Posts

Showing posts from October, 2018

Nigerian Traffickers Trying To Sell A Nigerian Lady For $35,000 (N12.7m) Arrested In Russia

Nigerian Traffickers Trying To Sell A Nigerian Lady For $35,000 (N12.7m) Arrested In Russia A Nigerian man identified as David and his partner have been arrested in  Russia  for forcing a Nigerian lady into prostitution after trafficking her into the country during the recently concluded FIFA World Cup. The victim was found bruised, malnourished during the rescue operation on October 23, 2018. According to the victim, the madam once injured her by throwing her out of the window of their second-floor apartment. She revealed that the duo had already perfected plans to resell her to another trafficker for $35,000, when she was rescued. The suspects were arraigned in court, yesterday, in Moscow. They are to spend 2 months in pre-trial facilities on suspicions of human trafficking and if eventually found guilty, they risk 3 to 10 years in prison.

MEANING & TYPES SECURITY THREAT I: NATURAL THREATS

MEANING & TYPES SECURITY THREAT I: NATURAL THREATS Meaning of Security Threat Waever (1995) associates the concept of security threat to security problems that undermine the security of any nation or community, and relates it to various “developments that threaten the sovereignty or independence of a state in a particularly rapid or dramatic fashion, and deprive it of the capacity to manage by itself. This, in turn, undercuts the political order. Such a threat must therefore be met with the mobilization of the maximum effort” (Waever, 1995: 54). Similarly, security threat can be described as the capacity of any human or non-human element to destroy the vital interests of others considered as targets. Security threat also means: ......a party with the intent and capability to exploit a vulnerability in an asset. This could be a malicious hacker or a disgruntled employee :/ /proxy.11a.nu/2006 /02/ 11/definition-of-risk-vulnerability-and-threat). .......an explicit or implicit message

Cardi B's Sister Suggests Nicki Minaj Leaked Cardi's Number To Fans

Image
Cardi B's Sister Suggests Nicki Minaj Leaked Cardi's Number To Fans "It's easy for y'all to ask my why I'm bothered, why I care so much." In a post that has since been deleted, Hennessey went in depth about just how storied the feud truly is, and its far-reaching consequences. Posting screenshots of alarmingly aggressive texts from strangers to Cardi's phone, Henny wrote, "Ya asking why I’m beefing with a fan base but ya not asking why someone with so much influence would use their influence to manipulate their fans to spread so much negativity and hate!" She went on suggest that Minaj was behind the attacks against Cardi claiming, "She leaked my sister's number to her fan pages the same shit she did to Mariah Lynn," she wrote, purportedly alluding to the  Queen  artist. "It's easy for y'all to ask me why I'm bothered, why I care so much. But not one of you is waking up to death threats every day, made up storie

SIMULATION IN SECURITY PLANNING AND MANAGEMENT

SIMULATION IN SECURITY PLANNING AND MANAGEMENT Meaning of Simulation Simulation is not a new concept and practice in security. In traditional African society, simulation was often applied by the guards and warriors. For instance, in the traditional Ila-Orangun in present Osun state, Nigeria, after a series of simulation exercise by the community guards, they discovered that offensive attacks may come from enemies without prior notice especially in the middle of the night. Therefore, they decided to dig a trench to surround the entire community, as a booby trap against the enemy(ies) who may wish to launch an offensive attack, and avoid being caught unaware. Other examples may include the old Oyo Empire wall, Kano wall etc. At this juncture, let us draw our attention to the task of this segment of the unit, which is to expose ourselves to some of the existing definitions of the term simulation. Simulation can be defined as the imitation of some real thing, state of affairs, or process.

Food,health and environmentalsecurity

Image
Food security The situation brought about by the introduction of exclusively crude oil economy in Nigeria in the 1970s has put the agricultural sector of the nation’s economy into comatose. Nigeria which used to be one of the major food baskets and exporter of agricultural products in the world has become a perpetual importer of food items, meaning that, adequately feeding the masses is becoming a difficult task. There is no doubt that the agricultural sector has however become moribund. More than 70% of urban dwellers go about on empty stomachs. Hunger has continued to make people become more vulnerable by the day. This situation has been one of the major contributing factors to the increasing crime rate in the country especially the urban centres. In order to make food available abundantly to the people, government needs to adopt strategic and policy actions that can engender food security in the country. Then, what is food security? Food security can be described as: ...the reliable

Airport Security and other

Image
Airport Security An airport is a plac e that involves an aspect of transportation. People travel either by road, sea or rail or air. All these means of transportation deserve to be provided with sufficient security. It is no exaggeration that the airport has continued to receive greater attention due to very strategic reasons. One of the reasons is that apart from being the most popular means of transportation, it is the fastest. It is a means of moving people from one destination to another, as well as for transporting goods. The journey that may take a ship three weeks or more can be covered by a plane in hours. Airport accommodates a large number of people including the travellers, the crew and management of various airliners present at the airport(s) as well those who escort travellers to departure and those waiting to receive travellers on arrival. It is a network of people having different motives and it is important to put in place adequate security to protect lives and property

Seaport and marine Security

Seaport Security  Ports are simply passages that lead into any country. Apart from seaports, people also use airports for the shipment of their cargos from one destination to the other. Meanwhile, the quantity of loads will determine which of these two ports should be used for the shipment. The seaports are where major shipping activities take place. And they are also vulnerable to security threats. for instance, through seaports, some (unsuspected) criminals can bring in hazardous goods like expired drugs, contraband products, illegal arms and ammunitions, among others. At this point, how do you describe seaport security? Seaport security can simply be described as: ...the defense, law and treaty enforcement, and counterterrorism activities that fall within the port and maritime domain. It includes the protection of the seaports themselves, the protection and inspection of the cargo moving through the ports, and maritime security (://en.wikipedia.org/wiki/Port_security). There is no d

FORMS OF SECURITY PART III

FORMS OF SECURITY PART III In the two previous units, we have discussed some of the basic forms of security including computer security, information security and physical security. To complete our task, we shall be explaining some other forms of security in this unit, which will include infrastructure security, seaport security, airport security, food security, and a host of other forms of security. Before we go into the nitty-gritty of these, let us quickly look at the objectives of this study. At the end of this unit, you should be able to: Describe the meaning of infrastructure security; Discuss what seaport security is all about; Elucidate on the meaning of airport security; Explain food security; Define health security; Clarify the meaning of economic security; Examine what environmental security denotes. 3.1 Infrastructure Security Infrastructure security can be described as that aspect of security designed purposely to provide protection for specific infrastructure particularly

Approaches to Physical Security

Approaches to Physical Security Summarily, physical security can be explained from three different approaches, all of which are interdependent in order to provide adequate physical security for any facility. These approaches include the following: (a) The first approach is concerned with mounting of obstacles or barriers that can prevent potential attackers, intruders or malicious personalities from gaining easy access into facility. The threats being accidents, environmental disaster or human attackers will be impeded by putting in place some measures like multiple locks, fencing, walls, and fireproof safes, to mention a few; (b) The second perspective to physical security is the installation of surveillance and notification, which will help us to optimise the security of the facility by monitoring and detecting the activities of (potential) attackers to the facility. This involves the use of such security methods like installation of lighting, heat sensors, smoke detectors, intrusio

FORMS OF SECURITY II{TWO}

Image
FORMS OF SECURITY II Meaning of Information Security Information security can be defined as a means of protecting information systems from any illegitimate access and use, theft, amendment, or malicious attacks or penetration. Information security can also be described as “the process by which an organization protects and secures its systems, media, a nd facilities that process and maintain information vital to its operations” (://www.ffiec.gov/ffiecinfobase /booklets/information_security/information_security.pdf). Conceptually, it is important to clarify the differences in the meaning between the terms information security and computer security, which are often mistaken for each other. There is no doubt that the two concepts are inter-related because professionally speaking, they aim to advance the protection of information through the principles of confidentiality, integrity and availability. Despite the similar goals they both articulate or simply pursue, the two terms still have so

Approaches to Computer Security

Image
Approaches to Computer Security Approaches to Computer Security a) Security Design: There are several ways through, which security systems are designed. It is paramount to mount effective security strategies that can ensure adequate safety for computing systems. One of such ways is to initiate the principle of least priviledge that “where an entity has only the priviledges that are needed for its functions” (://en.wikipedia.org/wiki/Computer_security). In this case, if an intruder gains access (illegally) into a part of the system, it will be difficult for him/her to access the whole system due to the fine-grained security. It is therefore advisable to mount a security design that breaks the system into several smaller units with each of the units designed in a less complicated way, and may involve the application of automated theorem proving to verify the exactness of key software subsystems. In a situation where formal correctness is missing, careful application of code review and un

FORMS OF SECURITY

Image
FORMS OF SECURITY I Meaning of Computer Security We are beginning our journey on the discourse-forms of security with the subject of computer security. Layman may define computer security as all aspects of security, which involves protecting our computing systems from malicious attacks and intrusion. Meanwhile, let us consider some other definitions of computer security. Computer security touches draws from disciplines as ethics and risk analysis, and is concerned with topics such as computer crime; the prevention, detection, and remediation of attacks; and identity and anonymity in cyberspace (Kinkus, 2002). Computer security is a branch of technology known as information security as applied to computers. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible.... (://en.wikipedia.org/wiki/ Computer_security). Computer Security can also be described