CSS 244 Types and Analysis of Security Threats

Total Page:16

File Type:pdf, Size:1020Kb

CSS 244 Types and Analysis of Security Threats CSS 244 Types and Analysis of Security Threats NATIONAL OPEN UNIVERSITY OF NIGERIA COURSE CODE : CSS 244 COURSE TITLE: TYPES AND ANALYSIS OF SECURITY THREATS 1 CSS 244 Types and Analysis of Security Threats COURSE GUIDE CSS 244 TYPES AND ANALYSIS OF SECURITY THREATS Course Developer/Writer Monsuru Adegboyega Kasali Non-Violence and Intercultural Communication Advocacy Initiatives, Ibadan, Nigeria Course Editor Adewole Akinyemi Atere, Ph.D College of Management & Social Sciences Osun State University Course Coordinator Adeniyi Adegoke, Ph.D Criminology and Security Studies School of Arts and Social Sciences National Open University of Nigeria Programme Leader Prof. Abdul-Rasheed Yesufu Dean, School of Arts and Social Sciences National Open University of Nigeria NATIONAL OPEN UNIVERSITY OF NIGERIA 2 CSS 244 Types and Analysis of Security Threats National Open University of Nigeria Headquarters University Village Plot 91, Cadastral Zone, Nnamdi Azikiwe Express way Jabi, Abuja Lagos Office 14/16 Ahmadu Bello Way Victoria Island, Lagos e-mail: [email protected] website: www.nouedu.net Published by National Open University of Nigeria Printed ISBN: All Rights Reserved CONTENTS PAGE Introduction ................................................................... ...i-ii What You Will Learn in this Course ................................ ii-iii Course Aims ................................................................. iii-iv Course Objectives ......................................................... iv 3 CSS 244 Types and Analysis of Security Threats Working through this Course ............................................. v Course Materials ............................................................ v Study Units ................................................................... ..…v-vi Textbooks and References ................................................. vi-vii Assignment File ................................................................ viii Assessment ........................................................................ viii Tutor-Marked Assignment ................................................... .viii Final Examination and Grading ........................................ viii Course Marking Scheme .................................................... ix Course Overview ............................................................... ix-x Presentation Schedule ........................................................ x How to Get the Most from this Course............................... x Reading Section .............................................................. xi Facilitators/Tutors and Tutorials .................................. ...xii Summary ........................................................................... xii-xiii Introduction CSS 244: Types and Analysis of Security Threats is a 3-credit unit course. It is a compulsory course for all post-graduate diploma students in the field of Criminology and Security Studies of the University. The course is also recommended to any other post-graduate students especially those in the School of Arts and Social Sciences, who may have interest in the study and analysis of security threats and the mitigation techniques that can be adopted to prevent the occurrence of various threats or/and reduce the losses that may accompany the occurrence of any threats. The course can also be taken as an elective or required course by other post-graduate students whose main field(s) of discipline is not Criminology and Security Studies. However, the Course shall consist of 20 units, which are divided into 4 modules, and each of these modules shall consist of 5 units whereby the study draws a link between one unit and the other. In the first 2 modules of this course, we focus on various areas of discourse that explain the subject- types of security threats while the last 2 modules illuminate on various threat mitigation measures and crime management approaches that can assist in no small measure to prevent, detect, and control all forms of security threats. On the whole, the units contained in the course deal with the meaning and types of security threats; basic human or manmade security threats, terrorism as a security threat; war as a security threat; information warfare as a security threat; analyses of geological, climatic and environmental threats; basic types of security; civil security approaches to threat mitigation; risk psychology and analysis; among others. More interestingly, the material largely draws its case studies from security conditions and major threats experienced in Nigeria and Africa with the aim of exposing the reader or student to security challenges confronting Nigeria in particular and Africa as a whole. Having known that our study on types and analysis of security threats cannot be complete if we fail to have the knowledge of the overall incidence of security 4 CSS 244 Types and Analysis of Security Threats threats and mitigation techniques in some other places or continents, we shall also cite examples from other parts of the world including America, Europe and Asia. The course has no compulsory pre-requisites for it to be registered for. The course guide informs us on what this course is all about, what students will learn in each unit, what text materials we shall be using and how we can make the best use of these materials. This course guide also emphasises on the need for students to take tutor- marked assignments so seriously. However, necessary information on tutor-marked assignments shall be made known to students in a separate file, which will be sent to each of them at the appropriate time. This course is also supported with periodic tutorial classes. What You Will Learn in this Course CSS 645: Types and Analysis of Security Threats as a course in the field of Criminology and Security Studies at the National Open University of Nigeria focuses on a wide range of issues that bother on the meaning and types of security threats as well as identifying many threat mitigation measures and crime detection and control mechanisms in reducing the adverse effects of various security threats on people or communities. In this course, we carefully analyse and assess security threats, to assist the student not only to identify these threats but also to develop diagnostic framework through which they can proffer solutions towards hazard mitigation and effective security management. Also, the reader or student will be exposed to various measures that can safeguard the protection of life and property against the incidence of security threat and hazard. Nevertheless, the essence of these safety measures is at least to provide the student or reader with various ways through which he/she can reduce losses from any incidence on hazard or security attack, if you cannot prevent such threat or hazard from occurring. Knowing the impact that active involvement of civilians in security can have in complementing and increasing the capacity of the security personnel to carryout their duties effectively, the course also explores the strategic importance of civil security and how it can contribute to effective security management and threat mitigation. The issue of risk is germane to a discourse on security threats. This is because we take risks in our daily activities, and through risk psychology, we shall be explaining why some people take the issue of security risk so seriously while others do not take it seriously. In this analysis of risk, we examine how some individual or collective or governmental undertakings or actions can increase the possibility of risk, which may have either positive or adverse effects on our security or wellbeing. The material also focuses on other crime control and threat mitigation approaches including vulnerability and Capacity Assessment (VAC), Crime analysis as well as data mining and automated data analysis. Course Aims 5 CSS 244 Types and Analysis of Security Threats The overall aim of CSS 244: Types and Analysis of Security Threats as a course is to explore the meaning and types of security threats. It aims to classify various types of threats according to their peculiar conditions and features. Basically, threats are often classified as natural and human forms of security threats but this course further delineates the classification of threats into geological, climatic, environmental and human or manmade security threats for conceptual clarity and better appreciation of the subject-types of security threats. The course also explains different approaches and techniques through which security threats can be mitigated or controlled. The material describes the meaning of various types of basic security and their different approaches to general security management. These include measures to safeguard the security of computer and information systems, physical structures, infrastructure, public health, food supply among others. The course also shows the importance of civil security approaches, risk psychology and analysis, simulation, crime analysis and data mining and automated data analysis to threat mitigation and crime control. The material draws its case studies from the local and international environments. The course aims to: •• Conceptualise the term security threat; •• Identify various security threats; •• Classify or categorise various security threats; •• Discuss the meaning and types of various human or man-made security threats; •• Examine various manmade security threats; •• Explain the meaning and types of geological
Recommended publications
  • Participation of Women in Politics and Leadership in Nigeria: Challenges and Prospects
    Journal of African Studies and Sustainable Development. Vol.1, No.1. 2018. ISSN Online: 2630-7073, ISSN Print 2630-7065. www.apas.org.ng/journals.asp PARTICIPATION OF WOMEN IN POLITICS AND LEADERSHIP IN NIGERIA: CHALLENGES AND PROSPECTS Ushe Mike Ushe, Ph.D Department of Religious Studies, National Open University of Nigeria, Jabi, Abuja [email protected] Abstract Nigeria has been recording low participation of women in both elective and appointive positions. Women, who are a major stakeholder in the developmental project of any society globally, have been marginalized, and their low participations in political leadership have been attracting a lot of attention from scholars. This paper, examines the challenges hindering Nigerian women’s effective participation in politics and leadership for sustenance of democracy in Nigeria. The paper adopts a multi-dimensional method which makes use of questionnaires, interviews and observation for collection of data and analysis. The study revealed that women are marginalized and feature minimally in government because Nigeria lacks a legislative framework that secures quotas for women in political parties. Patriarchal attitude, poor informal networks and mentoring, finance, religion and educational status were found to militate against women’s participation in Nigerian politics and leadership. To overcome these problems, the study recommends, among others, that there is need for the development of electoral reforms that would promote equitable representation of women and respect for due process, empowerment of women to ensure their access to credit facilities, improve the various economic, political, religious and systematic practices that would serve as obstacles to effective participation of women in politics and governance as well as institutionalized varieties of programmes and politics by the government and other stakeholders that would empower women politically, socially, religiously and economically for greater participation in politics and governance in Nigeria.
    [Show full text]
  • 2014 International Conference on Green Computing Communication and Electrical Engineering
    2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE 2014) Coimbatore, India 6-8 March 2014 Pages 1-875 IEEE Catalog Number: CFP1460X-POD ISBN: 978-1-4799-4981-6 1/2 TABLE OF CONTENTS VOLUME 1 A NOVEL ROBUST & FAULT TOLERANCE FRAMEWORK FOR WEBSERVICES USING WS- I* SPECIFICATION.............................................................................................................................................................1 Pandey, Akhilesh Kumar ; Kumar, Abhishek ; Zade, Farahnaz Rezaeian A SURVEY OF SELF ORGANIZING TRUST METHOD TO AVOID MALICIOUS PEERS FROM PEER TO PEER NETWORK ..............................................................................................................................................6 Samuvelraj, G. ; Nalini, N. CONTRIVANCE OF ENERGY EFFICIENT ROUTING ALGORITHM IN WIRELESS BODY AREA NETWORK.............................................................................................................................................................. 10 Sridharan, Srivatsan ; Jammalamadaka, Sridhar EFFECTIVE DEFENDING AGAINST FLOOD ATTACK USING STREAM-CHECK METHOD IN TOLERANT NETWORK................................................................................................................................................... 17 Kuriakose, Divya ; Daniel, D. ANONYMOUS ROUTING TECHNIQUE IN MANET FOR SECURE TRANSMISSION: ART .............................. 21 Vijayan, Aleesha ; Yamini, C. DEFINING THE FRAMEWORK FOR WIRELESS-AMI SECURITY IN SMART GRID.......................................
    [Show full text]
  • Stages of Postmortem Decomposition
    METHODS FOR ESTIMATION OF TIME OF DEATH RATE METHODS (i.e. estimation of tree’s age by height / rate of growth) - Rate of drying or discoloration of blood pools - Rigor Mortis - Livor Mortis - Algor Mortis - Decomposition - Flora (plants) around body - Fauna (insects) around body CONCURRENCE METHODS (i.e. estimation of tree’s age by counting rings) - Bloodstain vs. tire - Time of last know meal - Stopping of watch - Depth of footprint in snow - Depth of rainwater collected EVIDENCE FOR ESTIMATION OF TIME OF DEATH 1. CORPORAL EVIDENCE - In the body 2. ENVIRONMENTAL AND ASSOCIATED EVIDENCE - In the vicinity and general surroundings 3. ANAMNESTIC EVIDENCE - Based on the decedent’s ordinary habits and daily activities Envir. and Assoc. Corporal Evidence Evidence Anamnestic Evidence - stage of decomp of organs - uncollected milk, mail, - usual activities vs. exterior newspapers - soot in airway - lights on / off - walking and sleeping patterns - medical conditions (ASCVD, pre surgery) - alarm clock set - eating habits, times, type of foods - alcohol / drug levels - food on stove / in refrig - appointment - beard, nails, hair - type of clothing day / night indoors / outdoor seasonal (remote deaths) condition of clothing (mold, leached dyes) - sales slips, receipts - animals in house Use a combination of all evidence available to you, giving weight to the more reliable / documentable. Be suspicious when some factors seem to vary considerably from the others. STAGES OF POSTMORTEM DECOMPOSITION 1. Blue-green discoloration of skin RLQ and LLQ abdomen 24 hrs Entire abdomen 36 hrs 2. Marbling (Green-black discoloration in blood vessel distribution- hemolyzed blood reacts with hydrogen sulfide. Extravasation diffusion (leads to generalized dark purple-black skin 3.
    [Show full text]
  • PCI PIN Transaction Security (PTS) Point of Interaction (POI)
    Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Security Requirements Version 4.0 June 2013 Document Changes Date Version Description February 2010 3.x RFC version April 2010 3.0 Public release October 2011 3.1 Clarifications and errata, updates for non-PIN POIs, encrypting card readers February 2013 4.x RFC version June 2013 4.0 Public release Payment Card Industry PTS POI Security Requirements v4.0 June 2013 Copyright 2013 PCI Security Standards Council LLC Page 1 Table of Contents Document Changes ................................................................................................................. 1 About This Document .............................................................................................................. 4 Purpose .................................................................................................................................. 4 Scope of the Document .......................................................................................................... 4 Main Differences from Previous Version ................................................................................. 5 PTS Approval Modules Selection ........................................................................................... 6 Foreword .................................................................................................................................. 7 Evaluation Domains ...............................................................................................................
    [Show full text]
  • Diaspora Engagement in Development
    Diaspora Engagement in Development An Analysis of the Engagement of the Nigerian Diaspora in Germany and the Potentials for Cooperation 13-02-2015 Katrin Marchand Sarah Langley Melissa Siegel 0 CONTENTS List of Tables ................................................................................................................................................. 2 List of Figures ................................................................................................................................................ 2 Acknowledgements ....................................................................................................................................... 2 1. Introduction ............................................................................................................................................. 3 2. Methodology ............................................................................................................................................ 4 3. The Nigerian Diaspora in Germany .......................................................................................................... 9 3.1. Emigration History of Nigeria ............................................................................................................ 9 3.2. The Nigerian Diaspora in Germany.................................................................................................. 12 4. Nigerian Diaspora Organizations in Germany and Their Engagement in Nigeria .................................. 21 4.1. Overview
    [Show full text]
  • Scaling up National Health Insurance in Nigeria
    March 2013 SCALING UP NATIONAL HEALTH INSURANCE IN NIGERIA Learning from Case Studies of India, Colombia, and Thailand This publication was prepared by Arin Dutta and Charles Hongoro (consultant) of the Health Policy Project. HEALTH POLICY PROJECT Suggested citation: Dutta, Arin ,and Charles Hongoro. 2013. Scaling Up National Health Insurance in Nigeria: Learning from Case Studies of India, Colombia, and Thailand. Washington, DC: Futures Group, Health Policy Project. ISBN: 978-1-59560-004-2 The Health Policy Project is a five-year cooperative agreement funded by the U.S. Agency for International Development under Agreement No. AID-OAA-A-10-00067, beginning September 30, 2010. It is implemented by Futures Group, in collaboration with CEDPA (CEDPA is now a part of Plan International USA), Futures Institute, Partners in Population and Development, Africa Regional Office (PPD ARO), Population Reference Bureau (PRB), RTI International, and the White Ribbon Alliance for Safe Motherhood (WRA). Scaling Up National Health Insurance in Nigeria Learning from Case Studies of India, Colombia, and Thailand March 2013 This publication was prepared by Arin Dutta1 and Charles Hongoro2 of the Health Policy Project. 1 Futures Group, 2 Consultant. The information provided in this document is not official U.S. Government information and does not necessarily represent the views or positions of the U.S. Agency for International Development. CONTENTS Executive Summary .................................................................................................................iv
    [Show full text]
  • The Thrust and Tug Nexus for Okada 'Commercial Motorcyclist' Business
    Asian Journal of Agricultural Extension, Economics & Sociology 15(2): 1-10, 2017; Article no.AJAEES.28878 ISSN: 2320-7027 SCIENCEDOMAIN international www.sciencedomain.org The Thrust and Tug Nexus for Okada ‘Commercial motorcyclist’ Business among Youths in Ekiti and Ondo States, Nigeria: Implications for Youth Development G. M. Adebo 1* and Ireti Adesida 2 1Department of Agricultural Economics and Extension Services, Ekiti State University, P.M.B. 5363, Ado-Ekiti, Nigeria. 2Department of Agricultural Extension and Communication Technology, Federal University of Technology, Akure, Nigeria. Authors’ contributions The work was carried out in collaboration between both authors. Both authors read and approve the final manuscript. Article Information DOI: 10.9734/AJAEES/2017/28878 Editor(s): (1) Wang Guangjun , Pearl River Fisheries Research Institute, Chinese Academy of Fishery Sciences, China. (2) Hossein Azadi, Department of Geography, Ghent University, Belgium. Reviewers: (1) Borislav Kolaric, Serbia. (2) Qi Wen, Ning Xia University, China. (3) Anonymous, Nova Southeastern University, Fort Lauderdale, USA. Complete Peer review History: http://www.sciencedomain.org/review-history/18085 Received 11 th August 2016 th Original Research Article Accepted 18 February 2017 Published 7th March 2017 ABSTRACT A proportionate number of Nigerian youths engaged in Okada riding coined (Okada) business ‘Commercial motorcyclist’. The business has drained manpower from the vocational sectors of the Nigerian economy. The study was carried out to assess the Thrust and Tug Nexus for Okada business among Youths and the implications for their future development. A total of 300 respondents were randomly selected from the list of registered Okada riders in 16 take off points from Ekiti and Ondo states while a structured questionnaire was used to elicit information from them.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Investment Swindles and Con Schemes I. Introduction
    INVESTMENT SWINDLES AND CON SCHEMES TABLE OF CONTENTS I. INTRODUCTION ........................................................................................................................................... 1 II. INVESTMENT SWINDLES AND CON SCHEMES OVERVIEW Who Are the Perpetrators and Victims of These Schemes? .............................................................................. 3 Why Do the Perpetrators Commit These Con Schemes? .................................................................................. 3 Why Do Consumers Become Victims to These Schemes? ................................................................................ 4 What Are the Red Flags That Characterize These Con Schemes? .................................................................... 4 How Are These Con Schemes Executed? ............................................................................................................. 5 Effects on Consumers .............................................................................................................................................. 6 Review Questions ..................................................................................................................................................... 7 III. INVESTMENT SCHEMES Introduction ............................................................................................................................................................... 8 Bonds ......................................................................................................................................................................
    [Show full text]
  • National Insecurity and Youth Unemployment in Nigeria: the Case of Niger-Delta Region
    British Journal of Humanities and Social Sciences 104 April 2015, Vol. 13 (1) National Insecurity and Youth Unemployment in Nigeria: The Case of Niger-Delta Region Monday Akpakan (Ph.D) Akwa Ibom State Ministry of Education Kia Bariledum (Ph.D) Facilitator National Open University of Nigeria, Port Harcourt Study Centre Nwibor Barika Lucky General Studies Department Rivers State Polytechnic, Bori E-mail: [email protected] ABSTRACT This work examines the relationship between insecurity and Youth unemployment in Nigeria with focus on the Niger-Delta. The study employed survey method and relied mostly on secondary data. The study noted that National Insecurity which is one of the challenges facing the corporate existence and continued peace and stability of Nigeria is cause by youth unemployment based on this, the study suggest amongst others creation of employment opportunities and employment based on merit. Second, provision of social security as unemployment compensation such that the unemployed graduates are paid N30, 000.00 every month for 1st degree holders, ND and NCE N20,000.00 and FSLC and SSCE N10,000.00 monthly. Government should as a matter of urgency employ the ALASKA model in compensating the Niger Deltans as well as Human security where the issue of poverty is eradicated in the country. INTRODUCTION Background of the Study National Insecurity as a concept has suffered prolonged period of neglect by scholars, analysts or even enthusiasts. In as much as the concept of security remains an intellectual paradigm for research and development, the concept of insecurity must equally be accorded the same status. Insecurity just as underdevelopment is the most undesirable side of a coin (which houses both security and insecurity) (Saleh, 2010:3).
    [Show full text]
  • Covering PCI and PA DSS)
    Monetra® Payment Software Secure Implementation Guide (Covering PCI and PA DSS) Revision: 3.0b3 Publication date November, 2012 Copyright © 2012 Main Street Softworks, Inc. Secure Implementation Guide: (Covering PCI and PA DSS) Main Street Softworks, Inc. Revision: 3.0b3 Publication date November, 2012 Copyright © 2012 Main Street Softworks, Inc. Legal Notice The information contained herein is provided As Is without warranty of any kind, express or implied, including but not limited to, the implied warranties of merchantability and fitness for a particular purpose. There is no warranty that the information or the use thereof does not infringe a patent, trademark, copyright, or trade secret. Main Street Softworks, Inc. shall not be liable for any direct, special, incidental, or consequential damages resulting from the use of any information contained herein, whether resulting from breach of contract, breach of warranty, negligence, or otherwise, even if Main Street has been advised of the possibility of such damages. Main Street reserves the right to make changes to the information contained herein at anytime without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Main Street Softworks, Inc. Table of Contents 1. Monetra Security Validation (PA-DSS) ......................................................................... 1 1.1. Do Not Retain Sensitive Data ...........................................................................
    [Show full text]
  • Css241 Course Title: Basic Security and Security Threats
    CSS 241 BASIC SECURITY AND SECURITY THREATS NATIONAL OPEN UNIVERSITY OF NIGERIA COURSE CODE :CSS241 COURSE TITLE: BASIC SECURITY AND SECURITY THREATS 1 CSS 241 BASIC SECURITY AND SECURITY THREATS COURSE GUIDE CSS241 BASIC SECURITY AND SECURITY THREATS Course Developer/Writer Monsuru Adegboyega Kasali Non-Violence and Intercultural Communication Advocacy Initiatives, Ibadan, Nigeria Course Editor Rasidi Okunola, Ph. D Department of Sociology University of Ibadan Oyo State Course Coordinator Adeniyi T. Adegoke, Ph.D Criminology and Security Studies School of Arts and Social Sciences National Open University of Nigeria Programme Leader Prof. Abdul-Rasheed Yesufu Dean, School of Arts and Social Sciences National Open University of Nigeria 2 CSS 241 BASIC SECURITY AND SECURITY THREATS NATIONAL OPEN UNIVERSITY OF NIGERIA National Open University of Nigeria Headquarters 14/16 Ahmadu Bello Way Victoria Island Lagos Abuja Office No. 5 Dar es Salam Street Off Aminu Kano Crescent Wuse II, Abuja Nigeria e-mail: [email protected] URL: www.nou.edu.ng Published by National Open University of Nigeria Printed ISBN: All Rights Reserved CONTENTS PAGE Introduction……………………………………..………....i-ii What You Will Learn in this Course ...................................ii Course Aims…………………………………………..... ..ii-iii Course Objectives……………………………………… …iii-iv Working through this Course ...............................................iv Course Materials……………………………….………. …v 3 CSS 241 BASIC SECURITY AND SECURITY THREATS Study Units…………………………………….………. …v-vi Textbooks and References…………….……….……… ….vi-vii Assignment File ………………………………………. ….vii Assessment ………………………………….………. ……viii Tutor-Marked Assignment……………………………. …..viii Final Examination and Grading…………………..……. …viii Course Marking Scheme ………………………………. …viii Course Overview ………………………………………. …viii-ix Presentation Schedule …………………………………. …x How to Get the Most from this Course ……………………x Reading Section.....................................................................x-xi Facilitators/Tutors and Tutorials ……………………….
    [Show full text]