CSS 244 Types and Analysis of Security Threats

CSS 244 Types and Analysis of Security Threats

CSS 244 Types and Analysis of Security Threats NATIONAL OPEN UNIVERSITY OF NIGERIA COURSE CODE : CSS 244 COURSE TITLE: TYPES AND ANALYSIS OF SECURITY THREATS 1 CSS 244 Types and Analysis of Security Threats COURSE GUIDE CSS 244 TYPES AND ANALYSIS OF SECURITY THREATS Course Developer/Writer Monsuru Adegboyega Kasali Non-Violence and Intercultural Communication Advocacy Initiatives, Ibadan, Nigeria Course Editor Adewole Akinyemi Atere, Ph.D College of Management & Social Sciences Osun State University Course Coordinator Adeniyi Adegoke, Ph.D Criminology and Security Studies School of Arts and Social Sciences National Open University of Nigeria Programme Leader Prof. Abdul-Rasheed Yesufu Dean, School of Arts and Social Sciences National Open University of Nigeria NATIONAL OPEN UNIVERSITY OF NIGERIA 2 CSS 244 Types and Analysis of Security Threats National Open University of Nigeria Headquarters University Village Plot 91, Cadastral Zone, Nnamdi Azikiwe Express way Jabi, Abuja Lagos Office 14/16 Ahmadu Bello Way Victoria Island, Lagos e-mail: [email protected] website: www.nouedu.net Published by National Open University of Nigeria Printed ISBN: All Rights Reserved CONTENTS PAGE Introduction ................................................................... ...i-ii What You Will Learn in this Course ................................ ii-iii Course Aims ................................................................. iii-iv Course Objectives ......................................................... iv 3 CSS 244 Types and Analysis of Security Threats Working through this Course ............................................. v Course Materials ............................................................ v Study Units ................................................................... ..…v-vi Textbooks and References ................................................. vi-vii Assignment File ................................................................ viii Assessment ........................................................................ viii Tutor-Marked Assignment ................................................... .viii Final Examination and Grading ........................................ viii Course Marking Scheme .................................................... ix Course Overview ............................................................... ix-x Presentation Schedule ........................................................ x How to Get the Most from this Course............................... x Reading Section .............................................................. xi Facilitators/Tutors and Tutorials .................................. ...xii Summary ........................................................................... xii-xiii Introduction CSS 244: Types and Analysis of Security Threats is a 3-credit unit course. It is a compulsory course for all post-graduate diploma students in the field of Criminology and Security Studies of the University. The course is also recommended to any other post-graduate students especially those in the School of Arts and Social Sciences, who may have interest in the study and analysis of security threats and the mitigation techniques that can be adopted to prevent the occurrence of various threats or/and reduce the losses that may accompany the occurrence of any threats. The course can also be taken as an elective or required course by other post-graduate students whose main field(s) of discipline is not Criminology and Security Studies. However, the Course shall consist of 20 units, which are divided into 4 modules, and each of these modules shall consist of 5 units whereby the study draws a link between one unit and the other. In the first 2 modules of this course, we focus on various areas of discourse that explain the subject- types of security threats while the last 2 modules illuminate on various threat mitigation measures and crime management approaches that can assist in no small measure to prevent, detect, and control all forms of security threats. On the whole, the units contained in the course deal with the meaning and types of security threats; basic human or manmade security threats, terrorism as a security threat; war as a security threat; information warfare as a security threat; analyses of geological, climatic and environmental threats; basic types of security; civil security approaches to threat mitigation; risk psychology and analysis; among others. More interestingly, the material largely draws its case studies from security conditions and major threats experienced in Nigeria and Africa with the aim of exposing the reader or student to security challenges confronting Nigeria in particular and Africa as a whole. Having known that our study on types and analysis of security threats cannot be complete if we fail to have the knowledge of the overall incidence of security 4 CSS 244 Types and Analysis of Security Threats threats and mitigation techniques in some other places or continents, we shall also cite examples from other parts of the world including America, Europe and Asia. The course has no compulsory pre-requisites for it to be registered for. The course guide informs us on what this course is all about, what students will learn in each unit, what text materials we shall be using and how we can make the best use of these materials. This course guide also emphasises on the need for students to take tutor- marked assignments so seriously. However, necessary information on tutor-marked assignments shall be made known to students in a separate file, which will be sent to each of them at the appropriate time. This course is also supported with periodic tutorial classes. What You Will Learn in this Course CSS 645: Types and Analysis of Security Threats as a course in the field of Criminology and Security Studies at the National Open University of Nigeria focuses on a wide range of issues that bother on the meaning and types of security threats as well as identifying many threat mitigation measures and crime detection and control mechanisms in reducing the adverse effects of various security threats on people or communities. In this course, we carefully analyse and assess security threats, to assist the student not only to identify these threats but also to develop diagnostic framework through which they can proffer solutions towards hazard mitigation and effective security management. Also, the reader or student will be exposed to various measures that can safeguard the protection of life and property against the incidence of security threat and hazard. Nevertheless, the essence of these safety measures is at least to provide the student or reader with various ways through which he/she can reduce losses from any incidence on hazard or security attack, if you cannot prevent such threat or hazard from occurring. Knowing the impact that active involvement of civilians in security can have in complementing and increasing the capacity of the security personnel to carryout their duties effectively, the course also explores the strategic importance of civil security and how it can contribute to effective security management and threat mitigation. The issue of risk is germane to a discourse on security threats. This is because we take risks in our daily activities, and through risk psychology, we shall be explaining why some people take the issue of security risk so seriously while others do not take it seriously. In this analysis of risk, we examine how some individual or collective or governmental undertakings or actions can increase the possibility of risk, which may have either positive or adverse effects on our security or wellbeing. The material also focuses on other crime control and threat mitigation approaches including vulnerability and Capacity Assessment (VAC), Crime analysis as well as data mining and automated data analysis. Course Aims 5 CSS 244 Types and Analysis of Security Threats The overall aim of CSS 244: Types and Analysis of Security Threats as a course is to explore the meaning and types of security threats. It aims to classify various types of threats according to their peculiar conditions and features. Basically, threats are often classified as natural and human forms of security threats but this course further delineates the classification of threats into geological, climatic, environmental and human or manmade security threats for conceptual clarity and better appreciation of the subject-types of security threats. The course also explains different approaches and techniques through which security threats can be mitigated or controlled. The material describes the meaning of various types of basic security and their different approaches to general security management. These include measures to safeguard the security of computer and information systems, physical structures, infrastructure, public health, food supply among others. The course also shows the importance of civil security approaches, risk psychology and analysis, simulation, crime analysis and data mining and automated data analysis to threat mitigation and crime control. The material draws its case studies from the local and international environments. The course aims to: •• Conceptualise the term security threat; •• Identify various security threats; •• Classify or categorise various security threats; •• Discuss the meaning and types of various human or man-made security threats; •• Examine various manmade security threats; •• Explain the meaning and types of geological

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    242 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us