SlideShare a Scribd company logo
Running head: ISOL 534 – Application Security 1
Running head: ISOL 534 – Application Security 2
Week-2 Research Paper Topic
Name: Nikhil Vasani
Course: ISOL-534
Professor: Dr. Jerry Alsay
University of the Cumberland
May 23, 2019
Introduction
The topic of security has been an issue for many countries and
citizens alike as countries struggle to root out the vice of
insecurity that is posing a great threat especially during this
technological era where everything is virtually done online.
Today every country around the world is grappling with keeping
its citizens and institutions safe from external attacks and
threats. Some of these threats could be motivated by various
factors ranging from political, economic and social issues which
make individuals or groups plan some sort of leveling score
mission. If we were to review history in the early days during
the 17th and 18th century the issues of insecurity among various
nations were in existence but not at the height it is in the wake
of the 21st century. Those days’ strategic alliances worked best
in culminating threats of external and internal invasion, various
leaders would call for peaceful resolution of the indifference
that might exist between or among groups of nations. The mode
or means of attack was not as sophisticated as it today since the
only way terrorists would invade empires those days were
through the physical means of actually leading an invasion
group or plotting with a team on the ground to execute their
plan.
Today this tactic has changed leaving institutions mandated
with protecting our boundaries and keeping the people safe with
a huge task of coming up with various ways of knowing how,
where and when the security threats might actually occur. Some
of the world leading security institutions that have earned a
name for themselves are the homeland security, the Federal
Bureau of Investigation FBI and Scotland Yard. These
institutions have in the recent past prevented so many attacks
plotted against the United States of America and many countries
around the world through tapping the wide insecurity network
around the world.
Background research
The issue of terrorism and external attacks has led to numerous
loss of lives and property and must be cubed and properly
managed using the most efficient methods so as to ensure proper
security. It is evident that terrorists no longer use outdated
strategies while carrying out attacks. With technology evolving
with time, they have learned and mastered the use of new
technology and have succeeded in coming up with some of the
toughest attacks to prevent. Therefore, the DHS is left with a
tough task and must improvise some of the best tactics in their
strategic plan so as to have a proper chance in managing the
situation. The intelligent gathering is one of the best elements
that can be applied by the DHS in order to come up with the
right solutions that will stop or prevent external attacks and
terrorism. This research is objectively going to look at the
effects of the intelligence gathering by the Department of
Homeland Security on the nation and its citizens.
Despite their speckle reputation, the institution agrees they are
facing serious challenges especially in learning the new tactics
terrorists have resorted to. As the common saying goes that the
security of our nation starts with me this statement has lost
meaning to other people who for some reasons have decided to
betray their country and sell it to the highest bidder who is
interested in inflicting terror to the people and the central
authority of this country due to some either economic, political
and social vendetta they hold against this peace-loving nation.
The role of keeping the nation safe cannot be left on the hands
of Homeland security alone as it is a collaborative effort that
requires input from all the sectors of the country. So, the
individuals who are quick to put such institutions into scrutiny
for reluctance on their job should at least do it objectively.
Problem statement
In order for various security institutions of various countries
around the world for instance the Homeland security to be able
to effectively root out this menace of insecurity they must be
able to understand the changing trends extremist groups and
individual use to inflict harm to other nations or people,
conduct thorough prerequisite on the various loopholes that
might be exploited to conduct such heinous acts against
humanity and the sovereignty of a state. The government should
also step in fully to provide adequate funding for this institution
to enable it to execute its mandate properly (Salter, 2013). One
of the critical departments of Homeland security in the
realization of this objective of peaceful coexistence is the
department he manages and ensures security in our borders the
department of border control.
The main issue this department is facing is the issue of
intelligence gathering since we can all agree that for the
institutions to acts swiftly and effectively they must base their
judgmental call to action plan on some intelligence they have
gathered and validated to be crucial leads to the security threats
they are dealing with. For example, the worst ever terrorist
attack to be ever done on American soil that left many people
dead and so many more hospitalize termed the 9/11 attack left
all security agencies with the questions how the terrorist have
managed to pass through all the security checks done on the
border (Girard & Sercia, 2013). This prompted all state and
non-governmental agencies homeland security included to
revisit all their security systems to establish any leaks that
might have been used to smuggling in the perpetrators. Since
then intelligence gathering has been one of the main mandates
of the homeland security the department of border control and
management.
Research question
What security measures can countries come up with to keep
their borders and citizens safe?
According to the statistics on crime, especially terror done by
the London school of economics and statistics indicated that
most of the suspects were immigrants from Muslim extremist
nations. This has made any countries around the world to
toughen some of the regulations that permit immigrants into any
nation (Frazier, 2010). The worst-case scenario is currently
being seen in Italy where caravans of immigrants arrive at the
port of Italy having traveled over the world just to seek refuge.
Well, humanitarians have claimed that a country should not
deny foreign citizens the asylum request if they escaped their
mother country as a result of war and other natural calamities.
Some individuals or groups with ill motives will take advantage
of the situation and smuggle in illegal weaponry for committing
such heinous acts against the human’s race.
Now the department of border control and management is
facing a hard time collecting intelligence about any citizen that
is suspected to be connected to any terrorist group and
apprehend them (Seo, Gupta, Sallam, Bertino & Yim, 2014).
Now the intelligence-gathering process is facing so many
challenges included the underfunding from the government to
enable them to run their intelligence work properly. Also, the
humanitarian bodies that are creating sanctions to countries
refusing to grant asylum to refugees are making the intelligence
gathering process be polities which will definitely affect the
results of such intelligence.
Intelligence gathering is one of the best methods that when
properly utilized by the DHS can vigorously increase the
chances of winning. It has played a vital role in securing and
managing incidents of terrorism. By using this tactic, the DHS
is capable of predicting and anticipating every move that the
terrorists are planning on. They are then able to come with the
best solution for handling the situation and coming up with a
proper emergency response. By responding in time, they are
then able to stop the attacks from happening. Changes in
technology have resulted in modification of security measures
and strategy thus having an impact on Intelligent gathering.
Despite the success that the intelligence gathering has brought
to the DHS, it has come with various demerits where it has
actively broken the terms of law regarding the rights of personal
privacy.
Personal privacy must be protected from infringement
at all costs. This is not the case when it comes to intelligence
gathering. According to The Washington Times, the situation
was termed as “A Super Snoop’s Dream.” Columnist William
Safire of the New York Times also warned of a dangerous
intrusion into people’s lives and that everyone was a suspect.
He also predicted that all the transactions and communications
made by everyone will go into a virtual centralized grand
database of the Defense Department describes (Hill, Moloney,
Mize, Himelick & Guest,2011). The government will be able to
have every bit of everyone’s information including passport
application, driving license and every record information about
the citizens. A year ago, U.S.A. Patriot Act was passed which
expanded the scope of the Foreign Intelligence Surveillance Act
and broke the terms of the law of fifteen privacy laws. The
United States Federal government may search and collect
emails, cell phones, and other electronic data from American
citizens without necessarily seeking a warrant. This is because
the National Security Agency has an added advantage that gives
it a legal right and authority to search for the emails and phones
for the United States citizens without justifying a probable
cause. The DHS has special mandates and can access the
messages in the emails and phone numbers. All this personal
information is vital in intelligent gathering so as to inspect
every individual and ensure that no one is guilty of any
suspicious actions.
In summary, the topic of security is a very broad and sensitive
topic subject that requires input from various, not just the
institutions mandated with the role of ensuring nations and their
citizens are kept safe.
References
Girard, A., & Sercia, P. (2013). Immigration and food
insecurity: social and nutritional issues for recent immigrants in
Montreal, Canada.
Frazier, M. W. (2010). Socialist insecurity: Pensions and the
politics of uneven development in China (p. 2). Ithaca, NY:
Cornell University Press.
Salter, M. B. (2013). At the threshold of security: a theory of
international borders. In Global Surveillance and Policing (pp.
48-62). Willan.
Lazaridis, G. (2016). Security, insecurity and migration in
Europe. Routledge.
King, N. J., & Raja, V. T. (2012). Protecting the privacy and
security of sensitive customer data in the cloud. Computer Law
& Security Review, 28(3), 308-319.

More Related Content

DOCX
Cyber Weapons Proliferation
DOCX
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
DOCX
Running Head INTELLIGENCE GATHERING .docx
PDF
Intelligence Collection
DOCX
(Lim Jun Hao) G8 Individual Essay for BGS
DOCX
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
PDF
The Operations Of The National Security Agency
DOCX
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx
Cyber Weapons Proliferation
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running Head INTELLIGENCE GATHERING .docx
Intelligence Collection
(Lim Jun Hao) G8 Individual Essay for BGS
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
The Operations Of The National Security Agency
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx

Similar to Running head ISOL 534 – Application Security 1Running head.docx (8)

DOCX
Article CritiqueThis assignment provides you with an opportunity t.docx
DOCX
Terrorism and Criminal SEC400 Terrorism .docx
PDF
Defense Intelligence Agency And Military Intelligence
PDF
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
DOCX
Final Copy Cyber Crime Research Essay
DOCX
Gabrielle HetlandAlthough the United States has a very stron.docx
DOCX
REPLY TO EACH POST 100 WORDS MIN EACH1. This week we wer.docx
PDF
HSDC-HSU White Paper
Article CritiqueThis assignment provides you with an opportunity t.docx
Terrorism and Criminal SEC400 Terrorism .docx
Defense Intelligence Agency And Military Intelligence
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
Final Copy Cyber Crime Research Essay
Gabrielle HetlandAlthough the United States has a very stron.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. This week we wer.docx
HSDC-HSU White Paper
Ad

More from wlynn1 (20)

DOCX
Running head MARKETING ANALYSIS ASSIGNMENTS .docx
DOCX
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
DOCX
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
DOCX
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
DOCX
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
DOCX
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
DOCX
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
DOCX
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
DOCX
Running head LOGISTIC REGRESSION .docx
DOCX
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
DOCX
Running head MALWARE .docx
DOCX
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
DOCX
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
DOCX
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
DOCX
Running Head LOGISTICS1Running Head LOGISTICS7.docx
DOCX
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
DOCX
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
DOCX
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
DOCX
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
DOCX
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head MARKETING ANALYSIS ASSIGNMENTS .docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head LOGISTIC REGRESSION .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
Running head MALWARE .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
Ad

Recently uploaded (20)

PPTX
20th Century Theater, Methods, History.pptx
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
advance database management system book.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
Computer Architecture Input Output Memory.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
IGGE1 Understanding the Self1234567891011
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
Introduction to Building Materials
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Empowerment Technology for Senior High School Guide
20th Century Theater, Methods, History.pptx
AI-driven educational solutions for real-life interventions in the Philippine...
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
advance database management system book.pdf
Introduction to pro and eukaryotes and differences.pptx
LDMMIA Reiki Yoga Finals Review Spring Summer
202450812 BayCHI UCSC-SV 20250812 v17.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Computer Architecture Input Output Memory.pptx
What if we spent less time fighting change, and more time building what’s rig...
History, Philosophy and sociology of education (1).pptx
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
IGGE1 Understanding the Self1234567891011
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Introduction to Building Materials
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Empowerment Technology for Senior High School Guide

Running head ISOL 534 – Application Security 1Running head.docx

  • 1. Running head: ISOL 534 – Application Security 1 Running head: ISOL 534 – Application Security 2 Week-2 Research Paper Topic Name: Nikhil Vasani Course: ISOL-534 Professor: Dr. Jerry Alsay University of the Cumberland May 23, 2019 Introduction The topic of security has been an issue for many countries and citizens alike as countries struggle to root out the vice of
  • 2. insecurity that is posing a great threat especially during this technological era where everything is virtually done online. Today every country around the world is grappling with keeping its citizens and institutions safe from external attacks and threats. Some of these threats could be motivated by various factors ranging from political, economic and social issues which make individuals or groups plan some sort of leveling score mission. If we were to review history in the early days during the 17th and 18th century the issues of insecurity among various nations were in existence but not at the height it is in the wake of the 21st century. Those days’ strategic alliances worked best in culminating threats of external and internal invasion, various leaders would call for peaceful resolution of the indifference that might exist between or among groups of nations. The mode or means of attack was not as sophisticated as it today since the only way terrorists would invade empires those days were through the physical means of actually leading an invasion group or plotting with a team on the ground to execute their plan. Today this tactic has changed leaving institutions mandated with protecting our boundaries and keeping the people safe with a huge task of coming up with various ways of knowing how, where and when the security threats might actually occur. Some of the world leading security institutions that have earned a name for themselves are the homeland security, the Federal Bureau of Investigation FBI and Scotland Yard. These institutions have in the recent past prevented so many attacks plotted against the United States of America and many countries around the world through tapping the wide insecurity network around the world. Background research The issue of terrorism and external attacks has led to numerous loss of lives and property and must be cubed and properly managed using the most efficient methods so as to ensure proper security. It is evident that terrorists no longer use outdated
  • 3. strategies while carrying out attacks. With technology evolving with time, they have learned and mastered the use of new technology and have succeeded in coming up with some of the toughest attacks to prevent. Therefore, the DHS is left with a tough task and must improvise some of the best tactics in their strategic plan so as to have a proper chance in managing the situation. The intelligent gathering is one of the best elements that can be applied by the DHS in order to come up with the right solutions that will stop or prevent external attacks and terrorism. This research is objectively going to look at the effects of the intelligence gathering by the Department of Homeland Security on the nation and its citizens. Despite their speckle reputation, the institution agrees they are facing serious challenges especially in learning the new tactics terrorists have resorted to. As the common saying goes that the security of our nation starts with me this statement has lost meaning to other people who for some reasons have decided to betray their country and sell it to the highest bidder who is interested in inflicting terror to the people and the central authority of this country due to some either economic, political and social vendetta they hold against this peace-loving nation. The role of keeping the nation safe cannot be left on the hands of Homeland security alone as it is a collaborative effort that requires input from all the sectors of the country. So, the individuals who are quick to put such institutions into scrutiny for reluctance on their job should at least do it objectively. Problem statement In order for various security institutions of various countries around the world for instance the Homeland security to be able to effectively root out this menace of insecurity they must be able to understand the changing trends extremist groups and individual use to inflict harm to other nations or people, conduct thorough prerequisite on the various loopholes that might be exploited to conduct such heinous acts against humanity and the sovereignty of a state. The government should
  • 4. also step in fully to provide adequate funding for this institution to enable it to execute its mandate properly (Salter, 2013). One of the critical departments of Homeland security in the realization of this objective of peaceful coexistence is the department he manages and ensures security in our borders the department of border control. The main issue this department is facing is the issue of intelligence gathering since we can all agree that for the institutions to acts swiftly and effectively they must base their judgmental call to action plan on some intelligence they have gathered and validated to be crucial leads to the security threats they are dealing with. For example, the worst ever terrorist attack to be ever done on American soil that left many people dead and so many more hospitalize termed the 9/11 attack left all security agencies with the questions how the terrorist have managed to pass through all the security checks done on the border (Girard & Sercia, 2013). This prompted all state and non-governmental agencies homeland security included to revisit all their security systems to establish any leaks that might have been used to smuggling in the perpetrators. Since then intelligence gathering has been one of the main mandates of the homeland security the department of border control and management. Research question What security measures can countries come up with to keep their borders and citizens safe? According to the statistics on crime, especially terror done by the London school of economics and statistics indicated that most of the suspects were immigrants from Muslim extremist nations. This has made any countries around the world to toughen some of the regulations that permit immigrants into any nation (Frazier, 2010). The worst-case scenario is currently being seen in Italy where caravans of immigrants arrive at the port of Italy having traveled over the world just to seek refuge. Well, humanitarians have claimed that a country should not
  • 5. deny foreign citizens the asylum request if they escaped their mother country as a result of war and other natural calamities. Some individuals or groups with ill motives will take advantage of the situation and smuggle in illegal weaponry for committing such heinous acts against the human’s race. Now the department of border control and management is facing a hard time collecting intelligence about any citizen that is suspected to be connected to any terrorist group and apprehend them (Seo, Gupta, Sallam, Bertino & Yim, 2014). Now the intelligence-gathering process is facing so many challenges included the underfunding from the government to enable them to run their intelligence work properly. Also, the humanitarian bodies that are creating sanctions to countries refusing to grant asylum to refugees are making the intelligence gathering process be polities which will definitely affect the results of such intelligence. Intelligence gathering is one of the best methods that when properly utilized by the DHS can vigorously increase the chances of winning. It has played a vital role in securing and managing incidents of terrorism. By using this tactic, the DHS is capable of predicting and anticipating every move that the terrorists are planning on. They are then able to come with the best solution for handling the situation and coming up with a proper emergency response. By responding in time, they are then able to stop the attacks from happening. Changes in technology have resulted in modification of security measures and strategy thus having an impact on Intelligent gathering. Despite the success that the intelligence gathering has brought to the DHS, it has come with various demerits where it has actively broken the terms of law regarding the rights of personal privacy. Personal privacy must be protected from infringement at all costs. This is not the case when it comes to intelligence
  • 6. gathering. According to The Washington Times, the situation was termed as “A Super Snoop’s Dream.” Columnist William Safire of the New York Times also warned of a dangerous intrusion into people’s lives and that everyone was a suspect. He also predicted that all the transactions and communications made by everyone will go into a virtual centralized grand database of the Defense Department describes (Hill, Moloney, Mize, Himelick & Guest,2011). The government will be able to have every bit of everyone’s information including passport application, driving license and every record information about the citizens. A year ago, U.S.A. Patriot Act was passed which expanded the scope of the Foreign Intelligence Surveillance Act and broke the terms of the law of fifteen privacy laws. The United States Federal government may search and collect emails, cell phones, and other electronic data from American citizens without necessarily seeking a warrant. This is because the National Security Agency has an added advantage that gives it a legal right and authority to search for the emails and phones for the United States citizens without justifying a probable cause. The DHS has special mandates and can access the messages in the emails and phone numbers. All this personal information is vital in intelligent gathering so as to inspect every individual and ensure that no one is guilty of any suspicious actions. In summary, the topic of security is a very broad and sensitive topic subject that requires input from various, not just the institutions mandated with the role of ensuring nations and their citizens are kept safe.
  • 7. References Girard, A., & Sercia, P. (2013). Immigration and food insecurity: social and nutritional issues for recent immigrants in Montreal, Canada. Frazier, M. W. (2010). Socialist insecurity: Pensions and the politics of uneven development in China (p. 2). Ithaca, NY: Cornell University Press. Salter, M. B. (2013). At the threshold of security: a theory of international borders. In Global Surveillance and Policing (pp. 48-62). Willan. Lazaridis, G. (2016). Security, insecurity and migration in Europe. Routledge. King, N. J., & Raja, V. T. (2012). Protecting the privacy and security of sensitive customer data in the cloud. Computer Law & Security Review, 28(3), 308-319.