All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Period of Increased Terrorism, Research Paper Example

Pages: 7

Words: 1996

Research Paper

Abstract

The 21st century is the period of increased terrorism threats that require proper responses from the state and the civilians. The lessons of September 11 taught the whole humankind that it is impossible to get ready for the inhumane violence of huge scale; however, the need to getting ready for any new potential attacks is the top priority worldwide. The innovative construction and design concepts have been worked out in compliance with the basic security rules, guidelines for choosing security technologies to be installed in a building have also been reconsidered in accordance to the nature of threats awaiting civilians in the modern times. The new cyber-threat is also gaining importance and has to be considered seriously; hence, major rules and policies for meeting the cyber-attacks of terrorists are also included in the work.

Section 1

Cyber-terrorism is a recognized threat nowadays, and even despite the fact that there is no information available on the planned and organized cyber-attack by any terrorist group, there are some signs of its success in case of organization: the computer systems worldwide show more and more vulnerabilities, initiators of random cyber attacks are still remaining unknown (Wilson, 2005). Hence, the threat of cyber-terrorism should not be underestimated. The initial danger of that kind of terrorism is that it is hard to define this comparatively new notion, thus hackers can rarely be caught and punished according to the state’s legislation. The most comprehensive definition of cyber-terrorism is as follows:

“Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyberterrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear” (Gordon and Ford, 2003).

The world has rich experience in cyber-terrorism that has showed up at the verge of the centuries: the 1999 continuous cyber attacks on NATO computers during the Kosovo bombing attacks, the 2000 case of Israeli teenagers organizing the DOS attack on the Palestinian Hezbollah and Hamas computers, and the 2001 Pakistani attacks on Indian computers and the US Department of Energy and Air Force (Prichard and MacDonald, 2004). Hence, the cyber-terrorists are clearly gaining force and obtaining new tools for causing grave harm to civilians and national forces.

The most widely spread techniques of cyber-terrorists are the physical, syntactic (DOS and DDOS) and semantic attacks. The most primitive tool is the ping saturation that blocks the operation of the whole computer system (Prichard and MacDonald, 2004). The cyber-terrorism has increased opportunities and alternatives for actions, hence it is a new threat that has to address with the help of new policies and new standards.

The main requirements for national security to face the cyber-threat are to realize that a computer is a terrorist’s weapon, and to ensure adequate protection again their intrusion. To provide it, there is a clear need for a forward-looking approach to computers as possible facilitators of terrorism, and clear laws that require all operators of large computer networks having access to the Internet for due diligence and mandatory provision of security. Definition of standards for computer security, establishing key benchmarks and bottom lines for users and manufacturers are the key policy priorities worldwide (Gordon and Ford, 2003).

Expert opinion on the issue is still vague as cyber-terrorism is a comparatively new field of research; however, it became possible to identify the key privileges that terrorists achieve with the increased access to computers and the Internet. Now they have an opportunity not only to conduct violence and threaten civilians, but conduct ideological education and propaganda, recruit new members to their groups and communicate without any special limitations. Hence, the field of computer usage appears the most fragile one in terms of preventing the cyber-attack and preserving the users’ privacy and fundamental rights within a state.

Section 2. Building Hardening

The reason for so much concern about building hardening worldwide is the increasing activity of terrorists, with the growing magnitude and frequency of attacks produced in the USA and other states. Hence, the experience of September 11 has taught architects that building hardening should be addressed as an indispensible element of incorporating security principles in the construction design. The modern architectural approach to building hardening assumes it is the first line of defense against any attack (Demkin, 2004). Such issues as forced entry and ballistic hardening, determination of bomb threats and provision of perimeter security are the key elements of building hardening considered by constructors in the present-day turbulent reality (Demkin, 2004).

Protection against forced entry and ballistic hardening are provided with the help of the ballistic-resistant (BR) design. It includes the means for early detection of attackers and the provision of the required delay time against intrusion correlating with the law enforcement response (Demkin, 2004). Thus, the mechanical task of an architect is to provide a layered and tiered defense system in the walls of the building, to make a contiguous, uninterrupted fence line, harden the exterior envelope of the building and the interior rooms with critical assets (Demkin, 2004). The essence of ballistic-resistant design is to minimize the ballistic threat, so it implies concealing the doors and windows from the line-of-fire lines and obscure the view of potential targets to reduce the ease for detection and penetration (Demkin, 2004). Another key point in the ballistic-resistant design is the bullet-resistant protection of assets; it may be bullet-resistant steel, glazed glass etc.

The process of completing the bullet-resistant design in a building involves several significant steps that ensure its effectiveness. The easy part is that there are no calculations or testing needed for the architect to choose the necessary materials; all testing and calculations have already been completed either by the national defense organizations or by the manufacturer (Demkin, 2004). Hence, the process of design involves such steps as identification of the level of FE and BR protection needed for the building (depending on the time of law enforcement response), incorporating general planning concepts, reducing blast loading of the building by controlling the distance from a potential place of explosion and the building.  Considering the blast-resistant design concepts available for usage in a specific building (e.g. the compared blast-resistant potential of skylight systems and façade curtain walls) is also an essential part of the process (Demkin, 2004).

Determination of bomb threats depends on the size, location and type of the building, the historical data about terrorist attacks, building occupancy, neighboring buildings and their specifics, and vehicle delivery sizes (Demkin, 2004). Thus, the key point to consider in the bomb threat reduction is the standoff distance (the distance from the detonation to the building). All effort should be aimed at maximizing that distance. However, there should always be alternative elements of design that will minimize the damage in case of a successful penetration. They include such structural components as progressive collapse prevention, building overturning etc. (Demkin, 2004).

Section 3. Building Security Technologies

The growing threat from terrorist attacks dictates new rules for architects as they need to cooperate with specialists in security planning and design to construct efficient modern buildings to stand the threat and guarantee increasing security (Demkin, 2004). Hence, in the process of construction architects have to consider such issues as fundamental issues of selecting and applying security technologies, considering the process-driven approach to security systems design and consider the profiles of available security technologies to bring them in compliance with each other and compose a well-functioning, optimal and effective security system corresponding to a set of criteria set forward by the building owner (Demkin, 2004).

The initial stage is identification of criteria for selection and application of security technologies. One of the elements of the present stage is ensuring code compliance – it means that the parts of the security system chosen for a particular building should not contradict its basic construction peculiarities. The owner of the building has to consider the following factors when choosing the security system: range of threats and risks to which the building may be potential subject, the consequences of information compromise (the more complicated and comprehensive the security system is, the less privacy and secrecy is ensured in the building), the potential loss of lives and equipment in case of a successful intrusion etc. (Demkin, 2004).

Code compliance is essential in terms of compliance with the code provisions of the building, when application of some security elements can impede egress. The provision of security in panic bars has a separate set of code provisions because it is impossible to install the same amount of access restrictions there as in other parts of the building; they may seriously complicate the evacuation process (Demkin, 2004). Technology performance criteria are another focus in the selection of security systems – security systems specifications should be thoroughly assessed before installation, the set of technical characteristics of the building has to be brought to compliance with the security systems requirements, and the suitable security elements have to be chosen. It often happens that the products of several manufacturers have to be combined for the creation of a comprehensive security system. Hence, the skillful effort of the installer is vital for the successful and effective operation of the whole security system created (Demkin, 2004).

Among other significant issues that have to be considered in the process of choosing security technologies, one should pay particular attention to adopting a process-driven approach to the system. The process-driven mechanisms conduct data transformation and complex routing scenarios, which is essential for the successful compliance of all security system’s constituent parts. The described approach is gaining popularity nowadays because of its efficiency in providing automated and full security with data analysis and early detection of various threats (Demkin, 2004).

Security equipment profiles need to be analyzed to identify the product compliance, term of effectiveness, guarantees of security etc. There are a growing number of manufacturers that offers their improved, innovated products. However, awareness and professionalism are necessary for the system efficiency and cost reduction, as new products do not always mean the improved characteristics (Demkin, 2004). The final stage is security system integration, which means connecting all security system elements into one working mechanism (Demkin, 2004).

Summary

The work is dedicated to various aspects of security provision, including both physical and cyber-space protection. Regarding cyber-terrorism, it is the most under-researched and unknown field, as it is still rather hard to find initiators of cyber-attacks, organizers of identity thefts and blockers of some major systems’ operation. Cyber-terrorism is dangerous because it gives advanced facilities for terrorists in education, propaganda and recruitment of new members, which overturns the conventional territorial limitations of terrorist activity. However, the physical threat is also strong yet, and the modern construction technology offers a great set of solutions for hardening buildings and choosing the proper combination of security technologies that are likely to increase the chance of the construction to stand the terrorist threat. There are multiple techniques in hardening buildings like ballistic-resistant design, structural components that reduce the extent of harm to the whole building and the risk of its collapse in case of a bombing attack or ballistic intervention. The key factors in choosing the security systems are bring the expected cost, the awaited result and the extent to which individuals are ready to sacrifice their privacy into compliance with the expected measure of protection and effectiveness of the system.

References

Demkin, A.J., & American Institute of Architects (2004). Security Planning and Design:  a guide for architects and building design professionals. John Wiley and Sons.

Gordon, S., & Ford, R. (2003). Cyberterrorism? Symantec Security Response. Retrieved July 28, 2010, from http://www.symantec.com/avcenter/reference/ cyberterrorism.pdf

Prichard, J.J., & MacDonald, L.E. (2004). Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks. Journal of Information Technology Education, Vol. 3, pp. 279-289.

Wilson, C. (2005). Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. CRS Report for Congress. Congressional Report Service. The Library of Congress. Retrieved July 28, 2010, from http://www.iwar.org.uk/cyberterror/resources/crs/45184.pdf

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper