Importance of Security of Personal Belongingsg

In: English and Literature

Submitted By Trinity278
Words 642
Pages 3
PFC Racheau Lipscomb

Importance of Security of Personal Belongings

Accountability without security is definitely not the right answer to a successful business or working environment, take for example; your NCO or boss leaves you in charge of a simple task of moving one piece of equipment to another location without help. While your undergoing this process you leave your previous location where it is unsafe meaning anyone has access to it. Anything could happen within that span of time that your absent from your workspace. When you finish your task and head back to your work area, you discover something missing... This is where accountability would come hand to make sure all your secure work items are there, so that you may be able to hold accountable for what is missing. The Following paragraphs will explain Accountability and Security of personal belongings.

Accountability is the act of taking responsibility for that which falls under your domain—in other words, it’s doing what you say you’re going to do. Accountability is the cornerstone of integrity, which is the result of consistent honesty and responsibility in your actions. In the military, it is absolutely imperative that you do what you say you’re going to do and that you agree to be held accountable for those orders that are directed specifically to you or those in your command. A breakdown in leadership and responsibility can be bad anywhere, but it has the potential to be downright catastrophic in the military. Militaries throughout history have never been made to work as a group of individuals. The brilliance and efficiency of a military is that it takes thousands of individuals and forms them into a machine. To call it a team would be to severely short-change what it is that the military achieves. Basic training in the United States, as well as other countries that use the same structure,…...

Similar Documents

Personal Privacy or National Security

...Individual Privacy vs. National Security: The National Defense Authorization Act Rhonda L Patterson ENG122 English Composition II Prof. Ashley Rutledge February 20, 2012 Individual Privacy vs. National Security: The National Defense Authorization Act The National Defense Authorization Act (NDAA) passed by Congress on December 14, 2011 “to authorize appropriations for fiscal year 2012 for military activities of the Department of Defense, for military construction, and for defense activities of the Department of Energy, to prescribe military personnel strengths for such fiscal year, and for other purposes” (112th Congress, 2012) has been a large source of controversy in the United States among its citizens and in the media. Originally, President Obama stated he would veto the act. Stating his reasons included the continuation of military funding; he reversed his decision and signed the NDAA into law on December 31, 2011. The President included with it a signed statement that said his administration would not allow unconstitutional incarceration of American citizens (Herridge, 2012). Unfortunately, a signed statement is not law, and can be later changed or ignored by the current or subsequent administrations. This act is a danger to the freedoms granted to American citizens by the United States Constitution, allowing the government too many liberties to violate those freedoms in the name of terrorism, and can also be used to unjustly target......

Words: 1989 - Pages: 8

Importance of Communication Skills in Personal and Professional Lofe

...BUSINESS COMMUNICATION ASSIGNMENT:Topic: Importance of Communication Skills in Personal and Professional LifeIntroductionCommunication is simply the act of transferring information from one place to another, whether this be vocally (using voice) written (using printed or digital media such as books, magazines, websites or emails) visually (using logos, maps, charts or graphs) or non-verbally (using body language, gestures or tone and pitch of voice). How well this information can be transmitted and received is a measure of how good our communication skills are.Most humans communicate from the moment of birth. Listening, an important part of the communication process, may begin to occur in the womb, according to some studies. Communication is essential to establishing relationships with family, friends and community members. Communication is essential to the process of obtaining and keeping employment; and is the mainstay of politics and diplomacy. Developing your communication skills can help all aspects of your life, from your professional life to social gatherings and everything in between. The ability to be able to communicate information accurately, clearly and as intended, is a vital life skill and something that should not be overlooked. It’s never too late to work on your communication skills and by doing so improve your quality of life.Observers are able to judge the speaker’s characteristics and evaluate his capabilities through communication. For example in a job......

Words: 2151 - Pages: 9

Cmgt-400 Security Policy Importance

...Maintaining Information Security CMGT-400 Assurance and Security 5-25-2013 Maintaining Information Security Maintaining the security of information couldn’t have been said any clearer than by Lindsey Walker of InfoSec Island, when in 2010 she wrote an article about sensitive information becoming breached. She said “Preventing information security breaches needs to become a main priority for any company when handling both customer and company information”. Sharing information has become much easier than in previous years, from the widespread mainstream use of USB thumb drives or the constant urge to share some secret news or research on Twitter and other social media. The need for a company to constantly review and update their information security policy periodically has never been greater than now. Security Policy An Information security policy should be written in a way that defines how digital information should be protected and accessed by all company employees. Most information that is used to define the Information Security Policy can be gathered by first running a risk analysis report. These reports look at your business model and create a data structure that can be used to inform a company about where their greatest risks are within the company and around the entire work place. Certain “must-have” check boxes for items that should be included in an information security policy are Acceptable Use Policy, Wireless Policy, Email Policy, and Encryption Policy.......

Words: 1928 - Pages: 8

Security

...Introduction As a future information security professional, it is vital that you understand the scope of an organization’s legal and ethical responsibilities. To minimize liabilities and reduce risks from electronic, physical threats and reduce the losses from legal action, the information security practitioner must understand the current legal environment, stay current as new laws and regulations emerge, and watch for issues that need attention. Law and Ethics in Information Security As individuals we elect to trade some aspects of personal freedom for social order. Laws are rules adopted for determining expected behavior in modern society and are drawn from ethics, which define socially acceptable behaviors. Ethics in turn are based on cultural mores: fixed moral attitudes or customs of a particular group. Some ethics are recognized as universal among cultures. Slides 9 Types of Law Civil law represents a wide variety of laws that are recorded in volumes of legal “code” available for review by the average citizen. Criminal law addresses violations harmful to society and is actively enforced through prosecution by the state. Tort law allows individuals to seek recourse against others in the event of personal, physical, or financial injury. Private law regulates the relationship between the individual and the organization, and encompasses family law, commercial law, and labor law. Public law regulates the structure and administration of government......

Words: 2358 - Pages: 10

Importance of Security Policies

...Unit 1 Discussion 1 Importance of Security Policies An internet security policy provides employees with rules and guidelines about the appropriate use of company equipment, network and Internet access. Having such a policy in place helps to protect both the business and the employee; the employee will be aware that browsing certain sites or downloading files is prohibited and that the policy must be adhered to or there could be serious repercussions, thus leading to fewer security risks for the business as a result of employee negligence. The Internet Usage Policy is an important document that must be signed by all employees upon starting work. Below is a Sample Internet Usage Policy that covers the main points of contention dealing with Internet and computer usage. The policy can then be tailored to the requirements of the specific organization. External Device use policy regulates access to external storage devices and network resources connected to computers. Device policy helps prevent data loss and leakage and, combined with file scanning, helps guard against security risks. You can configure Device Control policies for internal and external clients. Office-Scan administrators typically configure a stricter policy for external clients. Policies are granular settings in the Office-Scan client tree. You can enforce specific policies to client groups or individual clients. You can also enforce a single policy to all clients. External use device security is becoming an......

Words: 668 - Pages: 3

Security

...Security Students Name Institutions Name How to resolve a security issue in a situation where the need for security is great but the available funds are limited Community participation is a very important aspect in enhancing security. Through the community’s leaders individuals can be sensitized on the need to protect each other and also help them to create a ‘we’ feeling in the management of the important resources in a region. This will enable the community members to identify with the resources and wealth of a region and hence strive to protect it by all means. Governments and administrative officials should also involve the locals in making of decisions that are of utmost importance to the people’s welfare (Bakari, Magnusson, Tarimo, & Yngström, 2006). The benefits if personnel in security management develop skills as educators for their organization's security Having high skilled employees who are given the potential to grow their expertise is a great benefit to any organization. An organizations success can often be attributed to individual expertise and skills of its employees. The benefits are as follows: 1. Cuts on the costs of hiring external consultants; many organizations spend a lot of money in hiring third party consultants to cover essential tasks within the organization such as periodic network vulnerability scans and developing security programs. The cost of sending employees to the requisite training may be relatively cheaper (McCoy &......

Words: 1066 - Pages: 5

Security

...Security Students Name Institutions Name How to resolve a security issue in a situation where the need for security is great but the available funds are limited Community participation is a very important aspect in enhancing security. Through the community’s leaders individuals can be sensitized on the need to protect each other and also help them to create a ‘we’ feeling in the management of the important resources in a region. This will enable the community members to identify with the resources and wealth of a region and hence strive to protect it by all means. Governments and administrative officials should also involve the locals in making of decisions that are of utmost importance to the people’s welfare (Bakari, Magnusson, Tarimo, & Yngström, 2006). The benefits if personnel in security management develop skills as educators for their organization's security Having high skilled employees who are given the potential to grow their expertise is a great benefit to any organization. An organizations success can often be attributed to individual expertise and skills of its employees. The benefits are as follows: 1. Cuts on the costs of hiring external consultants; many organizations spend a lot of money in hiring third party consultants to cover essential tasks within the organization such as periodic network vulnerability scans and developing security programs. The cost of sending employees to the requisite training may be relatively cheaper (McCoy &......

Words: 1066 - Pages: 5

Security Interests in Personal Property

...1-The way a creditor such as a bank or supplier obtains security for the credit they extend is by taking collateral in the debtor’s personal property. In order for a security interest to be legally enforceable it needs to be attached to the goods of the debtor. The UCC [9-203] lists the three basic requirements for attaching the security interest to the goods of the debtor. The first is an agreement where the debtor grants the creditor a security interest in the specific property the debtor has an interest in. Included in the agreement are the terms of default, a reasonable description of the collateral and any provisions the creditor wants to impose on the debtor. In addition the debtor must have rights on the collateral and the creditor must give the debtor value. 2-Creditors would seek to perfect their attachments in order to obtain maximum protection against other creditors. Perfection is the way a creditor attaches his security interest to collateral and obtains protection against other creditors or purchasers of the collateral from the debtor. The bank would write a financing statement against any personal property such as equipment or inventory that Elaine’s business acquired or will acquire in the future. The financing statement must include the names of both the debtor and secured party as well as a description of collateral covered. The bank would then file it with the appropriate public office. While any property acquired in the future would be......

Words: 696 - Pages: 3

Unit 1 Discussion 1: Importance of Security Policies

...Unit 1 Discussion 1: Importance of Security Policies The important part of deployment is planning. It’s not possible to plan for security, however, until a full risk assessment has been performed. Security planning involves developing security policies and implementing controls to prevent computer risks from becoming reality. The policies outlined in this paper are merely guidelines. Each organization is different and will need to plan create policies based upon its individual security goals and needs: The discussion of tools and technologies in this paper is focused on features rather than technology. This emphasis allows security officials and IT managers to choose which tools and techniques are best suited to their organizations' security needs. Developing Security Polices and Controls A company's security plan consists of security policies. Security policies give specific guidelines for areas of responsibility, and consist of plans that provide steps to take and rules to follow to implement the policies. Policies should define what you consider valuable, and should specify what steps should be taken to safeguard those assets. Policies can be drafted in many ways. One example is a general policy of only a few pages that covers most possibilities. Another example is a draft policy for different sets of assets, including e-mail policies, password policies, Internet access policies, and remote access policies. Two common problems with organizational policies are: ......

Words: 432 - Pages: 2

Importance of Cyber Security

...The Importance for Cyber Security BCOM/275 Cyber security is an essential element to any business and our Government. Unfortunately many corporations do not realize the importance of computer security until it is too late and have experienced a cyber-attack. The consequences of such an attack can be quite severe, as businesses carry an obligation to everyone involved to protect their identity and personal information. Today we are more reliant on computers and to the networks related to them more than ever, because of this reliance, security has become priority number one. Cyber security is an essential factor to be measured in order to defend ourselves and livelihood from hackers and dangerous software designed by people with ill intent. The majority of these dangers to computer networks come from the internet and these are frequently intended to have terrorist like effect on networks and most importantly, people’s lives. Recent attacks have been very high profile, including the Sony hack which is still being investigated. Cyber security is, therefore, by definition an attempt by an individual or entity to protect their personal information and data from cyber-attack. Cyber security involves multiple steps, the most significant of these being an individual’s understanding of the diversity of these cyber-attacks. Once one has knowledge of this, then it is the individual’s responsibility to make sure they have reliable and up to date......

Words: 511 - Pages: 3

Unit 1 Discussion 1 Importance of Security Policies

...Unit 1 Discussion 1: Importance of Security Policies There can definitely be a problem if an organization has no Internet use policy. Having all of the internet sites available can lead to many problems. The first of the problems is possibly downloading malware. If a user downloads a third-party software from the internet, for example, it could contain malicious code that could damage the system and/or infect the network. Another problem I see is having access to personal email accounts through the internet, as people could easily use these and transfer sensitive data to them from a personal email account, thus taking the data off-site which could potentially be used against the organization. An issue with external devices, is similar to Internet usage policy, in that the user can use this external device, like a Universal Serial Bus (USB) to take company data and copy it onto the drive which can be taken off-site , as well as potentially downloading third-party data to the drive that may contain malware. An Employee Identity policy is necessary for companies so that there is some sort of authentication necessary to log into the computers and not just anyone can access them. An example of an Employee Identification would be a Common Access Card (CAC) that has a pin associated with it, or more common, a username and password that must meet a certain complexity (ex. 16 characters minimum; 1 special character minimum). Computer use policy kind of goes alongside the......

Words: 331 - Pages: 2

Hitlers Personal Security

...Hitler’s Personal Protection Strategies Adolf Hitler led with violence, aggression, manipulation, and military strategy, and because of that he became a target of assassination. This developed into an acute paranoia, which led Hitler to implement some of the most brilliant security strategies seen to date. Before an understanding of the reasoning behind the assassination attempts can be deduced, an accurate depiction of Hitler’s early rise to power is necessary. Adolf Hitler was born in Austria on 20 April, 1889. Being the son of a poor young cottager, Hitler was never satisfied with his stature in life. He fled to Germany to avoid being arrested for dodging military service in Austria. This did not define him, as he went on to serve in the German Army during World War I and was wounded twice. He received several medals, and maybe more important, found a direction in life in which he had been searching. World War I left Germany in a state of unease. The sanctions placed on the country left it almost financially crippled. Hitler used this vulnerability to come in and take the nation by storm. This, coupled with his determined necessity to completely rule Germany, was a recipe for disaster. It wasn’t long before Adolf Hitler became a party leader, and from the very beginning he needed, at least some form, of protection. Hitler emerged as not only a politician, but the leader of the most hostile and violent political party in the country. Adolf......

Words: 4123 - Pages: 17

Importance of Personal Insurance

...Mashell Chapeyama Personal Finance Importance of Personal Insurance Keywords: characteristics of life insurance, health insurance Insurance is essential for personal and national development. On personal basis insurance is important for the following reasons: It gives people a sense of security. People who have insurance look forward to be assisted in case of a problem. For example if one’s property, which are insured are destroyed by fire, the insurance firm replaces them. So there is protection on uncertainties. Linked to this is that there is a cover up in case of certain problems that may require money. Insurance may also be a good source of credit. Some insurance companies may give credits to their clients, since there is collateral already. Some insurance ensures that the families remain viable even after some problems may have occurred. An example is when a bread winner has died. If the bread winner had life insurance the family may still have something to live on. People may only face the grief of the loving one dying without being worried of financial incapacitation. Insurance may be a very good solution in case of some social problems. An example could be a breadwinner has been injured. If the insurance covers for injuries that person can still survive Insurance reduce the fear which people may have. People are afraid of the future. They may foresee bleak futures. Insurance assists in reducing such fear. There is also transfer of the personal risk to......

Words: 452 - Pages: 2

The Importance of Network Security to Safeguard Organizational Proprietary Data

...Running head: Network Security The Importance of Network Security to Safeguard Organizational Proprietary Data Donald Shipman Strayer University Dr. Kwang Lee June 10, 2012 Abstract Cyber-criminal activity is on the rise in a world that thrives on the use of technology in everyday living. The close-minded thought process of simple theft of a credit card number or a social security number are long gone. Crimes in today’s business are much more extreme to include attacks that disable key functions of major operations such as public transportation and utilities, to the major financial records of customer information being exposed and stolen. In this paper I will focus on the latter. It is important that companies make significant investment in network security in order to protect its proprietary data from hackers and other criminals. I will address current attitudes toward network security, the rise in and recent increase in criminal activity, existing counteractive measures along with their effectiveness and the direction of network security for organizations in the future. Ultimately, the paper will show the importance of network security in organizations and the immediate change is needed to restore the consumer confidence about their information being safe. Introduction The Internet has become a staple of the business world today. One might find it impossible to be current on the latest world events without being able to effectively use it, navigate it, and......

Words: 2112 - Pages: 9

Importance of Personal Communication in Business

...Introduction Communication, in plain terms is the basis of all relationship. Be it personal or professional, you cannot do without a healthy and effective communication. When it comes to business, communication becomes even more important. This is the pillar on which professional relationships are built. If you want the maximum profits out of your venture, it is essential that you have a healthy rapport with your clients, partners and employees (if any). And how do you build a good rapport? Through effective communication of course! It is said that one of the most important qualities that a businessman must have is communication skills. If you cannot put your message across to the intended audience, you cannot become a successful entrepreneur.  Even if you have an independent business where you are not answerable to your boss, you need to have good communication skills in order to churn out the maximum profits from your venture. However, it is not just about talking or writing. True that these are the two biggest means of communication, but an effective one will spill over to wider areas than that. It will include gestures, body language, confidence and most importantly, the ability to pass on relevant information. Good communication also consists of listening skills. A good businessman will have to be a good listener. For instance in a conference or a business meeting, if you don’t listen to what the others have to say, it is unlikely that you will understand the......

Words: 4403 - Pages: 18