As technology is increasing and becoming more powerful so is the ability for people to hack into cell phones or computers and steal crucial information. Information like phone numbers, contacts, addresses, credit/debit card numbers or medical records. But what if it was being done by...
“Every breath you take, Every move you make….Every bond you break, Every step you take, I’ll be watching you. Every single day…Every word you say. Every game you play…Every night you stay, I’ll be watching you.” If you ever really looked into the lyrics of...
Government surveillance is an issue everyone should be aware and suspicious of. The topic is portrayed to the public as an effective tactic to ensure that the country and the citizens residing in it are safe and secure. Though this may be true, the downsides...
In today’s world, not a day goes by that someone is not affected by cybercrimes or cyberterrorism which go hand in hand. It is important for the government and businesses to constantly stay up to date with the latest technology to help prevent a cyber-attack....
Introduction According to IBM’s “2014 Cyber Security Intelligence Index,” 95 percent of all security incidents involve human error (IBM, 2014). A significant portion of these security incidents are due to social engineering. Examples of this include humans clicking on malicious links (phishing), opening unknown attachments,...
Securing the sensitive information is very essential in this modern world. Impart authoritative necessities and desires to staff in both beginning and continuous ways to make a genuine endeavor at getting the word out to staff, however don’t be excessively genuine in its introduction. Much...
Twenty-one weeks into 2018, our country witnessed twenty-three school shootings where a person was either hurt or killed. That total is out to be more than one school shooting a week. Unfortunately, our minds have become conditioned to hearing about school shootings that as a...
Abstract: Video surveillance is a hot debated topic around the world for its various applications in different important fields like security, traffic camera, bank, museum, educational institutions and many other fields. The main issue behind this “video surveillance” is the movement of object. Moving object...
Introduction High treason is well known as a crime of common law its origins come from the Roman law which in Roman-Dutch Law was well-known as ‘hoogverraad’. High treason have been identified as a crime committed by those individuals with a hostile intention, to cause...
This design is conducted in order to benefit and promote the security of the motorcycle by this android application called as anti- thief security control using SMS and GPRS connection that will prevent the units not to be stolen. the design scope is (1) to...
Forests are the sinks and reservoirs of permanently absorbed carbon as their biomass constitutes 289 giga tons of carbon (FAO, 2010). Tropical forests store 40% of all terrestrial carbon, out of which 58% is stored in the vegetation itself. According to Global Forest Resource Assessment...
Introduction In our country, the capital itself is known to be one of the most dangerous cities to live in. Many protests took place all over the country against the lame status of law and order. After that, the ruling body came up with provisions...
Over the summer, my grandmother purchased a wireless security camera for her backyard that is controlled by an application on her smartphone. As I assisted her in installing this camera, I began to wonder if she was the only person who was viewing the video...
Law Enforcement In the public service mission, law enforcement, above all protects the rights of every citizen. Officers enforce the laws that are created by legislators and have discretionary power. Police officers have the power to remove people of their liberty (arrest), the power to...
The General Data Protection Regulation (GDPR) is a legal framework created by the European Commission to regulate data protection across the European Union. First proposed in January 2012, the GDPR aimed to update the previous data protection laws to better fit the digital age. An...
With the passage of time and increasing human population there is rapid growth in the data as well as allowing them to interact with each other, devices and networks on a broader scale provide number of benefits like easy access to related information, portability, automation,...
“We are living in a haven built with the strengths of those who came before us and it is our duty to uphold their legacy and safeguard the security for our future generations to live in peace”Our Singapore today is one of the safest country...
Threat assessment is a process designed to identify individuals of concern, investigate individuals and situations, and consider the information collected. This is a time consuming process that usually needs to be done in a very short period of time. It involves early identification of individuals...
Police Officers play a complex role in society, their role involves many tasks. There are many issues in the community that conflict with society’s desire. There are things that the society wants and there are things that they need. The conflict with society’s desire is...