Tuesday, December 10, 2019

Security Management Use Of Cameras In The Military Complex

Question: Write a policy governing the use of cameras at a military complex. The equipment and personnel of the complex are all classified as top secret and photographs (and thus cameras) are not allowed. Your policy should adhere to the policy writing guidelines and management principles covered in the Greene text. Your policy needs to cover institutionally and privately owned cameras. Answer: Policy governing the use of cameras in the Military complex In the military complexes, strong rebuttal policies are undertaken all over the world. The privacy and security system is very high due to shielding (Greene, 2014). In this project, different policies guidelines and management principles regarding the use of cameras in military complexes are highlighted. Apart from this, the act and laws activated due to the use of cameras in ban areas are also discussed. This issue occurred in the Military complexes, though; high-level security is avail by the government (Zheng Carter, 2015). Therefore, to mitigate these problems the government is adopting some technical security principles. Security policy related to personal cameras and photography in the military complex Several security policies are taken in the army complex regarding the use of cameras. According to the conventional defence strategic model, many vulnerable situations are arising (Greene, 2014). Thus, to overcome these kinds of problems the adopted major policy is the use of surveillance cameras. Mainly fixed and PTZ cameras are utilized in the military complex but recently with the gradual improvement of technologies, use of IP cameras are also increasing rapidly (Pedersen, 2015). Capability Maturity Model The Capability Maturity Model (CMM) is a software model used to develop a five-step systematic maturity process employed in the military complexes. The CMM model was formulated in the middle 1980 for the military field to implement advanced software technologies (Greene, 2014). The term maturity model is strictly related to the degree of formality and structure. The structure ranges from the optimized process to ad hoc. In addition to this, the maturity model is related to information security, software development, system engineering, project management as well as risk management. Among individual security policies, Information warfare is one of the most advanced technologies implemented in the military complexes of America. It is an information communication technology (ICT) use to establish a secure communication system. Any photography and use of private cameras or mobile cameras are strictly prohibited in the military zones during the working hours and after that also. Sometimes it happened that visitors took photographs with their personal cameras in the surveillance cameras, which is not allowed (O'Lear, Briggs Denning, 2013). Therefore, whenever any outsider enters into the military complex, they have to go through some serious checking steps. During that period, along with checking of bags and personnel they also check the presence of cameras. The use of personal cameras in the military complex is a crime. Sometimes, it is found that attackers came with different kinds of types of equipment to steal secret or confidential data from the military camp (Zheng Carter, 2015). The surveillance cameras used in the military camp are not audible only visual effects are present. Therefore, if any unethical situation arises in the field and the audio effect is not available then related other problems m ight arrive. Legal steps for the use of cameras in military complexes Use of personal cameras in the military complex is a crime. Photography in the sensitive areas such as military bases areas or significant facilitates areas are not allowed. Therefore, anyone who breaks this rule is punished (Pedersen, 2015). In the armed forces bases, the militaries also do not have the permission to take pictures or to use personal cameras. In order to keep secure different confidential data and personal details cryptographic key algorithms are implemented in the military complex. According to the laws of penal code if anyone enter with heavy equipment in the military complex such as personal cameras or mobile camera then they will be strictly punished as this is unethical (O'Lear, Briggs Denning, 2013). Use of the photographs taken by the compound cannot be used outside. Mitigation of the issue The use of personal cameras and photography in the military complexes becomes an important issue (Campbell, 2014). In order to overcome this problem, some advanced technologies are accommodated with the traditional privacy policies. Implementation of advanced software technologies to detect the problem in the initial stage Hard punishment for the person who is avoiding the ethical rules Use of CCTV cameras in all the required areas Pre-protection should be taken so that no such issue occur further in the military areas Strict checking policies are adopted before giving permission for entrance to any outsider In order to mitigate the issues, the government is taking particular economic, social and environmental challenges (Pedersen, 2015). A security alarm is implemented in the military zone. If any outsider took entry with unwanted terror equipment, then the signal will indicate that (Greene, 2014). Through implementing different security networks, the military complex can be kept secure and safe. Apart from this, different software technologies are implemented to keep the military complex safe and secure. References Campbell, H. (2014). The Dismantling Of The Apartheid War Machine And The Problems Of Conversion Of The Military Industrial Complex. Flintham, M. (2012). The military-pastoral complex: Contemporary representations of militarism in the landscape.Tate Online Research Papers, (17). Greene, S. (2014).Security Program and Policies: Principles and Practices. Pearson Education. O'Lear, S., Briggs, C. M., Denning, G. M. (2013). Environmental Security, Military Planning, and Civilian Research: The Case of Water.Environment: Science and Policy for Sustainable Development,55(5), 3-13. Pedersen, M. D. (2015). Innovation and National Security: The Loss of Economic and Military Strength through the Theft of Ideas.Strategic Informer: Student Publication of the Strategic Intelligence Society,1(1), 7. Zheng, D., Carter, W. A. (2015).Leveraging the Internet of Things for a More Efficient and Effective Military. Rowman Littlefield.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.