Question

In: Operations Management

Create a poster which identifies the current primary security threats facing civil aviation for new security...

Create a poster which identifies the current primary security threats facing civil aviation for new security staff joining an aviation security group.

Outline

“Protecting this [aviation security] system demands a high level of vigilance because a single lapse in aviation security can result in hundreds of deaths, destroy equipment worth hundreds of millions of dollars, and have immeasurable negative impacts on the economy and the public’s confidence in air travel.”

Your task is to create a poster, using PowerPoint, identifying the primary security threats and unlawful acts against modern civil aviation. The size setting for the poster should be A1 (59 x 81 cm). Provide specific illustrative examples in your presentation. Submit your PowerPoint file through the Blackboard link provided for this assignment.

Solutions

Expert Solution

Answer:

Primary security threats facing civil aviation for new security staff joining an aviation security group:

1. Air terminals as urban communities: Conventional city issues are finding their way into air terminals the destitute, the intellectually sick, sedate maltreatment, unimportant and complex wrongdoing, and common noncompliance. For law implementation and security organizations, the test is to at the same time perform person on-call obligations while distinguishing high-result dangers to avionics activities. Both require explicit, particular ranges of abilities. Security chiefs need to adjust resources, workforce, and activities to moderate both open issues and country security dangers.

2. Global fear based on oppression: Business aeronautics will stay an appealing objective for activist gatherings and fanatics. The open side of air terminals curbside to security screening is powerless against a variety of psychological oppressor assaults, including dynamic shooters, baggage loaded up with explosives, weaponized automatons, and vehicle smashing. A huge number of aggressors, in fact, capable and ideologically inspired, who is coming back from the bombing ISIS caliphate may pull together under new banners, join al Qaeda members, or act freely.

3. In-flight interruptions: On a week by week premise, media reports and Internet recordings show the most recent shock inside airplane lodges fighting, tanked blusters, rapes, and opposing airline stewards. This pattern of in-flight questions and savagery at 35,000 feet is conceivably hazardous. Shy of setting a security official ready, arrangements may include institutional changes in the flight group to-traveler relationship. For instance, occasions of human dealers utilizing business carriers are so basic since flight teams are being prepared to spot pointers and act. This is a further case of the changing job of flight teams from sofas to masters.

4. Insider danger: Psychological oppressor gatherings may enroll air terminal representatives to go around security screening particularly workers with direct access to an airplane. Representatives have likewise pirated medications, weapons, and other booties. Only one radicalized or displeased worker can submit a demonstration that prompts a disastrous occurrence, which focuses on tending to insider dangers. Air terminals and carriers are executing their own systems to relieve this risk. For the most part, this exertion has included security screening of all or select workers before entering limited zones. Innovation may bolster this exertion also. New investigation capacities inserted in video and access control frameworks can give an advanced reconnaissance device. Self-policing with a thorough, inside "See Something, Say Something" exertion is fundamental.

POSTER:

Recommendations:

  • An excess of consistency can be an awful thing. There is as yet a propensity to concentrate wellbeing endeavors on consistency with existing guidelines. Be that as it may, as guidelines will in general set aside some effort to reflect attention to new vulnerabilities, this can prompt advancing dangers being disregarded, disabling readiness.
  • Organizations should think like aggressors, not protectors. The most ideal approach to plan for tomorrow's assaults, instead of just forestall a rehash of yesterday's, is to think like an assailant.
  • Participation in security worries, in the physical and digital area, makes everybody more grounded. Singular organizations need to abstain from considering there to be flexibility against assaults as a wellspring of a similar bit of leeway: that makes the potential for people with malevolent aim to search for the most fragile connection, and any fruitful assault undermines the division all in all.
  • We have to reconsider fringe security for the computerized age. In spite of the fact that assaults can progressively be mounted remotely, flying security is as yet improved by better information about travelers – and the present way to deal with cross-outskirt development is the emphatically twentieth century.

Related Solutions

What is the current state of wireless security? What are the vulnerabilities? What are the threats?
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
1. What are the new threats to human security in the era of globalization? 2. Two...
1. What are the new threats to human security in the era of globalization? 2. Two individuals have become whistleblowers: Edward Snowden abd Julian Assange. They believe that their choices prioritize human or individual rights over nation-states security. Do uou think that their arguments are valid? Why or Why not? Please explain with a lengthy explanation.
Which acts constitute "crimes" as opposed to national security threats, or is that a false dichotomy?...
Which acts constitute "crimes" as opposed to national security threats, or is that a false dichotomy? If the source of an attack is not clearly identifiable, how can its nature and motivations be assessed, and appropriate responses made? What level of response is appropriate to the threats occurring online, and who should have main responsibilities for the response?
Which of the following best describes the job duties of security administrators? a) They create security...
Which of the following best describes the job duties of security administrators? a) They create security policies. b) They design secure systems. c) They check if employees comply with security policies. d) They ensure appropriate separation of duties exists to prevent abuse of privilege. Managing incident response is a key area of which of the following CBK domains? a) Information security governance and risk management b) Security architecture and design c) Business continuity and disaster recovery planning d) Operations security...
Covid-19 has brought to the forefront the primary issue facing healthcare, which is the shortage of...
Covid-19 has brought to the forefront the primary issue facing healthcare, which is the shortage of supplies/personnel. This has created a need to prioritize or triage who should get critical care? How are these decisions being made?
What is the PRIMARY goal of an Information Security Continuous Monitoring (ISCM) strategy? Create expedited assessment...
What is the PRIMARY goal of an Information Security Continuous Monitoring (ISCM) strategy? Create expedited assessment process for cost savings. Maintain visibility of an organization’s high-cost controls. Support organization risk management decisions. Assess the organizational tiers.
Which of the following is a current concern facing the US health care system? A. The...
Which of the following is a current concern facing the US health care system? A. The rising number of the uninsured. B. Increases in insurance premiums. C. Ineffective and uncoordinated care. D. All of these are issues that the US healthcare system currently faces.
What opportunities might current IMF lending policies to developing nations create for international businesses? What threats...
What opportunities might current IMF lending policies to developing nations create for international businesses? What threats might they create? How would you assess the lending policy and practices of the on developing nations? What might need to change and why? Reflecting back on the global financial crisis of 2008-09, did the globalization of capital markets contribute to the crisis? If so, what can be done to stop such global financial contagion in the future?
What opportunities might current IMF lending policies to developing nations create for international businesses? What threats...
What opportunities might current IMF lending policies to developing nations create for international businesses? What threats might they create? How would you assess the lending policy and practices of the on developing nations? What might need to change and why? Reflecting back on the global financial crisis of 2008-09, did the globalization of capital markets contribute to the crisis? If so, what can be done to stop such global financial contagion in the future?
Which of the following describes the change in current from the primary circuit to the secondary...
Which of the following describes the change in current from the primary circuit to the secondary circuit of a step-up transformer? a. The current in the secondary circuit is less than the current in the primary circuit. b. The current in the secondary circuit is equal to the current in the primary circuit. c. The current in the secondary circuit is greater than the current in the primary circuit. d. none of the above A step-up transformer is used to...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT