Web Security Abstract— As the increase of Internet usage in term of available services provided, user gains more convenience but also face a challenge. Online services such as Email, search engine, social networking may be abused by the automated program or web bots. To ensure the service is used by human, most of them use Completely Automated Public Turing test to tell Computers and Human Apart (CAPTCHA) methods to securing their web services. This paper will discuss the various types of CAPTCHAs and issues in designing the good CAPTCHA in term of security and usability. Keywords: CAPTCHA, TEXT-Based, GRAPHIC-Based, AUDIOBased, Robustness, Usability Online Polls: Result of any online poll can only be trusted if the poll system ensures that only humans can vote. Preventing Dictionary Attacks: CAPTCHAs can also be used to prevent dictionary attacks in password systems. Search Engine Bots: Configuring the website as nonindexed page is important to prevent others from finding them easily. This is why CAPTCHA is important Worms and Spam: CAPTCHAs also offer a reasonable solution against email worms and spam which only accept if the sender is a human [2].   I. INTRODUCTION  A CAPTCHA which is stand for Completely Automated Public Turing test to tell Computers and Human Apart is a challenge response test which gives a challenge to the users. It is one of Human Interaction Proofs. When the user gives accurate answer he is considered......

Words: 2733 - Pages: 11

Security Studies: Western Birth and Raise.

...Security Studies: western birth and raise. Literature on security discipline has been initiated from the heart of the western states, it was as early 1942 with the publish of “Qyincy Wright's Study of War, to during world war II which is considered as “the golden age” or the “first wave of security studies“ 1 , during which civilians were more evoked to participate in advocating and planning the world security. Work on literature post nuclear power recognition evolved to cover “alternative strategies, cause of stability, alternative targeting polices, potential value of arms control & role of conventional forces and limited war in the nuclear age”2. American universities trended with the fashionable domain,” major graduate schools for International affairs were founded in such Johns Hopkins & Columbia universities in addition to research centers focusing on national & international security 3. Nevertheless, such a trend have failed to stretch ““the golden age” or the “first wave of security studies” by mid 1960”, as scholars have “failed to produce Ph.D. students”4. Literature shifted after the emergence of U.S-Soviet cold war from the study of the war to the international political economy, due to the US economic deteriorating position, stressing more on the role of economics. Shift also affected topics to investigate, going to application away from theory that has enlightened the scholars of the “golden age”. In once instance Walt stresses has described as more......

Words: 1167 - Pages: 5

Understanding It Infrastructure Security Case Study

...Week 1: Understanding IT Infrastructure Security Case Study Hello my name is YGS and I am an Independent contractor for TJX, they have requested my assistant and I will be in charge of all IT matter at TJX. In recent happenings at TJX you should by now be aware that this company was breached by a hacker by the name of the Albert Gonzalez. He stole over $170 million dollars of customer’s credit card information. As a result TJX has taken a major financial loss and our honor and credibility is in question. The reason we are in question is because it turns out the matter was not discovered until an outside source (our gateway/payment-card processing) partners came in and performed an audit to then discover we were breached. Before the audit we should have caught the transfer of 80 GB of stored data by Mr. Gonzalez. Prior to any breach of this company TJX should have been compliant with the payment card industry compliance and validation regulations. In complying with the Federal Trade Commission (FTC) under FTC jurisdiction our IT team should be consistently taking measures in place to keep customer information secure at all times. By being on top of things we would have been less vulnerable to an attack of this size and speared the embarrassment of not discovering the breach for over seven months. To of eradicated this from ever happening TJX should have made sure that our payment gateway client was compliant with their firewall configuration, protect stored......

Words: 361 - Pages: 2

Security Week 4 Case Study

...Security Threats And Attacks Week 4 Case Study Dustin Soria Security Threats And Attacks Week 4 Case Study Dustin Soria 2014 2014 Recent statistics show that a large percentage of people have the idea that computer security is an issue that only affects organizations. Many people believe that, at a personal level, there is little that one can have to do with their information especially because they don’t see if someone will need their information. In contrast, there is a lot of useful information that a third party may obtain from a personal computer that the user may not even realize. For instance, a user may have sensitive information that would lead to his or her private life, secrets, or even important financial information. Such information can be used by attackers to monitor their internet activities, whether they are logged into their own personal computer on a local network, or even the internet. The victim’s sensitive information can be sold over the internet, or even to third parties such as advertisers and criminals among others. As such, it is important that serious security measures are taken to protect one’s personal computer from such security issues. There are numerous security threats that can be on a personal computer. One of the most common threats is a Virus. A Virus is a piece of software that can replicate itself and infect a computer without the permission or knowledge of the user. A Virus can only spread when it is transmitted by a......

Words: 796 - Pages: 4

Case Study 3: Security

...Case Study 3: Security 1. Analyze the new system and determine the design issues with this new system. With any type of fast-food restaurant grease and other types of oils are used in the process to create the food that is delivered to the customers. Since these oils are being used to create the food the employees need to touch the food and most times to either cook it or deliver the food to the customers. The unfortunate handling of this food causes the employees to get grease on their hands and fingers. This can be an issue with the design because after time the grease built up will cause the screen to become unresponsive or unreadable as well. Another design issue that the new system has is a two part security issue. First is a lack of security giving the ability for employees to login into the register interface for other employees that have forgotten their user id and passwords. This is huge concern for the management because each employee is responsible and accountable for their time on the register and money that goes into the register as well. If other employees are logging into the system for them, and the register comes out short at the end of the night, there is no body to hold accountable for the missing money. This huge security risk for management, all employees should be held accountable for their time on the register and not be logging into the system for other employees. The other security concern that is a design issue with the new system...

Words: 1983 - Pages: 8

Case Study: Mobile Device Security and Other Threats

...Case Study: Mobile Device Security and Other Threats Strayer University Authors Note This paper was prepared for CIS 502 – Theories of Security Management Abstract Mobile communication and computing devices are integral part of today’s business. This provides the executives the opportunity to work from virtually anywhere anytime and became one of the most valuable tools to make business communications. However, due to the nature and size of the device and communication methods, the devices are prone to be lost or compromised and can fall into the hands of unauthorized persons, which makes these devices a very big security concern for the businesses. In this paper the nature of IT related threats faced in 2014 are discussed along with the security issues of mobile devices. a) Security threats presented within the “Security Threat Report 2014” report: The security report of Sophos (Security Threat Report 2014 Smarter, Shadier, Stealthier Malware. (n.d.). Retrieved August 19, 2014, from http://blackboard.strayer.edu/bbcswebdav/institution/CIS/502/1144/Week8/sophos-security-threat-report-2014.pdf) highlights the emerging security risks in the world. It the report, they have identified the following concerns for 2014: a. More efficient Botnets: The botnets become more resilient and stealth by the year 2014. Along with many known attributes, the sharing and copying botnet codes have resulted in emerging new botnets which are being used for various......

Words: 1993 - Pages: 8

Cis 500 Week 6 Case Study 1 Cyber Security

...CIS 500 WEEK 6 CASE STUDY 1 CYBER SECURITY To purchase this visit here: http://www.activitymode.com/product/cis-500-week-6-case-study-1-cyber-security/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 500 WEEK 6 CASE STUDY 1 CYBER SECURITY CIS 500 Week 6 Case Study 1 - Cyber Security in Business Organizations - Strayer University 2015 Version NEW Write a four to six (4-6) page paper in which you: 1. Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information. 2. Specify the red flag(s) that Target overlooked or ignored before the retail attack and give your opinion as to why Target overlooked or ignored the red flag(s). 3. Determine the main actions that Target took after the breach occurred and evaluate the efficiency of such actions. More Details hidden... Activity mode aims to provide quality study notes and tutorials to the students of CIS 500 Week 6 Case Study 1 Cyber Security in order to ace their studies. CIS 500 WEEK 6 CASE STUDY 1 CYBER SECURITY To purchase this visit here: http://www.activitymode.com/product/cis-500-week-6-case-study-1-cyber-security/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 500 WEEK 6 CASE STUDY 1 CYBER SECURITY CIS 500 Week 6 Case Study 1 - Cyber Security in Business Organizations - Strayer University 2015 Version NEW Write a four to six (4-6) page paper in which you: 1. Determine the fundamental challenges that organizations face in......

Words: 685 - Pages: 3

Sec 280 Week 4 Case Study Computer Security

...SEC 280 WEEK 4 CASE STUDY COMPUTER SECURITY To purchase this visit following link: http://www.activitymode.com/product/sec-280-week-4-case-study-computer-security/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 280 WEEK 4 CASE STUDY COMPUTER SECURITY SEC 280 Week 4 Case Study Computer Security Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system Activity mode aims to provide quality study notes and tutorials to the students of SEC 280 Week 4 Case Study Computer Security in order to ace their studies. SEC 280 WEEK 4 CASE STUDY COMPUTER SECURITY To purchase this visit following link: http://www.activitymode.com/product/sec-280-week-4-case-study-computer-security/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 280 WEEK 4 CASE STUDY COMPUTER SECURITY SEC 280 Week 4 Case Study Computer Security Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system Activity mode aims to provide quality study notes and tutorials to the students of......

Words: 904 - Pages: 4

Sec 280 Week 4 Case Study Computer Security

...Week 4 Case Study Computer Security Purchase here http://devrycourse.com/sec-280-week-4-case-study-computer-security Product Description Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. SEC 280 Week 4 Case Study Computer Security Purchase here http://devrycourse.com/sec-280-week-4-case-study-computer-security Product Description Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. SEC 280 Week 4 Case Study Computer Security Purchase here http://devrycourse.com/sec-280-week-4-case-study-computer-security Product Description Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. SEC 280 Week 4 Case Study Computer......

Words: 1201 - Pages: 5

Sec 280 Week 6 Case Study Computer Systems Security

...SEC 280 Week 6 Case Study Computer Systems Security Purchase here http://devrycourse.com/sec-280-week-6-case-study-computer-systems-security Product Description Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days. The organization uses a firewall, three file servers, two Web servers, one Windows 2008 Active Directory server for user access and authentication, ten PCs, and a broadband connection to the Internet. The management at Gem needs you to formulate an incident-response policy to reduce network down time if future incidents occur. Develop an incident-response policy that covers the development of an incident-response team, disaster-recovery processes, and business-continuity planning SEC 280 Week 6 Case Study Computer Systems Security Purchase here http://devrycourse.com/sec-280-week-6-case-study-computer-systems-security Product Description Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days. The organization uses a firewall, three file servers, two Web servers, one Windows 2008 Active Directory server for user access and authentication, ten PCs, and a broadband connection to the Internet. The management at Gem needs you to formulate an incident-response policy to reduce network down time if future incidents occur.......

Words: 1375 - Pages: 6

Sec 280 Week 4 Case Study Computer Security

...Week 4 Case Study Computer Security Purchase here http://devrycourse.com/sec-280-week-4-case-study-computer-security Product Description Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. SEC 280 Week 4 Case Study Computer Security Purchase here http://devrycourse.com/sec-280-week-4-case-study-computer-security Product Description Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. SEC 280 Week 4 Case Study Computer Security Purchase here http://devrycourse.com/sec-280-week-4-case-study-computer-security Product Description Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. SEC 280 Week 4 Case Study Computer......

Words: 1126 - Pages: 5

A Study of the Causes of the Failure of the National Security Personnel System

...A Study of the Causes of the Failure of the National Security Personnel System Andre Zephrine M. Pantaleo, Ph.D., M.B.A. Strayer University April 25, 2010 Context of the Problem The National Security Personnel System (NSPS) is a pay system based upon the caveat of being paid for performance. It was created in 2006 through Congressional authorization especially for the Department of Defense (DoD). Implementation of the system began in 2006 as a replacement for the General Schedule grade and step (GS) system used by the rest of the federal government. NSPS’s policies differ concerning hiring, reassignment, pay, promotion, tenure and recognition. Under the GS system, there are automatic pay increases which do not exist under NSPS. On October 29, 2009, President Obama signed legislation that repealed NSPS and restored DoD employees to the GS pay system. Full implementation of the switch back to the GS system is to occur no later than January 1, 2012. This research proposal proposes that NSPS did not succeed because of poor consideration for review boards, self evaluation, and allowances of discrimination through intention – speculatively – and more importantly unintentionally. This research proposal also posits that because of adverse impacts, similar systems would also be unsuccessful. Statement of the Problem The National Security Personnel System (NSPS) is a pay-for-performance pay system which replaced the General Schedule (GS) grade and step system for......

Words: 4626 - Pages: 19

Security Management Case Study #1

...Case Study #1 Kristian Lauren R. Martin November 6, 2011 Case Study #1 Building the Foundation – Security Assessments As the security manager of a major corporation tasked with creating the initial security assessment and auditing program for the company, the first step in developing proposals for the security services would be conducting a comprehensive survey (policies, procedures and operations) of the entire facility to identify the critical factors affecting the security of the premises (Broder, 2006). The next step would be to analyze the vulnerabilities and recommend protection which is cost-effective (Broder, 2006). To start, establishing policies and procedures which define the mission of the security department should be the bare minimum in the role of the security department. These would include the following: * Protection against internal and external theft (to prevent embezzlement, fraud, burglary, robbery, industrial espionage and theft of trade secrets and proprietary information) * Developing access-control procedures (to protect the perimeter of the facility and other sensitive areas) and anti-intrusion systems * Establishing lock-and-key control procedures * Establishing a workplace violence program * Controlling the movement of people on the premises * Reviewing security personnel hiring and deploying * Establishing emergency and disaster recovery plans * Identifying the resources needed and available for the security......

Words: 802 - Pages: 4

Zindagi Abhi Baaki Hai Mere Ghost | 去吧皮卡丘360版 | En Español 2: Etapa preliminar