work group
عفاف عوض الحربي 
غادة عبدالله اللقماني 
جواهر عياد اللهيبي
وعد عبدالعزيز الصاعدي
Security
Overview
Background
Any organization that has a computer system
and sensitive information wants to protect that information.
This section of this paper focuses on the
background of security. It also looks at the importance of planning for
possible threats and defining policies to limit the vulnerabilities that exist
in a system and its security policies.
The greatest threat to computer systems and
their information comes from humans, through actions that are either malicious
or ignorant. When the action is malicious, some motivation or goal is generally
behind the attack. For instance, the goal could be to disrupt normal business
operations, thereby denying data availability and production. This could happen
between two rival companies or even as a hoax. Here is a real life example:
April 13, 2000, 3:55 P.M.
Pacific time: The Web site
for the Motion Pictures Association of America (MPAA) is suffering intermittent
outages, and the organization suspects computer vandals are to blame. A source
inside the organization, who asked not to be identified, said that the MPAA is
currently "experiencing problems with their public Web site, and they
suspect a denial-of-service attack." The attack was first rumored on http://www.hackernews.com/, a Web site for news on computer hacking.
To achieve their goals, attackers use
well-known techniques and methods to exploit vulnerabilities in security
policies and systems. The next section on security deals with the general
threats associated with computer systems and discusses the motives or goals the
attackers have, techniques and methods for gaining access, and the various
vulnerabilities that could exist in systems and security policies.
Not all threats, goals, vulnerabilities, and
methods are discussed because they are so numerous and they differ for each
situation, organization, and system. Instead of identifying each, the section
on threats presents a guideline outlining how to identify various threats,
methods, and vulnerabilities that exist in systems.
Defining
Security
Computer security means to protect information. It deals with
the prevention and detection of unauthorized actions by users of a computer.
Lately it has been extended to include privacy, confidentiality, and integrity.
The Need for
Security:
Administrators normally find that putting
together a security policy that restricts both users and attacks is time
consuming and costly. Users also become disgruntled at the heavy security
policies making their work difficult for no discernible reason, causing bad
politics within the company. Planning an audit policy on huge networks takes up
both server resources and time, and often administrators take no note of the
audited events. A common attitude among users is that if no secret work is
being performed, why bother implementing security.
There is a price to pay when a half-hearted
security plan is put into action. It can result in unexpected disaster. A
password policy that allows users to use blank or weak passwords is a hacker's
paradise. No firewall or proxy protection between the organization's private
local area network (LAN) and the public Internet makes the company a target for
cyber crime.
Organizations will need to determine the
price they are willing to pay in order to protect data and other assets. This
cost must be weighed against the costs of losing information and hardware and
disrupting services. The idea is to find the correct balance. If the data needs
minimal protection and the loss of that data is not going to cost the company,
then the cost of protecting that data will be less. If the data is sensitive
and needs maximum protection, then the opposite is normally true.
Now we
specify defined security in threats and risk:
A security threat:
 is any incident or
confrontation that jeopardizes security, which, defined by the Collins English
Dictionary, is “precautions taken to ensure against theft, espionage, etc.” The
U.S. Department of Homeland Security is the United States’ program against
security threats.
Security
Threat Types:
Environmental Threats
       
Environmental
threats are facets of your environment that pose a security risk. If out on the
town, environmental threats might include a poorly lit alley or the kind of
crowd through which you're moving. An environmental threat for a secure
facility might be a tree with a branch that grows past a perimeter fence.
Awareness
is the best safeguard against environmental threats. Recognizing them is the
first step in forming a plan to meet and mitigate the problem.
Physical Threats
        
      Physical
threats are real and often immediate threats to your well-being, the structure
of a facility or to maintaining possession of an asset. A mugger is an example
of a physical threat on your person, as is an oncoming car.
Physical
threats are best dealt with via direct action. The safest personal response is
to leave the area and call the authorities. If you cannot safely do this or
live in an area where authorities aren't responsive, you may require the
services of a private security firm.
Information Threats
     
Information
threats are "leaks" of knowledge that could be used to create a
security breach. At the national security level, these threats are dealt with
via active anti-hacking teams and by keeping sensitive information in the hands
of trustworthy personnel. At the personal level, you handle information threats
by keeping your passwords and pin numbers secret. If you fear there has been an
information security breach in your area, you should notify everybody concerned
and immediately change as much information as you can to render the leaked
information useless.
Passive Threats
        
A
passive threat is a threat that hasn't yet happened - an opportunity for
somebody to take advantage. Some environmental threats are also passive
threats, as are breaches in security protocols for information or physical
security. Security consultants make their living by identifying passive
security threats and recommending ways to alleviate them, such as better
lighting, security cameras and altered business protocols.
Aggressive Threats
       
An
aggressive threat is somebody actively attempting to breach your security, such
a a hacker, burglar or attacker. On-site security is the best countermeasure
for facilities at a high risk for aggressive threats. For everybody else, the
safest course of action is identical to your response to a physical threat:
Leave the area as quickly as possible and immediately notify the appropriate
authorities.
What
Is Threat Assessment    
According
to the U.S. Secret Service, threat assessments are completed to judge the
chances of violent acts taking place against property or public officials.
Threat assessments identify, assess and show how to manage those with the
ability to commit acts of violence.
Types
of Threat Assessment
Anyone
who has watched the news knows that there are many kinds of threats to the
public safety and welfare: national security threats from hostile nations and
terrorist organizations, environmental threats to the air, water and soil and
threats of targeted violence from would-be assassins. Correspondingly, there
are many individuals whose job involves threat assessment, and these include
FBI officers, local police, intelligence agents and environmental hazard
analysts.
Targeted Violence
       
Secret
Service agents and other federal and local law enforcement officers are
frequently assigned the task of assessing a threat of targeted violence. This
is done through gathering of intelligence about the suspect's personality,
possible motivations and capacity to carry out a violent intention. Some of the
indications of a serious threat include a suspect attempting to arm him or
herself, expressing an inappropriate and ongoing interest in a protected person
and engaging in violent behavior towards friends or family.
National Security
       
Intelligence
agents are those who have the primary responsibility for assessing threats to
national security such as those emanating from terrorist organizations. This
process involves monitoring suspected individuals and organizations through
intelligence networks and analyzing the data to find patterns which predict
threats.
Environmental Hazards
·        
An
environmental analyst assesses threats from hazardous materials or other
pollutants in the air, water and soil. For instance, this may take the form of
an assessment of the threat posed to a town or city from a chemical or nuclear
plant. Occupational hazards to employees constitute another type of threat that
such professionals may assess.
Computer
Security Threats
Computer security threats are
relentlessly inventive. Masters of disguise and manipulation, these threats
constantly evolve to find new ways to annoy, steal and harm. Arm yourself with
information and resources to safeguard against complex and growing computer
security threats and stay safe online.
Threats
and risks faced by the systems and information security:
There are a lot of threats and risks facing the information security and can be divided into two main sections:
1. Department often cannot predictable and not human hands which is the Department of the threats and risks resulting from natural disasters.
2. The offending section is the result of human neglect him or works of his hands making different intentions and goals.
There are a lot of threats and risks facing the information security and can be divided into two main sections:
1. Department often cannot predictable and not human hands which is the Department of the threats and risks resulting from natural disasters.
2. The offending section is the result of human neglect him or works of his hands making different intentions and goals.
First:
Section threats and risks resulting from natural disasters:
Of the most important threats resulting from natural disasters as follows:
1. High temperature:
It is well known that high temperature adversely affect the performance of electronic devices, storage devices and treatment, so it is important to put the devices in places and cold stores.
2. Earthquakes and seismic:
The seismic disaster and earthquakes that may result in significant damage. So you should take preventive measures, including the failure to put the devices in places to be eligible for the fall.
3. Fire:
Fires a variety of reasons, some of which may result from negligence may lead to damage to the full when they occur. The fire detection devices is a prerequisite in any facility to remedy the situation early and minimize losses.
4. Floods:
The water from entering the devices may lead to damage and therefore damage to data and information stored inside and the inability to retrieve.
5. Power outage:
Outage could lead to the closure of the device is safe, and may lead to loss of some information that was stored. Owners must secure a backup generator to avoid damage caused by interruptions.
Second: Department of the threats and risks of man-made
Of the most important threats resulting from natural disasters as follows:
1. High temperature:
It is well known that high temperature adversely affect the performance of electronic devices, storage devices and treatment, so it is important to put the devices in places and cold stores.
2. Earthquakes and seismic:
The seismic disaster and earthquakes that may result in significant damage. So you should take preventive measures, including the failure to put the devices in places to be eligible for the fall.
3. Fire:
Fires a variety of reasons, some of which may result from negligence may lead to damage to the full when they occur. The fire detection devices is a prerequisite in any facility to remedy the situation early and minimize losses.
4. Floods:
The water from entering the devices may lead to damage and therefore damage to data and information stored inside and the inability to retrieve.
5. Power outage:
Outage could lead to the closure of the device is safe, and may lead to loss of some information that was stored. Owners must secure a backup generator to avoid damage caused by interruptions.
Second: Department of the threats and risks of man-made
This section falls below many
threats that are increasingly serious and complex day after day. The most
important of these threats include:
1. Malware (Malware):
As defined by Wikipedia, it means: "code cunning or malignant, a program dedicated to infiltrate computer system or destroy it without the consent of the owner and that was installed malware it is very difficult to remove. According degree program can range from harmless inconvenience simple (some windows unwanted advertising through the work of the user on the computer is connected or not connected to the network) to harm beyond repair requires reformatting the hard drive,
1. Malware (Malware):
As defined by Wikipedia, it means: "code cunning or malignant, a program dedicated to infiltrate computer system or destroy it without the consent of the owner and that was installed malware it is very difficult to remove. According degree program can range from harmless inconvenience simple (some windows unwanted advertising through the work of the user on the computer is connected or not connected to the network) to harm beyond repair requires reformatting the hard drive,
for
example,
Also during this malware can the person who sent it to get confidential information or change of such information without the owner of the device senses this. And falls under this type of software are many examples of the best known viruses, and Trojans. In the case of organ injury this malware completely removed is never an easy thing.
2. Social engineering:
The most popular methods currently used and their employees seeking to obtain certain confidential information through social relations and methods. He raised questions and identity theft and send e-mail messages and phone calls, track user time entered her password and search in the trash papers that contain important information is one of the means by which they are social engineering .
Also during this malware can the person who sent it to get confidential information or change of such information without the owner of the device senses this. And falls under this type of software are many examples of the best known viruses, and Trojans. In the case of organ injury this malware completely removed is never an easy thing.
2. Social engineering:
The most popular methods currently used and their employees seeking to obtain certain confidential information through social relations and methods. He raised questions and identity theft and send e-mail messages and phone calls, track user time entered her password and search in the trash papers that contain important information is one of the means by which they are social engineering .
 3Neglect and staff at the facility
Negligence may cause employees to leak important information which may leave his machine open and out of the office, leaving the other opportunity to infiltrate and get what he wants. Or may leave the password written next to the device or in an unsafe place Visttia someone else's knowledge, to other types of neglect.
4. Disgruntled employees or hate working in the facility:
One of the most serious threats are those that come from staff established themselves because they know people security systems used in them and let them know the existing gaps. Care must be taken and caution them and treated by gentle persuasion so as not to inflict damage on the facility. Upset caseworker or be expelled from his work may leave the rear doors in the system (backdoors) allow him to enter and destroy the system and disable it out of revenge.
5. Human errors:
Rights may be wrong and may inadvertently delete data or stored incorrectly or may enter the wrong data to the system result in wrong decisions.
6. Gaps in the system:
Weaknesses and imbalances in the system that allow hackers to reduce the security of the system through it. And can penetrating through the gaps that do a lot, he can change the password and thus the primary user can not access their account, and in some cases can be controlled in full control device to the other damage that may be caused by the presence of these gaps .
Also falls under this section theft and electronic theft and extortion to get the information.
Some of the implications of those risks when they occur .
Negligence may cause employees to leak important information which may leave his machine open and out of the office, leaving the other opportunity to infiltrate and get what he wants. Or may leave the password written next to the device or in an unsafe place Visttia someone else's knowledge, to other types of neglect.
4. Disgruntled employees or hate working in the facility:
One of the most serious threats are those that come from staff established themselves because they know people security systems used in them and let them know the existing gaps. Care must be taken and caution them and treated by gentle persuasion so as not to inflict damage on the facility. Upset caseworker or be expelled from his work may leave the rear doors in the system (backdoors) allow him to enter and destroy the system and disable it out of revenge.
5. Human errors:
Rights may be wrong and may inadvertently delete data or stored incorrectly or may enter the wrong data to the system result in wrong decisions.
6. Gaps in the system:
Weaknesses and imbalances in the system that allow hackers to reduce the security of the system through it. And can penetrating through the gaps that do a lot, he can change the password and thus the primary user can not access their account, and in some cases can be controlled in full control device to the other damage that may be caused by the presence of these gaps .
Also falls under this section theft and electronic theft and extortion to get the information.
Some of the implications of those risks when they occur .
Things
that have on those threats and risks such as:
1. Corrupt data stored or damage to the whole or a part of it.
2. Loss of the evidence for confidentiality in the event informed unauthorized person.
3. Change information stored by penetrating and thus lose their accuracy and confidentiality of the information.
4. Change word Almrro by penetrating and thus can not account holder access to their account and access to information that is supposed to reach it and seen it.
1. Corrupt data stored or damage to the whole or a part of it.
2. Loss of the evidence for confidentiality in the event informed unauthorized person.
3. Change information stored by penetrating and thus lose their accuracy and confidentiality of the information.
4. Change word Almrro by penetrating and thus can not account holder access to their account and access to information that is supposed to reach it and seen it.
How
Security Threats Effect PC Performance:
Security threats
are everywhere - spyware and adware installed inadvertently over the internet,
viruses transmitted through email, key loggers penetrating your firewall,
malicious code broadcast over peer-to-peer networks. Here are five threats that
will reduce system performance, destabilize your system, generate unusual behavior,
modify your Windows Registry and hog your Internet bandwidth.
Security threats are everywhere:
The Sources: software downloads, peer-to-peer networks (e.g., Kazaa), floppies, CD or DVDs, emails and their attachments, chat rooms, your colleagues on the network and the Internet in general.
The Threats: spyware and adware installed inadvertently over the internet, viruses transmitted through email, key loggers penetrating your firewall, malicious code broadcast over peer-to-peer networks.
Aside from the threat to the safety of your data, malware can have serious effects on your system and resource performance. Even your internet connection and network bandwidth can be at risk.
Security threats are everywhere:
The Sources: software downloads, peer-to-peer networks (e.g., Kazaa), floppies, CD or DVDs, emails and their attachments, chat rooms, your colleagues on the network and the Internet in general.
The Threats: spyware and adware installed inadvertently over the internet, viruses transmitted through email, key loggers penetrating your firewall, malicious code broadcast over peer-to-peer networks.
Aside from the threat to the safety of your data, malware can have serious effects on your system and resource performance. Even your internet connection and network bandwidth can be at risk.
The most important types of computer
security threats:
Spyware
Spyware is software that has the capability
to scan computers or monitor activity and relay information to other computers
or locations in cyberspace. Among the information that can be actively or
passively gathered and disseminated by spyware are passwords, log-in details,
account numbers, personal information, and individual files or other personal
documents. Spyware can also gather and distribute information related to the
user’s computer, applications running on the computer, and Internet browser
usage or other computing habits.
Spyware frequently attempts to remain
unnoticed, either by actively hiding or by simply not making its presence on a
computer known to the user. Spyware can be downloaded from Web sites (typically
in shareware or freeware), email messages, and instant messengers.
Additionally, a user might unknowingly receive and/or trigger spyware by
accepting an End User License Agreement from a software program linked to the
spyware or from visiting a Web site that downloads the spyware with or without
an End User License Agreement.
A survey in late 2004 examined the prevalence
of spyware on consumer PCs. This survey found that more than two-thirds of all
computers surveyed had some form of spyware present, commonly with multiple
forms or variants present on a single computer. The burgeoning growth of these
risks has reached such proportions that the Electronic Privacy Information
Center (EPIC) has listed the need for antispyware, antivirus, and firewall
software as the no. 3 item on their "Top Ten Consumer Privacy
Resolutions."
Adware                                                         
Adware is designed to deliver advertising
content to a user, often mining the user’s browsing habits to provide directed
advertising of products or services the user is most likely to want. As a
result of this practice, many users see this type of software as somewhat
innocuous, without realizing that this information is being gathered and may be
sent to other parties elsewhere without their consent. Spammers often buy lists
compiled by such programs to target a flood of unsolicited email to the user’s
address. 
Browser-hijacking adware programs can
redirect a user’s home page to a different site, intercept search engine, or
browsing URLs, and redirect the user to alternate locations or otherwise
attempt to control the user’s Web browser client. Programs such as Xupiter and
CoolWebSearch are examples of this type of adware. 
Worms 
One of the most harmless threats where it is
program designed only to spread. It does not alter your system to cause you to
have a nightmare with your computer, but it can spread from one computer to
another computer within a network or even the internet. The computer security
risk here is, it will use up your computer hard disk space due to the
replication and took up most of your bandwidth due to the spread.
Hack Tools
These are tools that a hacker
or unauthorized user can use to attack, gain unauthorized access to, or perform
identification or fingerprinting of your computer. Hack tools generally do the
following: 
·        
Attempt to gain information on or access
hosts surreptitiously, utilizing methods that circumvent or bypass obvious
security mechanisms inherent to the system they are installed on. 
·        
Facilitate an attempt at disabling a target
computer, preventing its normal use.
·        
Facilitate attacks on third-party computers
as part of a direct or distributed denial-of-service attempt.
One example of a hack tool is a
keystroke logger, a program that tracks and records individual keystrokes, and
can send this information back to the hacker.
Joke Programs
Mostly harmless, these programs generally
create distractions by causing animated characters to wander around a user’s
screen randomly or by interrupting normal operations to display a fake computer
crash message. Such programs are typically benign but can cost a business a great
deal of lost time trying to eliminate programs from infected hosts.
Dialers
Dialers are a form of risk that intercept
connectivity requests to a user’s normal ISP and instead dial on their own to
connect a user to an alternate phone service. Often these numbers are
long-distance calls, sometimes dialing numbers with exorbitant per-minute toll
fees. Although decreasing in number due to the expansion of cable modem and DSL
broadband connectivity, these programs can cost users money and effort, and can
also endanger user information.
Remote Access
Remote access programs allow an unauthorized
user or remote terminal to interact with a user’s desktop or other devices
connected to a running computer. Some of these programs relay the desktop to a
remote viewing client so that the originator can observe exactly what the user
sees. Others actually allow the originator to take over a user’s console by
entering keystrokes or moving the mouse as if the hacker were sitting at the
compromised computer’s console. 
A
few of these programs can be used to surreptitiously access a computer’s
attached devices, such as webcams and microphones, to better spy on users
without alerting them to this behavior. Although there are a number of valid
uses for remote access clients in the modern business environment, most of
these programs hide their existence from the user and can present an extreme
risk to users working with sensitive or protected information, trade secrets,
or other similarly valued dat
Top Security Threats from Spyware:
As a consultant, you are privy
to sensitive client data. It may be stored on your business computers, along
with information, passwords and account numbers from your own business. And
that makes you vulnerable to security risks, such as identify theft. Using
spyware, cyber thieves are watching your every move, and are ready to steal
valuable data from your computer. What threat does spyware pose to your
consulting business?
Nuisance
Perhaps
the least destructive type of spyware is the one that allows adware to be
displayed on your computer screen. It takes up valuable memory, slows your
connection, or can simply reset your home page to another site. None of these
are desirable actions but they are also typically little more than an
annoyance. Their threat level is low but it does still pose a risk. If this
type of spyware makes it onto your computer system, it can also open the door
to a more malicious version of spyware which can cause significant damage.
Tracking
Many spyware programs are
designed specifically to monitor and record your behaviors, such as track
websites you visit online, or monitor your use of other web-based programs.
Again, the threat level is low, unless the program uses the information to also
record data you are providing to the other sites.
Redirecting URLs
Spyware programs are also
capable of redirecting your computer to a particular website, regardless of
what URL, or website address, you type. By redirecting a URL, it can mean lots
of extra money for a cyber crook. That's because businesses, legitimate and
otherwise, often pay money for every visitor that's directed to their site.
Using spyware is a quick, but illegal means to provide lots of visitors.
Additionally, spyware could redirect you to a site that loads more dangerous
spyware programs onto your computer. Again, it's a low-level risk that could
become dangerous if it perpetuates the loading of more intrusive programs onto
your system.
Shutting Down Systems
Spyware is also capable of
activities such as completely shutting down your computer, or permanently
erasing or damaging files. Valuable client files could be destroyed in a blink
of an eye, making this type of spyware threat high-risk.
Acting as a Controlling Server
Another high-risk threat is
spyware's ability to use your computer as a server. The spyware embeds itself
in your computer and then acts as a remote server to distribute other harmful
programs or images, without your permission. Suddenly, your computer is the
vehicle for delivering malicious programs.
Identity Theft
Perhaps
one of the highest risk activities of spyware is the fact that it allows your
keystrokes to be logged. In other words, the software records pertinent
information as you type it, such as passwords and credit card account numbers.
Once that data is sent back to the spyware's originator, the cyber thief can do
a great deal of financial damage to your company, or your clients' companies.
| 
   
 Top Security Threats and Risks   
 | 
 
There are many threats and risks associated
with moving to cloud, so users and agencies need to evaluate their risk
tolerance up front and also ensure that cloud providers are giving clear and
documented service level agreements and security protection.
Cautions and Considerations
The evaluation of security procedures and
processes is crucial when an agency considers a move to the cloud. There are a
number of security issues/concerns associated with cloud computing but these
issues fall into two broad categories: Security issues faced by cloud providers
(organizations providing Software-,Platform-, or Infrastructure-as-a-Service
via the cloud) and security issues faced by their customers. In most cases, the
provider must ensure that their infrastructure is secure and that their
clients’ data and applications are protected while the customer must ensure
that the provider has taken the proper security measures to protect their
information.
Insecure Interfaces/ APIs
It is important to evaluate application
program interfaces before making a decision about your agency's cloud risk.
Make sure cloud providers actually ensure strong authentication, access
control, and preferably use encrypted transmissions. 
Data Loss/Leakage
Always encrypt your data while at rest, if
you can do it, do it in flight and in use as well. Implement strong key
management life-cycle practices and if possible, contractually demand providers
to wipe persistent media before they release it back into the shared storage
pool. And you want to make sure that the provider specifies the backup and
retention strategies as well. 
Account Service Hijacking
Agencies and organizations need to ensure
credentials that are being used for authentication are not being shared. Also,
it is important to have the cloud provider’s security policies and service
level agreements reviewed and documented to make sure that the production
results fit within the tolerance of your risk profile.
How to Assess Home Security
Risk:
Home network security is not something to be taken
lightly. By analyzing your antivirus, firewall and file encryption, you can
determine if your personal information is at risk for an Internet attack.
Instructions
o    1
Download
and install an antivirus software program, if you are not currently running
one. Look for software that conducts a real-time scan, will monitor email
attachments, as well as do a full scan of your computer at least once a week.
Recommended is Avast, Home Edition.
o    2
Configure
your personal firewall. If you are running a Windows-based machine, you can
configure the built-in Windows Firewall under your Control Panel. Open your
Control Panel, then select "Security Center." From there you can
customize your firewall options.
o    3
Ensure
that your Internet browser's phishing filter is turned on. Internet Explorer 8
has a built-in filter, which can be customized by opening the tools menu bar
and selecting the phishing filter option. Firefox 3 also has a built-in filter
that is by default turned on. You can customize your filter options by going to
the Tools menu, and selecting "Options" > "Security."
o    4
Online transactions can be a large security risk. When beginning
an online transaction, make sure the browser and site are secure. You can
identify the security of a website by looking at the URL and locating the
"https://" in the address. The "s" assures that the site
takes extra precautions in encrypting and safekeeping of your information.
How to secure your PC in 10 easy steps:
1)     
Encrypt
your network connection
2)     
Encrypt
sensitive files stored locally
3)     
Encrypt
private information stored in the cloud
4)     
Use
a free VPN service to protect public Wi-Fi connections
5)     
Prevent
keystroke loggers, other data snoops
6)     
Perform
a manual virus scan with the free Malware bytes Anti-Malware
7)     
Disable
images in e-mail
8)     
Be
wary of e-mail attachments
9)     
Destroy
old data
10)  Use a standard (no administrator) account in Windows.
Conclusion:
Day after day, getting used complex systems and therefore more difficult to protect those systems and the preservation of information within the devices safely. With all these threats surrounding it cannot reach a state of full protection and security, but must take all precautions and prevention, we can avoid some of those threats and minimize the damage resulting from the others as soon as they occur.
Day after day, getting used complex systems and therefore more difficult to protect those systems and the preservation of information within the devices safely. With all these threats surrounding it cannot reach a state of full protection and security, but must take all precautions and prevention, we can avoid some of those threats and minimize the damage resulting from the others as soon as they occur.
Risk analysis and protection needs
Human rights
defenders’ work can have a negative impact on specific actors’ interests, and
this can in turn put defenders at risk. It is therefore important to stress
that risk is an inherent part
of defenders’ lives in certain countries.
The issue of
risk can be broken down in the following way:
Analyse main stakeholders´
interests and strategies -> Assess impact of defenders´ work :on those
interests and strategies -> Assess threat against defenders -> Assess
:vulnerabilities and capacities of defenders -> Establish Risk
In other
words, the work you do as a defender may increase the risk you face.
·        
What
you do can lead to threats
·        
How, where,
and when you
work raises issues about your vulnerabilities and capacities.
There is no
widely accepted definition of risk, but we can say that risk refers to possible
events, however uncertain, that result in harm.
In any given
situation, everyone working on human rights may face a common level of danger,
but not everyone is equally vulnerable to that general risk just by being in
the same place. Vulnerability - the possibility that a defender or a
group will suffer an attack or harm - varies according to several factors, as
we will see now.
An example:
There may be a country where the
Government poses a general threat against all kinds of ::human rights work.
This means that all defenders could be at risk. But we also know ::that some
defenders are more at risk than others; for instance, a large, well ::established
NGO based in the capital will probably not be as vulnerable as a small, ::local
NGO. We might say that this is common sense, but it can be interesting to
analyse ::why this happens in order to better understand and address the
security problems of ::defenders.
The level of
risk facing a group of defenders increases in accordance with threats
that have been received and their vulnerability to those threats, as presented in this
equation :
RISK = THREATS x VULNERABILITIES
Threats represent
the possibility that someone will harm somebody else‘s physical or moral
integrity or property through purposeful and often violent action . Making a
threat assessment means analysing the likelihood of a threat being put into
action.
Defenders can
face many different threats in a conflict scenario, including targeting, common
crime and indirect threats.
The most
common type of threat – targeting - aims to hinder or change a group's work, or
to influence the behaviour of the people involved. Targeting is usually closely
related to the work done by the defenders in question, as well as to the
interests and needs of the people who are opposed to the defenders´ work.
Defenders may
face the threat of common criminal attacks, especially if their work
brings them to risky areas. Many cases of targeting are carried out under the
guise of being ‘ordinary’ criminal incidents.
Indirect threats arise from
the potential harm caused by fighting in armed conflicts, such as ‘being in the
wrong place at the wrong time’. This applies specially to defenders working in
areas with armed conflict.
Targeting
(targeted threats) can also be seen in a complementary way: Human rights
defenders may come across declared threats, for example by receiving a death
threat (see Chapter 3, for how to assess declared threats). There are also cases of possible
threats, when a defender close to your work is threatened and there are reasons
to believe that you might be threatened next.
A summary of
kinds of threats:
-Targeting
(declared threats, possible threats): threats due to your work -Threats of
common criminal attacks -Indirect threats: Threats due to fighting in armed
conflicts.
Vulnerabilities
Vulnerability means the degree to which
people are susceptible to loss, damage, suffering and death in the event of an
attack. This varies for each defender or group, and changes with time.
Vulnerability is always relative, because all people and groups are vulnerable
to some extent. However, everyone has their own level and type of
vulnerability, depending on their circumstances. Let’s see some examples:
- Vulnerability can be about location. For example, a defender is usually more vulnerable when s/he is out on the road during a field visit than when s/he is at a well known office where any attack is likely to be witnessed.
 
- Vulnerabilities can include lack of access to a phone or to safe ground transportation or to proper locks in the doors of a house. But vulnerabilities are also related to the lack of networks and shared responses among defenders.
 
- Vulnerabilities may also have to do with team work and fear: A defender that receives a threat may feel fear, and his/her work will be affected by fear. If s/he has no a proper way to deal with fear (somebody to talk to, a good team of colleagues, etc) chances are that s/he could makes mistakes or take poor decisions that may lead him/her to more security problems.
 
There is a combined check-list of possible
vulnerabilities and capacities at the end of this chapter.
Capacities
Capacities are the strengths and resources a
group or defender can access to achieve a reasonable degree of security.
Examples of capacities could be training in security or legal issues, a group
working together as a team, access to a phone and safe transportation, to good
networks of defenders, to a proper way of dealing with fear, etc.
In most cases,
vulnerabilities and
capacities are two sides of
the same coin.
For example:
Not knowing
enough about your work environment work is a vulnerability, while having this
knowledge is a capacity. The same can be said about
having or not access to safe transportation or to good networks of defenders.
(There is a
combined check-list of possible vulnerabilities and capacities at the end of
this chapter).
The risk
created by threats and vulnerabilities can be reduced if defenders have enough
capacities (the more capacities, the lesser the risk).
Risk = threats x vulnerability / capacities
In summary
Summary:
In order to reduce risk to acceptable levels
- namely, to protect - you must:
- Reduce threats;
 - Reduce vulnerability factors;
 - Increase protection capacities.
 
Risk is a dynamic concept that changes with
time and with variations in the nature of threats, vulnerabilities and
capacities. This means risk must be assessed periodically, especially if your
working environment, threats or vulnerabilities change. For instance,
Vulnerabilities can also increase if a change of leadership leaves a group of
defenders in a weaker position than before. Risk increases dramatically with a
clear and present threat. In such cases, it is not safe to try to reduce risk
by increasing capacities, because that takes time.
Security measures, such as legal training or
protective barriers, could reduce risk by reducing vulnerability factors.
However, such measures do not confront the main source of risk, i.e. the
threats, nor the will to carry them out, especially in situations where
perpetrators know they are likely to go unpunished. All major interventions in
protection should therefore aim to reduce threats, in addition to reducing
vulnerability and enhancing capacity.
An example:
A small group
of defenders are working on land property issues in a town. When their :work starts affecting the local landowner’s interests they receive
a clear death :threat. If you apply the risk
equation to their security situation, you’ll see that :the
risk these defenders face is very high, above all due to the death threat. If
you :want to reduce that risk it is probably not the moment to
start changing the locks on :the door of their office
(because the risk is not related to a break-in at the :office), nor the moment to buy a cell phone for each
defender (even if communication :might be important to
security it is unlikely to be enough if there is someone coming :to kill you). In this case, a
more relevant strategy would be to work on networking :and
generating political responses to directly confront the threat (and if that is
:unlikely to be effective quickly the only way to reduce the
risk significantly might :be to reduce the defenders
exposure, perhaps by moving away for a while – being able :''to relocate to a
safe place is also a capacity).
Vulnerabilities and capacities, as well as
some threats, may vary according to gender and age. You therefore need to break
down your findings accordingly.
Vulnerabilities and capacities
assessment
Designing a vulnerability and capacities
assessment for a given group (or person) involves defining the group itself (a
community, collective, NGO, individuals, etc), the physical area where it is
located and the time line (your vulnerability profile will change and evolve
over time). Then you can proceed to assess vulnerabilities and capacities,
using Chart 3 at
the end of this chapter as a guidance.
Please note: The vulnerabilities and capacities
assessment must be seen as an open-ended activity aimed at building on existing
information to maintain an accurate picture of a constantly evolving situation.
When assessing capacities, it is important to establish what the actual current
capacities are instead of listing potential, desirable ones.
Coping and response strategies
Defenders and groups under threat use
different coping strategies to deal with the risks they perceive
that they face. These strategies will vary a lot depending on their environment
(rural, urban), the type of threat, the social, financial and legal resources
available, etc.
Most coping strategies can be implemented immediately
and in response to short term objectives. They will therefore function more
like tactics than as detailed response strategies. Most strategies also respond
to individual people’s subjective perceptions of risk, and could at times cause
the group some level of harm, especially if the strategies used cannot be
reversed.
Coping strategies are closely related to the
type and severity of threat and to the group’s capacities and vulnerabilities.
When thinking about security and protection
you must take into account both your own and other people’s coping strategies.
Reinforce the effective ones, try to limit harmful ones and try to respect the
remaining ones (especially coping strategies linked to cultural or religious
beliefs). Some coping strategies:
- Reinforcing protective barriers, hiding valuables.
 - Avoiding behaviour which could be questioned by another actor, especially if control of the territory where you are working is under military dispute.
 - Going into hiding during high risk situations, including in places that are difficult to access, like mountains or jungle, changing houses, etc. Sometimes whole families go into hiding, and sometimes just defenders. Hiding could take place at night or go on for several weeks, and might involve no outside contact.
 - Looking for armed or political protection from one of the armed actors.
 - Suspending activities, closing down the office, evacuating. Forced migration (internal displacement or as refugees) or going into exile.
 - Relying on “good luck” or resorting to “magic” beliefs.
 - Becoming more secretive, including with colleagues; going into denial by refusing to discuss threats; excessive drinking, overwork, erratic behaviour.
 
Defenders also have access to response
strategies. These can include issuing reports to publicise a specific issue,
making allegations, staging demonstrations, etc. In many cases these strategies
do not amount to a long term strategy, but respond to short term needs. In some
cases the response strategies might even create more security problems than
those they were intended to address.
When
analysing coping and response strategies, take the following into account:
- Sensitivity: Can your strategies respond quickly to individual or group security needs?
 - Adaptability: Can your strategies be quickly adapted to new circumstances, once the risk of attack is over? A defender may have several options available, for example to either hide or to live at other people’s houses for a while. Such strategies may seem weak or unstable, but often have great endurance.
 - Sustainability: Can your strategies endure over time, despite threats or non-lethal attacks?
 - Effectiveness: Can your strategies adequately protect the people or groups in question?
 - Reversibility: If your strategies don’t work or the situation changes, can your strategies be reversed or changed?
 
Dealing with risk after doing a
risk assessment
Once your risk assessment has been done, you
need to look at the results. As it is impossible to measure the “amount” of
risk you are facing, you need to establish an understanding of what the level of
risk is.
Different defenders and organisations may
estimate different levels of risk. What is unacceptable for some defenders can
be acceptable for others, and the same can be said for people within the same
organisation. Rather than discussing what “must” be done or whether you are
prepared for going ahead with it, people’s different thresholds of risk must be
addressed: You must find a commonly acceptable threshold for all members of the
group.
That said, there are different ways of
dealing with risk:
- You can accept the risk as it stands, because you feel able to live with it;
 - You can reduce the risk, by working on threats, vulnerabilities and capacities;
 - You can share the risk, by undertaking joint actions with other defenders to make potential threats to one defender or organisation less effective;
 - You can choose to avoid the risk, by changing or stopping your activities or changing approach to reduce potential threats;
 - You can ignore the risk, by looking the other way. Needless to say, this is not the best option.
 
Bear in mind that the levels of risk are
usually different for each of the organizations and individuals involved in a
human rights case, and that attackers usually tend to hit in the weakest parts,
so that you have to pay attention to these different levels of risk and take
specific measures. For example, let’s look at a case of a peasant killed by a
landowner private army. There may be several organizations and individuals
involved in it, such as a group of lawyers from the close-by capital city, a
local peasant union and three witnesses (peasants who live in a nearby
village). It is key to assess the different levels of risk of each of these
stakeholders in order to plan properly for the security of each of them.
To see
more



thank you all<<
ردحذفthis is very important and good for computers>>>
and Here are some more effective ways to secure computers like:
Encrypt your network connection.
Encrypt sensitive files stored locally.
Encrypt private information stored in the cloud.
Disable images in e-mail.
Destroy old data.
good luck ^_^
fatima salem
Hi there! glad to drop by your page and found these very interesting and informative stuff. Thanks for sharing, keep it up!
ردحذف- enterprise architecture