SECURITY THREATS AND VULNERABILITIES 4
Security threats and vulnerabilities
Student’s name
Institutional affiliation
Professor’s name
I. Thesis Statement
The following term paper has been designed to give detailed information on issues that deal with security threats and people are actually exposed to these threats. It therefore also covers the levels of vulnerabilities to security threats on the different types of people within a society.
II. Introduction
A. Security threats have always been experienced in various countries and in the same time, countries are struggling to ensure that they are free from security threats either from outside the nation or even within.
III. Major areas of security threat
A. Cyber attacks
· Observed in various governments
· Individuals and cyber attacks
B. Large cities target of terrorists
· Major terrorist activities have taken place in the cities
· Cities are big enough to act as their hideouts (Kelley 2012).
· Cities are associated with administrative activities posting a great threat
IV. Levels of vulnerability
A. May depend on the way a country stores its information especially for cyber attacks
B. Local security in nations may also depend on the economic and social class of one. Those in low economic and social status may be highly vulnerable
C. The security architecture of a nation
V. Ways of preventing security threats
A. Increasing the number of security officers
· They will be able to fight terrorists
B. Investing in companies to understand the consequences of cyber attacks
C. Improving information technology by coming up with software to reduce the rates of cyber attacks
D. Improvement of cloud storage
VI. Conclusion
A. Security is a sensitive issue to any nation and therefore the governments of the various nations should play an important role in ensuring that security is guaranteed to all (Maynard 2006).
References
Ruighaver, A.B. & Maynard, S. (2006). Organizational Security Culture: More than Just an End-User Phenomenon. International Information Security Conference.
Kelley, M. (2012). CONFIRMED: US Counterterrorism Agency Can Amass Data On Any Citizen. Business Insider.
Maynard S. & Ruighaver, A.B. (2006). What Makes a Good Information Security Policy: A Preliminary Framework for Evaluating Security Policy Quality. 5th Annual Security Conference, Las Vegas, Nevada USA.