Posts

MAN- MADE DISASTERS

Image
  MAN-MADE DISASTERS Man-made disasters can include hazardous material spills, fires, groundwater contamination, transportation accidents, structure failures, mining accidents, explosions and acts of terrorism. There are actions that we can take to prepare to react appropriately to these events. The key to acting appropriately to these man-made threats is to find out what you need to do and what you need to have in advance of a man-made emergency and to prepare to respond appropriately. Hazardous Material Incidents Hazardous materials are chemicals that if accidentally released can cause damage to the environment and health. Many chemicals that used in industry, agriculture, medical research, and in our homes can become hazardous if properly used. Many hazardous materials are transported by rail or road and can be subject to accidental release. Terrorism No one is immune from terrorism. Terrorism can come from outside the United States (911) or it can be the result of the actions of ot

CYBER SECURITY

Image
  CYBER SECURITY Computer security, cybersecurity or information technology security is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.  The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. ·            Network security  is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware. ·            Application security  focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed. ·            Information security  protects the integrity and privacy of data, both in storage and in transit. ·            Operational security  includes the process

CYBER CRIME

Image
  CYBER CRIME CYBERCRIME , also called  C omputer Crime , the use of a  COMPUTER  as an instrument to further illegal ends, such as committing  FRAUD , trafficking in child pornography and  intellectual  property,  STEALING IDENTITIES , or violating privacy. CYBERCRIME , especially through the  INTERNET , has grown in importance as the computer has become central to commerce, entertainment, and government. Because of the early and widespread adoption of computers and the INTERNET  in the United States , most of the earliest victims and villains of CYBERCRIMES were Americans . By the 21st century, though, hardly a hamlet remained anywhere in the world that had not been touched by CYBERCRIMES of one sort or another. Top 5 Popular Cybercrimes to Effortlessly Protect Your Computer and Data Against its Impact Phishing scams. Phishing is a practice of a cybercriminal or hacker attempting to obtain sensitive or personal information from a computer user.   Identity Theft scams .  Online Hara

AMERICA'S GOT TALENT

Image
AMERICA'S GOT TALENT America's Got Talent (often abbreviated as AGT) is a televised American talent show competition, and is part of the global Got Talent franchise created by Simon Cowell . The program is produced by Fremantle USA and Syco Entertainment , distributed by the former, and broadcast on the NBC television network, premiering on June 21, 2006 , after plans for a British edition in 2005 were suspended following a dispute within the British broadcaster ITV ; production would later resume in 2007, following the success of the first season. Each season is mainly run during the network's summer schedule, and has featured various hosts over the course of the program's history; the current host is Terry Crews . The program attracts a variety of participants, from across the United States and abroad, to take part and who possess some form of TALENTS , with acts ranging from singing, dancing, comedy, magic, stunts, variety, and other genres . Each participant who