SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Discussion Questions
: “The difficulty in predicting the future is that the outcomes
are unreliable, due to the occurrence of wild-card events that
distort the relatively well-understand trends for the near to mid-
future.” Offer an example of such a “wild-card” event and some
ways in which the security professional might address it in an
effective manner. Regarding the need for the security industry
as a whole to maintain the professionalism and competencies
needed to address emerging threats and hazards, what do you
feel are its primary areas of weakness and what proposals could
you offer to address them?
The Future of the Security
When considering what awaits the security profession in the
years to come and those that will operate within it,
developments and forecasts related to security science will in
large part be impacted by what has occurred in the past and in
present day. What
might
occur, what is most
plausible
and
feasible
given current and expected occurrences, and what has proven to
be effective (or not) will all need to be considered in
determining those issues that will remain relevant or change.
So predicting the future (not in the form of Nostradamus or
similar prophets) as it relates to security is a technique that
considers probable or desirable outcomes in the face of known
or anticipated risks. So given this backdrop, where is security
heading?
Physical Security
As long as there are structures that people operate within and
house various assets, there will continue to be a need to offer
needed protection related to them. All of the topics discussed in
this course related to walls, fencing, sensors, alarm systems,
guards, locks, and other such issues will be needed in some
form or fashion. Whether through manual or technological
means, these will remain a constant for the security
administrator in providing appropriate defensive measures for
the material, tangible assets they oversee. Concerning
technology, the same trend will continue in serving as a needed
aid in providing security moving forward. Mobile devices of
various types, functions, capabilities, and their ability to access
data, the ever-increasing use of robotics and the functions they
can carry out, sensors that will be able to gain more intelligence
regarding detection, and high frequency security cameras that
will have the capability to verify the chemical compound of an
object at a distance are just some of the many technical
innovations on the horizon. Yet, just as technology has taken on
a greater role in providing these efforts, so too does technology
represent ever-increasing concerns to the security manager.
Cyber Security
As society becomes connected on an ever-increasing basis,
attention must be directed towards what implications this
environment has related to not only security, but related privacy
concerns as well. In
Future Scenarios and Challenges for Security and Privacy
(2016, Williams, Axon, Nurse, & Creese), the researchers took
a very methodical approach in considering some 30 predictions
obtained from a variety of organizations and disciplines;
consolidating them into ten defined scenarios. These scenarios
took into consideration a range of not only technological
possibilities that might occur over the next decade, but those
that represented commercial and political ramifications as well.
A brief overview will be provided regarding these various
situations:
Growth of the Internet-of-Things
. The Internet-of-Things will permeate all aspects of daily life
moving forward, making the lines between the physical and
virtual worlds less defined. Unfortunately, this only lends itself
to increased online risks and related threats and attacks.
Proliferation of offensive tools
. Although all public or private sector entities will not find
themselves targeted by nation-states or other forms of
government, the capabilities represented by a variety of simple
attack tools can place individuals and organizations alike under
the pervasive risk of identity theft.
Privacy becomes reinterpreted
. As it is with many issues, the overall concept of privacy can
be viewed and defined differently. Nowhere is this more evident
than in those labeled as “digital natives,” individuals who have
been raised in an age of unfettered Internet access and increased
use (and dependence) of social networking. Although the
development and use of these platforms has become
commonplace and offer a host of benefits, they can be seen as
invasive and present a number of risks and concerns regarding
confidentiality.
Repressive enforcement of online order
. Issues related to free speech have and will continue to have an
impact on security; where liberal versus what might be seen as
repressive approaches regarding online activity are taken.
Issues regarding surveillance, censorship, and regulations not
only have the potential to impact attacks that are carried out in
the cyber operating environment, but could inadvertently affect
commerce and free enterprise as well.
Heterogeneity of state postures
. An environment made up of dissimilar or diverse elements can
certainly be a positive in many ways. However, when there is a
great disparity in how Personally Identifiable Information (PII)
is defined, cooperation over cyber norms could be negatively
impacted. This would generally be seen at the uppermost levels
where certain governments may decline to prosecute their cyber
criminals; where working relationships would no doubt be
impacted. However, even in corporate America, this could be
seen as well to varying degrees.
Traditional business models under pressure
. Each and every day, it seems that the landscape the overall
business community, associated operating frameworks, and
issues related to intellectual property are all impacted by not
only competitors, but those that would wish to do them harm
through nefarious means. Although financial capital, ingenuity,
and innovation will remain in high demand, “the evolution of
new business models would see individuals’ personal data
become the most valuable commodity (2016, p. 3). As such data
resides in global repositories on an ever increasing basis,
associated security concerns will also increase.
Big data enables greater control
. There is really nothing new with manipulating data in order to
produce a desired outcome (as can be in every election cycle
related to polls), but the amount of data that will continue to be
accessible moving forward will have a great impact on how an
individual’s behavior might be managed by both corporations
and government. Such analysis could be utilized to customize
everything from advertisements to campaigns, but straying away
from these types of activities must be viewed with suspicion
and appropriately guarded against.
Growth of public-private partnerships
. It should come as no surprise that as the amount of
information submitted, stored, and retrieved about individuals
increase, that it would be shared between various entities as
well. However, even though the sharing of data between those
within the public and private sectors can offer a number of
advantages, the risk of confidentiality being violated as the
spectrum of these partnerships increase as well.
Citizens demand greater control
. The demand for transparency has become commonplace in our
world today, especially as it relates to those who hold elected
office. Yet the same demands and expectations by members of
the public regarding personal data held online will require
appropriate approaches and policies.
Organizations value cyber-resilience
. As more activities are carried out within the virtual
environment, it becomes increasingly important for
organizations to be resilient in the face of attacks on it. These
can come as a result activities carried out by external
perpetrators, but insider threats but also be considered. Also,
those known as “Advanced Persistent Threats” can especially
wreak havoc and must be guarded against. This is where an
attack is carried out on an entire network by unauthorized
personnel and remains there undetected for a long period of
time.
After offering insight regarding each of these issues, the
researchers turned their attention to what challenges await
professionals in regards to both security and privacy in light of
current practices. It was noted that a number of gaps can be
found in existing guidelines; those that will prove insufficient
in addressing the level to which technology permeates daily
life. At its core, a fundamental understanding of online presence
and protection of it is needed at the individual level. Likewise,
organizations and the documents that have been developed to
offer needed guidance would appear to fall short in relation to
many of these issues noted. For instance, current
recommendations do offer protection against certain risks as
long as applicable devices are identified, inventoried, and
monitored. Yet as it relates to the Internet-of-Things, it is
expected that many of these devices will be personally owned;
incorporated as part of their clothing or implanted. Therefore,
accounting for each of them would simply not be feasible. So
much work needs to be done in the areas of research and
development, education and training, and the accompanying
policies and guidance needed to enact and govern appropriate
security measures.
References
Code of Ethics. (n.d.)
ASIS International
. Retrieved from https://admin.asisonline.org/About-
ASIS/Pages/Code-of-Ethics.aspx
Borodzicz, E. P., & Gibson, S. D. (2006). Corporate security
education: Towards meeting the challenge.
Security Journal
,
19
(3), 180-195.
Griffith, M., Brooks, D.J., & Corkill, L. (2010). Defining the
security professional: Definition through a body of knowledge.
Paper presented at the
Proceedings of the 3
rd
Australian Security and Intelligence Conference
, Perth, Western Australia. Retrieved from
http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1004&context=
asi
Securing Our Future: Cybersecurity and the Millennial
Workforce. (2017).
Raytheon
. Retrieved from
https://www.raytheon.com/sites/default/files/2017-
12/2017_cyber_report_rev1.pdf
Smith, C., & Brooks, D. J. (2012).
Security science: The theory and practice of security.
Burlington: Butterworth-Heinemann
Williams, M., Axon, L. Nurse, J. & Creese, S. (2016). Future
scenarios and challenges for security and privacy.
Department of Computer Science, University of Oxford
. Retrieved from https://www.cs.ox.ac.uk/files/8337/2016-rtsi-
wanc.pdf
Zorz, M. (2015). Do ethics get in the way of security
professionals?
Help Net Security
. Retrieved from
https://www.helpnetsecurity.com/2015/05/13/do-ethics-get-in-
the-way-of-security-professionals/
Discussion Questions The difficulty in predicting the future is .docx

Weitere ähnliche Inhalte

Ähnlich wie Discussion Questions The difficulty in predicting the future is .docx

A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Booz Allen Hamilton
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxbriancrawford30935
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeriaijtsrd
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Security personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docxSecurity personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docxjeffreye3
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarClaudia Warwar
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationNexon Asia Pacific
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxdaniahendric
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxmohitsrivastavabtech
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 

Ähnlich wie Discussion Questions The difficulty in predicting the future is .docx (20)

A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Security personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docxSecurity personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docx
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia Warwar
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 

Mehr von duketjoy27252

Discussion questions – Twain, The Man That Corrupted Hadleyburg.docx
Discussion questions – Twain, The Man That Corrupted Hadleyburg.docxDiscussion questions – Twain, The Man That Corrupted Hadleyburg.docx
Discussion questions – Twain, The Man That Corrupted Hadleyburg.docxduketjoy27252
 
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docxDiscussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docxduketjoy27252
 
Discussion Questions Identify the top three threats to the home.docx
Discussion Questions Identify the top three threats to the home.docxDiscussion Questions Identify the top three threats to the home.docx
Discussion Questions Identify the top three threats to the home.docxduketjoy27252
 
Discussion questions – Hurston Zora Neal Hurston attended Ho.docx
Discussion questions – Hurston Zora Neal Hurston attended Ho.docxDiscussion questions – Hurston Zora Neal Hurston attended Ho.docx
Discussion questions – Hurston Zora Neal Hurston attended Ho.docxduketjoy27252
 
Discussion Questions Compare and contrast through a critical an.docx
Discussion Questions Compare and contrast through a critical an.docxDiscussion Questions Compare and contrast through a critical an.docx
Discussion Questions Compare and contrast through a critical an.docxduketjoy27252
 
Discussion questions (self evaluation)Examine nursing roles th.docx
Discussion questions (self evaluation)Examine nursing roles th.docxDiscussion questions (self evaluation)Examine nursing roles th.docx
Discussion questions (self evaluation)Examine nursing roles th.docxduketjoy27252
 
Discussion QuestionReflecting on what you have learned abou.docx
Discussion QuestionReflecting on what you have learned abou.docxDiscussion QuestionReflecting on what you have learned abou.docx
Discussion QuestionReflecting on what you have learned abou.docxduketjoy27252
 
Discussion questionMotivation is the all-ensuing mechanism t.docx
Discussion questionMotivation is the all-ensuing mechanism t.docxDiscussion questionMotivation is the all-ensuing mechanism t.docx
Discussion questionMotivation is the all-ensuing mechanism t.docxduketjoy27252
 
Discussion QuestionHow much, if any, action on ergonomics in th.docx
Discussion QuestionHow much, if any, action on ergonomics in th.docxDiscussion QuestionHow much, if any, action on ergonomics in th.docx
Discussion QuestionHow much, if any, action on ergonomics in th.docxduketjoy27252
 
Discussion QuestionConsider a popular supplement you andor y.docx
Discussion QuestionConsider a popular supplement you andor y.docxDiscussion QuestionConsider a popular supplement you andor y.docx
Discussion QuestionConsider a popular supplement you andor y.docxduketjoy27252
 
Discussion QuestionDiscuss opportunities for innovation and en.docx
Discussion QuestionDiscuss opportunities for innovation and en.docxDiscussion QuestionDiscuss opportunities for innovation and en.docx
Discussion QuestionDiscuss opportunities for innovation and en.docxduketjoy27252
 
Discussion Question(s)Im interested in the role of women-- in t.docx
Discussion Question(s)Im interested in the role of women-- in t.docxDiscussion Question(s)Im interested in the role of women-- in t.docx
Discussion Question(s)Im interested in the role of women-- in t.docxduketjoy27252
 
Discussion Question(s)Why do you think that Native Allies and Af.docx
Discussion Question(s)Why do you think that Native Allies and Af.docxDiscussion Question(s)Why do you think that Native Allies and Af.docx
Discussion Question(s)Why do you think that Native Allies and Af.docxduketjoy27252
 
Discussion Question(This post must be at least 200 words.)What d.docx
Discussion Question(This post must be at least 200 words.)What d.docxDiscussion Question(This post must be at least 200 words.)What d.docx
Discussion Question(This post must be at least 200 words.)What d.docxduketjoy27252
 
Discussion Question(s)What were the colonial misgivings about m.docx
Discussion Question(s)What were the colonial misgivings about m.docxDiscussion Question(s)What were the colonial misgivings about m.docx
Discussion Question(s)What were the colonial misgivings about m.docxduketjoy27252
 
Discussion Question(s)The reading for this week was a grab bag o.docx
Discussion Question(s)The reading for this week was a grab bag o.docxDiscussion Question(s)The reading for this week was a grab bag o.docx
Discussion Question(s)The reading for this week was a grab bag o.docxduketjoy27252
 
Discussion Question(s)Could Latin American reactions to the Bour.docx
Discussion Question(s)Could Latin American reactions to the Bour.docxDiscussion Question(s)Could Latin American reactions to the Bour.docx
Discussion Question(s)Could Latin American reactions to the Bour.docxduketjoy27252
 
Discussion Question(s)Clearly there is potential for major probl.docx
Discussion Question(s)Clearly there is potential for major probl.docxDiscussion Question(s)Clearly there is potential for major probl.docx
Discussion Question(s)Clearly there is potential for major probl.docxduketjoy27252
 
Discussion Question Week #1·         Discover which agencies, in.docx
Discussion Question Week #1·         Discover which agencies, in.docxDiscussion Question Week #1·         Discover which agencies, in.docx
Discussion Question Week #1·         Discover which agencies, in.docxduketjoy27252
 
Discussion question  How does Environmental Health influence achi.docx
Discussion question  How does Environmental Health influence achi.docxDiscussion question  How does Environmental Health influence achi.docx
Discussion question  How does Environmental Health influence achi.docxduketjoy27252
 

Mehr von duketjoy27252 (20)

Discussion questions – Twain, The Man That Corrupted Hadleyburg.docx
Discussion questions – Twain, The Man That Corrupted Hadleyburg.docxDiscussion questions – Twain, The Man That Corrupted Hadleyburg.docx
Discussion questions – Twain, The Man That Corrupted Hadleyburg.docx
 
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docxDiscussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
 
Discussion Questions Identify the top three threats to the home.docx
Discussion Questions Identify the top three threats to the home.docxDiscussion Questions Identify the top three threats to the home.docx
Discussion Questions Identify the top three threats to the home.docx
 
Discussion questions – Hurston Zora Neal Hurston attended Ho.docx
Discussion questions – Hurston Zora Neal Hurston attended Ho.docxDiscussion questions – Hurston Zora Neal Hurston attended Ho.docx
Discussion questions – Hurston Zora Neal Hurston attended Ho.docx
 
Discussion Questions Compare and contrast through a critical an.docx
Discussion Questions Compare and contrast through a critical an.docxDiscussion Questions Compare and contrast through a critical an.docx
Discussion Questions Compare and contrast through a critical an.docx
 
Discussion questions (self evaluation)Examine nursing roles th.docx
Discussion questions (self evaluation)Examine nursing roles th.docxDiscussion questions (self evaluation)Examine nursing roles th.docx
Discussion questions (self evaluation)Examine nursing roles th.docx
 
Discussion QuestionReflecting on what you have learned abou.docx
Discussion QuestionReflecting on what you have learned abou.docxDiscussion QuestionReflecting on what you have learned abou.docx
Discussion QuestionReflecting on what you have learned abou.docx
 
Discussion questionMotivation is the all-ensuing mechanism t.docx
Discussion questionMotivation is the all-ensuing mechanism t.docxDiscussion questionMotivation is the all-ensuing mechanism t.docx
Discussion questionMotivation is the all-ensuing mechanism t.docx
 
Discussion QuestionHow much, if any, action on ergonomics in th.docx
Discussion QuestionHow much, if any, action on ergonomics in th.docxDiscussion QuestionHow much, if any, action on ergonomics in th.docx
Discussion QuestionHow much, if any, action on ergonomics in th.docx
 
Discussion QuestionConsider a popular supplement you andor y.docx
Discussion QuestionConsider a popular supplement you andor y.docxDiscussion QuestionConsider a popular supplement you andor y.docx
Discussion QuestionConsider a popular supplement you andor y.docx
 
Discussion QuestionDiscuss opportunities for innovation and en.docx
Discussion QuestionDiscuss opportunities for innovation and en.docxDiscussion QuestionDiscuss opportunities for innovation and en.docx
Discussion QuestionDiscuss opportunities for innovation and en.docx
 
Discussion Question(s)Im interested in the role of women-- in t.docx
Discussion Question(s)Im interested in the role of women-- in t.docxDiscussion Question(s)Im interested in the role of women-- in t.docx
Discussion Question(s)Im interested in the role of women-- in t.docx
 
Discussion Question(s)Why do you think that Native Allies and Af.docx
Discussion Question(s)Why do you think that Native Allies and Af.docxDiscussion Question(s)Why do you think that Native Allies and Af.docx
Discussion Question(s)Why do you think that Native Allies and Af.docx
 
Discussion Question(This post must be at least 200 words.)What d.docx
Discussion Question(This post must be at least 200 words.)What d.docxDiscussion Question(This post must be at least 200 words.)What d.docx
Discussion Question(This post must be at least 200 words.)What d.docx
 
Discussion Question(s)What were the colonial misgivings about m.docx
Discussion Question(s)What were the colonial misgivings about m.docxDiscussion Question(s)What were the colonial misgivings about m.docx
Discussion Question(s)What were the colonial misgivings about m.docx
 
Discussion Question(s)The reading for this week was a grab bag o.docx
Discussion Question(s)The reading for this week was a grab bag o.docxDiscussion Question(s)The reading for this week was a grab bag o.docx
Discussion Question(s)The reading for this week was a grab bag o.docx
 
Discussion Question(s)Could Latin American reactions to the Bour.docx
Discussion Question(s)Could Latin American reactions to the Bour.docxDiscussion Question(s)Could Latin American reactions to the Bour.docx
Discussion Question(s)Could Latin American reactions to the Bour.docx
 
Discussion Question(s)Clearly there is potential for major probl.docx
Discussion Question(s)Clearly there is potential for major probl.docxDiscussion Question(s)Clearly there is potential for major probl.docx
Discussion Question(s)Clearly there is potential for major probl.docx
 
Discussion Question Week #1·         Discover which agencies, in.docx
Discussion Question Week #1·         Discover which agencies, in.docxDiscussion Question Week #1·         Discover which agencies, in.docx
Discussion Question Week #1·         Discover which agencies, in.docx
 
Discussion question  How does Environmental Health influence achi.docx
Discussion question  How does Environmental Health influence achi.docxDiscussion question  How does Environmental Health influence achi.docx
Discussion question  How does Environmental Health influence achi.docx
 

Kürzlich hochgeladen

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Kürzlich hochgeladen (20)

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Discussion Questions The difficulty in predicting the future is .docx

  • 1. Discussion Questions : “The difficulty in predicting the future is that the outcomes are unreliable, due to the occurrence of wild-card events that distort the relatively well-understand trends for the near to mid- future.” Offer an example of such a “wild-card” event and some ways in which the security professional might address it in an effective manner. Regarding the need for the security industry as a whole to maintain the professionalism and competencies needed to address emerging threats and hazards, what do you feel are its primary areas of weakness and what proposals could you offer to address them? The Future of the Security When considering what awaits the security profession in the years to come and those that will operate within it, developments and forecasts related to security science will in large part be impacted by what has occurred in the past and in present day. What might occur, what is most plausible and feasible given current and expected occurrences, and what has proven to be effective (or not) will all need to be considered in determining those issues that will remain relevant or change. So predicting the future (not in the form of Nostradamus or similar prophets) as it relates to security is a technique that considers probable or desirable outcomes in the face of known or anticipated risks. So given this backdrop, where is security heading? Physical Security As long as there are structures that people operate within and house various assets, there will continue to be a need to offer needed protection related to them. All of the topics discussed in this course related to walls, fencing, sensors, alarm systems,
  • 2. guards, locks, and other such issues will be needed in some form or fashion. Whether through manual or technological means, these will remain a constant for the security administrator in providing appropriate defensive measures for the material, tangible assets they oversee. Concerning technology, the same trend will continue in serving as a needed aid in providing security moving forward. Mobile devices of various types, functions, capabilities, and their ability to access data, the ever-increasing use of robotics and the functions they can carry out, sensors that will be able to gain more intelligence regarding detection, and high frequency security cameras that will have the capability to verify the chemical compound of an object at a distance are just some of the many technical innovations on the horizon. Yet, just as technology has taken on a greater role in providing these efforts, so too does technology represent ever-increasing concerns to the security manager. Cyber Security As society becomes connected on an ever-increasing basis, attention must be directed towards what implications this environment has related to not only security, but related privacy concerns as well. In Future Scenarios and Challenges for Security and Privacy (2016, Williams, Axon, Nurse, & Creese), the researchers took a very methodical approach in considering some 30 predictions obtained from a variety of organizations and disciplines; consolidating them into ten defined scenarios. These scenarios took into consideration a range of not only technological possibilities that might occur over the next decade, but those that represented commercial and political ramifications as well. A brief overview will be provided regarding these various situations: Growth of the Internet-of-Things . The Internet-of-Things will permeate all aspects of daily life moving forward, making the lines between the physical and virtual worlds less defined. Unfortunately, this only lends itself to increased online risks and related threats and attacks.
  • 3. Proliferation of offensive tools . Although all public or private sector entities will not find themselves targeted by nation-states or other forms of government, the capabilities represented by a variety of simple attack tools can place individuals and organizations alike under the pervasive risk of identity theft. Privacy becomes reinterpreted . As it is with many issues, the overall concept of privacy can be viewed and defined differently. Nowhere is this more evident than in those labeled as “digital natives,” individuals who have been raised in an age of unfettered Internet access and increased use (and dependence) of social networking. Although the development and use of these platforms has become commonplace and offer a host of benefits, they can be seen as invasive and present a number of risks and concerns regarding confidentiality. Repressive enforcement of online order . Issues related to free speech have and will continue to have an impact on security; where liberal versus what might be seen as repressive approaches regarding online activity are taken. Issues regarding surveillance, censorship, and regulations not only have the potential to impact attacks that are carried out in the cyber operating environment, but could inadvertently affect commerce and free enterprise as well. Heterogeneity of state postures . An environment made up of dissimilar or diverse elements can certainly be a positive in many ways. However, when there is a great disparity in how Personally Identifiable Information (PII) is defined, cooperation over cyber norms could be negatively impacted. This would generally be seen at the uppermost levels where certain governments may decline to prosecute their cyber criminals; where working relationships would no doubt be impacted. However, even in corporate America, this could be seen as well to varying degrees. Traditional business models under pressure . Each and every day, it seems that the landscape the overall
  • 4. business community, associated operating frameworks, and issues related to intellectual property are all impacted by not only competitors, but those that would wish to do them harm through nefarious means. Although financial capital, ingenuity, and innovation will remain in high demand, “the evolution of new business models would see individuals’ personal data become the most valuable commodity (2016, p. 3). As such data resides in global repositories on an ever increasing basis, associated security concerns will also increase. Big data enables greater control . There is really nothing new with manipulating data in order to produce a desired outcome (as can be in every election cycle related to polls), but the amount of data that will continue to be accessible moving forward will have a great impact on how an individual’s behavior might be managed by both corporations and government. Such analysis could be utilized to customize everything from advertisements to campaigns, but straying away from these types of activities must be viewed with suspicion and appropriately guarded against. Growth of public-private partnerships . It should come as no surprise that as the amount of information submitted, stored, and retrieved about individuals increase, that it would be shared between various entities as well. However, even though the sharing of data between those within the public and private sectors can offer a number of advantages, the risk of confidentiality being violated as the spectrum of these partnerships increase as well. Citizens demand greater control . The demand for transparency has become commonplace in our world today, especially as it relates to those who hold elected office. Yet the same demands and expectations by members of the public regarding personal data held online will require appropriate approaches and policies. Organizations value cyber-resilience . As more activities are carried out within the virtual environment, it becomes increasingly important for
  • 5. organizations to be resilient in the face of attacks on it. These can come as a result activities carried out by external perpetrators, but insider threats but also be considered. Also, those known as “Advanced Persistent Threats” can especially wreak havoc and must be guarded against. This is where an attack is carried out on an entire network by unauthorized personnel and remains there undetected for a long period of time. After offering insight regarding each of these issues, the researchers turned their attention to what challenges await professionals in regards to both security and privacy in light of current practices. It was noted that a number of gaps can be found in existing guidelines; those that will prove insufficient in addressing the level to which technology permeates daily life. At its core, a fundamental understanding of online presence and protection of it is needed at the individual level. Likewise, organizations and the documents that have been developed to offer needed guidance would appear to fall short in relation to many of these issues noted. For instance, current recommendations do offer protection against certain risks as long as applicable devices are identified, inventoried, and monitored. Yet as it relates to the Internet-of-Things, it is expected that many of these devices will be personally owned; incorporated as part of their clothing or implanted. Therefore, accounting for each of them would simply not be feasible. So much work needs to be done in the areas of research and development, education and training, and the accompanying policies and guidance needed to enact and govern appropriate security measures. References Code of Ethics. (n.d.) ASIS International . Retrieved from https://admin.asisonline.org/About- ASIS/Pages/Code-of-Ethics.aspx Borodzicz, E. P., & Gibson, S. D. (2006). Corporate security education: Towards meeting the challenge.
  • 6. Security Journal , 19 (3), 180-195. Griffith, M., Brooks, D.J., & Corkill, L. (2010). Defining the security professional: Definition through a body of knowledge. Paper presented at the Proceedings of the 3 rd Australian Security and Intelligence Conference , Perth, Western Australia. Retrieved from http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1004&context= asi Securing Our Future: Cybersecurity and the Millennial Workforce. (2017). Raytheon . Retrieved from https://www.raytheon.com/sites/default/files/2017- 12/2017_cyber_report_rev1.pdf Smith, C., & Brooks, D. J. (2012). Security science: The theory and practice of security. Burlington: Butterworth-Heinemann Williams, M., Axon, L. Nurse, J. & Creese, S. (2016). Future scenarios and challenges for security and privacy. Department of Computer Science, University of Oxford . Retrieved from https://www.cs.ox.ac.uk/files/8337/2016-rtsi- wanc.pdf Zorz, M. (2015). Do ethics get in the way of security professionals? Help Net Security . Retrieved from https://www.helpnetsecurity.com/2015/05/13/do-ethics-get-in- the-way-of-security-professionals/