Values Of Security In Kenya

Improved Essays
What are the Academic and policy value of learning physical security studies in Kenya?
Abstract
Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism.
Physical security is often overlooked (and its importance underestimated) in favor of more technical and dramatic issues such as hacking, viruses, Trojans, and spyware. However, breaches of physical security can be carried out with little or no technical knowledge on the part of an attacker. Moreover, accidents and natural disasters are a part
…show more content…
The result of this approach is a network of objectives where the fundamental objectives are the areas of concern that can be used in decision making in security planning. The fundamental objectives were found to be in line with the acknowledged goals of physical security, e.g. deterrence, deception, detection, delay, denial of access, respondent, mitigation.
The academic value of learning physical security in Kenya is to offer students the opportunity to learn the principles and theories associated with various types of security, from international security to information security focused on protection of assets. They get to study global terrorism, legal and ethical issues, physical security, program evaluation, and security administration by:-
• Identifying organizational/national security risk exposure; cost-effective mitigation strategies; and prepare for recovery strategies.
• Employing the use of risk analysis and vulnerability assessment processes.
• Critically examining the variety and extent of losses from criminal acts, natural disasters, and security breaches facing
…show more content…
Research done by academicians combined by security professionals from both government and private sector assist in the policy formulation of the national security of our country. Their expertise is very much utilized in preparation of laws governing private security in Kenya.
It is because of the aforementioned that security managers of established organizations and institutions must have knowledge and be able to carry out the following:-
Risk management & planning: Must have knowledge on what constitutes a risk, how to prepare a risk management plan, and how to identify the key management stakeholders
Basic system design and layout: - To understand system layout strategies. When to design and who should design systems, expectations, infrastructure and more. Find out how the design and layout relates to system specifications, procurement and deployment.
Ligation issues and mitigation: - The security professional`s role in legal issues such as information and property theft, armed intruders, contracts. Know who you should go for advice and how it impacts

Related Documents

  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    These studies might show labor hours needed, hardware and software costs, utility costs and prevention of data lost. Another aspect of computer security is disaster recovery, this might include damage caused by a natural or manmade occurrence. Computer equipment that is damaged might include sensitive information stored on hard drives and these would either need to be recovered or disposed of. The key decision makers in a security project would include: Chief Executive Officer: The most senior corporate officer reports to the board of directors.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Since the tragic incidents that took place in 2001, the level of security for government agencies has grown exponentially. According to the U.S. Security Spending Since 9/11 (2011), “The United States has spent more than $7.6 trillion on defense and homeland security.” This statistic caused a group of veterans to look at their surroundings and contemplate what is happening at home, where their families live and work? After much consideration and evaluation of current statistical and analytical data, two veterans, both from the U.S. Army, developed a plan to fill a negated market; Americas’ communities. They are vulnerable to activities that even law enforcement has a difficult time managing.…

    • 1363 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    In identifying whether an organization is a Zero-Based Organization or a World-Class Organization, in relation to its’ homeland security profile, an assessment team would review and assign a score to each area of an organization’s strategic and business needs. It is especially important for the assessment team members to consider the Baldrige Scoring Guidelines and validate their score against the Homeland Security Scoring Profile to ensure that together both, the Baldrige Scoring Guidelines and the Homeland Security Scoring Profiles, adequately describe the organization’s homeland security preparedness level that each question addresses throughout the assessment” (Fisher, 2004). Once the assessment team has assigned a score to each of the…

    • 599 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Local communities are tasked with assessing their own risks for their area. The probability and severity of the situation dictates how much a community should be prepared to deal with a terrorist attack. The exercises should be specific to the expected occurrences and outcomes. With the advisement of federal agencies, the local emergency management working group will develop the response plan. While running the exercises, the local communities can learn where they need to improve and what they performed well at.…

    • 1724 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    The Department of Homeland Security is an appropriate organizational design for several essential elements which are transferring immigration and naturalization service, border patrol, U.S. customs service, animal and plant health inspection service, U.S. Coastguard, and transportation security administration. The intelligence community mission is to supply the homeland security enterprise with timely intelligence information that is needed to protect, safe, resilient, and secure the United States. Also, national strategy defined homeland security as preventing the United States against terrorist attacks, decrease the America vulnerability to terrorism, reduce damage, and recover from terrorist attacks when it does occur (Burch, 2008). Moreover,…

    • 619 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “The criticality assessment is based upon the consequence of loss of many types of assets, such the number of people at risk, national security and/or The Department of Defense missions. It requires identifying and analyzing missions and supporting systems to identify Task Critical Assets (TCAs) and their dependency relationships on Supporting Infrastructure Critical Assets (SICAs). The consequence of the loss or degradation of these assets on the execution of Mission Essential Tasks (METs) and/or to elements of national security is the primary means of determining their criticality in the Risk Assessment process” (Assistant Secretary of Defense for Homeland Defense and Global Security Risk Management). The criticality assessment is a valuable tool not only for terrorist related attacks or threats, but for natural disasters as well. This assessment also assist’s government officials and emergency management personnel in establishing a system of priorities regarding protection based on the nature of the emergency or…

    • 626 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    These sectors were also the target of homeland security assessments as they play a vital role in the homeland security process. References Fisher, D. C. (2004), Homeland security assessment manual: A comprehensive organizational assessment based on Baldrige criteria. Milwaukee, WI: ASQ Quality Press Van Opstal, D. (2007). Transform: The Resilient Economy: Integrating Competitivness and Security.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Brilliant Essays

    P5-8 Oxford Journals. 1 (1) Purpure, P. (2007). Security and Loss prevention: an Introduction. P 356.…

    • 3275 Words
    • 14 Pages
    Brilliant Essays
  • Improved Essays

    It is important to remember that protecting the homeland from terrorism is extremely expensive and time sensitive. That is all the more reason to comprehend the importance of the risk management formula. Moreover, it’s crucial to assess the threats and the vulnerabilities of the targets in order to determine which target and threat is more important at the…

    • 1238 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Initially, when the Department of Homeland Security was created I, along with many Americans believed its sole function was to assist in the prevention and management of future terrorist incidents. However, as time progressed, and the department became more established and reorganized it began to emphasize on; preparation, prevention and mitigation of a much wider scope of hazards (Haddow, Bullock, & Cappola, 2014). Some of that wider scope contains natural disasters in addition to the threat of terrorism. Furthermore, the Department of Homeland Security also involves the assessment on infrastructure and communities to help businesses and local government manage resources to enhance security and recovery before and after an event (DHS, 2017).…

    • 784 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The United States Department of Homeland Security (DHS) is a federal agency designed to protect the United States against threats. Its wide-ranging duties include aviation security, border control, emergency response and cybersecurity. Furthermore, the 2002 National Homeland Security Strategy had three objectives which were to prevent terrorism, reduce vulnerability to terrorism, and minimize damage and recover if a terrorist attack occurs. however, in 2007 the goals of DHS became prevent and disrupt terrorist attacks, protect the people, critical infrastructure and key resources, respond to and recover from attacks, and strengthen the foundation for long-term success. Nonetheless, the strategy has been changed several times; and the most…

    • 560 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Identifying and managing risks is a critical responsibility of project managers. Risk is defined as the probability of a specified threat and the subsequent impact that the event produces (Vaidyanathan, 2013). Risks can also bring about either positive or negative outcomes for a project or organization. A project manager must identify potential risks and evaluate each one to determine the severity and likelihood of each event. Only by completing the risk management process, a project manager can determine what approach would work best to avoid, mitigate, and/or transfer the risk.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Homeland Security and Critical Infrastructure The events of September 11, 2001, highlighted significant gaps in the country’s emergency preparedness and more specifically, its ability to identify threats and protect against terrorist attacks. The resulting analyses of the incident and the response efforts stressed the need for an overarching program that would coordinate the efforts of a multitude of government agencies with competing goals and requirements. A program that would improve the transfer of critical intelligence and maximize response efforts.…

    • 1808 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    This element mainly contains traditional risks associated with an organization and its operations. However, with the ever growing continuum of information technology, majority of institutions have found that cyber risks are where they’ve found to have imperfect transparency and understanding of risks. On top of cyber risks, regulation and the constant changing of regulatory requirements makes it difficult for organizations to have accurate transparency or insight. Among these factors have one common element; that is these two types of risks are new. New risks introduced into an organizations risk management have to have data compiled in order to create a certain security measure that protects the business from these types of loss exposures.…

    • 700 Words
    • 3 Pages
    Improved Essays