SlideShare a Scribd company logo
1 of 7
Discussion Questions
: “The difficulty in predicting the future is that the outcomes
are unreliable, due to the occurrence of wild-card events that
distort the relatively well-understand trends for the near to mid-
future.” Offer an example of such a “wild-card” event and some
ways in which the security professional might address it in an
effective manner. Regarding the need for the security industry
as a whole to maintain the professionalism and competencies
needed to address emerging threats and hazards, what do you
feel are its primary areas of weakness and what proposals could
you offer to address them?
The Future of the Security
When considering what awaits the security profession in the
years to come and those that will operate within it,
developments and forecasts related to security science will in
large part be impacted by what has occurred in the past and in
present day. What
might
occur, what is most
plausible
and
feasible
given current and expected occurrences, and what has proven to
be effective (or not) will all need to be considered in
determining those issues that will remain relevant or change.
So predicting the future (not in the form of Nostradamus or
similar prophets) as it relates to security is a technique that
considers probable or desirable outcomes in the face of known
or anticipated risks. So given this backdrop, where is security
heading?
Physical Security
As long as there are structures that people operate within and
house various assets, there will continue to be a need to offer
needed protection related to them. All of the topics discussed in
this course related to walls, fencing, sensors, alarm systems,
guards, locks, and other such issues will be needed in some
form or fashion. Whether through manual or technological
means, these will remain a constant for the security
administrator in providing appropriate defensive measures for
the material, tangible assets they oversee. Concerning
technology, the same trend will continue in serving as a needed
aid in providing security moving forward. Mobile devices of
various types, functions, capabilities, and their ability to access
data, the ever-increasing use of robotics and the functions they
can carry out, sensors that will be able to gain more intelligence
regarding detection, and high frequency security cameras that
will have the capability to verify the chemical compound of an
object at a distance are just some of the many technical
innovations on the horizon. Yet, just as technology has taken on
a greater role in providing these efforts, so too does technology
represent ever-increasing concerns to the security manager.
Cyber Security
As society becomes connected on an ever-increasing basis,
attention must be directed towards what implications this
environment has related to not only security, but related privacy
concerns as well. In
Future Scenarios and Challenges for Security and Privacy
(2016, Williams, Axon, Nurse, & Creese), the researchers took
a very methodical approach in considering some 30 predictions
obtained from a variety of organizations and disciplines;
consolidating them into ten defined scenarios. These scenarios
took into consideration a range of not only technological
possibilities that might occur over the next decade, but those
that represented commercial and political ramifications as well.
A brief overview will be provided regarding these various
situations:
Growth of the Internet-of-Things
. The Internet-of-Things will permeate all aspects of daily life
moving forward, making the lines between the physical and
virtual worlds less defined. Unfortunately, this only lends itself
to increased online risks and related threats and attacks.
Proliferation of offensive tools
. Although all public or private sector entities will not find
themselves targeted by nation-states or other forms of
government, the capabilities represented by a variety of simple
attack tools can place individuals and organizations alike under
the pervasive risk of identity theft.
Privacy becomes reinterpreted
. As it is with many issues, the overall concept of privacy can
be viewed and defined differently. Nowhere is this more evident
than in those labeled as “digital natives,” individuals who have
been raised in an age of unfettered Internet access and increased
use (and dependence) of social networking. Although the
development and use of these platforms has become
commonplace and offer a host of benefits, they can be seen as
invasive and present a number of risks and concerns regarding
confidentiality.
Repressive enforcement of online order
. Issues related to free speech have and will continue to have an
impact on security; where liberal versus what might be seen as
repressive approaches regarding online activity are taken.
Issues regarding surveillance, censorship, and regulations not
only have the potential to impact attacks that are carried out in
the cyber operating environment, but could inadvertently affect
commerce and free enterprise as well.
Heterogeneity of state postures
. An environment made up of dissimilar or diverse elements can
certainly be a positive in many ways. However, when there is a
great disparity in how Personally Identifiable Information (PII)
is defined, cooperation over cyber norms could be negatively
impacted. This would generally be seen at the uppermost levels
where certain governments may decline to prosecute their cyber
criminals; where working relationships would no doubt be
impacted. However, even in corporate America, this could be
seen as well to varying degrees.
Traditional business models under pressure
. Each and every day, it seems that the landscape the overall
business community, associated operating frameworks, and
issues related to intellectual property are all impacted by not
only competitors, but those that would wish to do them harm
through nefarious means. Although financial capital, ingenuity,
and innovation will remain in high demand, “the evolution of
new business models would see individuals’ personal data
become the most valuable commodity (2016, p. 3). As such data
resides in global repositories on an ever increasing basis,
associated security concerns will also increase.
Big data enables greater control
. There is really nothing new with manipulating data in order to
produce a desired outcome (as can be in every election cycle
related to polls), but the amount of data that will continue to be
accessible moving forward will have a great impact on how an
individual’s behavior might be managed by both corporations
and government. Such analysis could be utilized to customize
everything from advertisements to campaigns, but straying away
from these types of activities must be viewed with suspicion
and appropriately guarded against.
Growth of public-private partnerships
. It should come as no surprise that as the amount of
information submitted, stored, and retrieved about individuals
increase, that it would be shared between various entities as
well. However, even though the sharing of data between those
within the public and private sectors can offer a number of
advantages, the risk of confidentiality being violated as the
spectrum of these partnerships increase as well.
Citizens demand greater control
. The demand for transparency has become commonplace in our
world today, especially as it relates to those who hold elected
office. Yet the same demands and expectations by members of
the public regarding personal data held online will require
appropriate approaches and policies.
Organizations value cyber-resilience
. As more activities are carried out within the virtual
environment, it becomes increasingly important for
organizations to be resilient in the face of attacks on it. These
can come as a result activities carried out by external
perpetrators, but insider threats but also be considered. Also,
those known as “Advanced Persistent Threats” can especially
wreak havoc and must be guarded against. This is where an
attack is carried out on an entire network by unauthorized
personnel and remains there undetected for a long period of
time.
After offering insight regarding each of these issues, the
researchers turned their attention to what challenges await
professionals in regards to both security and privacy in light of
current practices. It was noted that a number of gaps can be
found in existing guidelines; those that will prove insufficient
in addressing the level to which technology permeates daily
life. At its core, a fundamental understanding of online presence
and protection of it is needed at the individual level. Likewise,
organizations and the documents that have been developed to
offer needed guidance would appear to fall short in relation to
many of these issues noted. For instance, current
recommendations do offer protection against certain risks as
long as applicable devices are identified, inventoried, and
monitored. Yet as it relates to the Internet-of-Things, it is
expected that many of these devices will be personally owned;
incorporated as part of their clothing or implanted. Therefore,
accounting for each of them would simply not be feasible. So
much work needs to be done in the areas of research and
development, education and training, and the accompanying
policies and guidance needed to enact and govern appropriate
security measures.
References
Code of Ethics. (n.d.)
ASIS International
. Retrieved from https://admin.asisonline.org/About-
ASIS/Pages/Code-of-Ethics.aspx
Borodzicz, E. P., & Gibson, S. D. (2006). Corporate security
education: Towards meeting the challenge.
Security Journal
,
19
(3), 180-195.
Griffith, M., Brooks, D.J., & Corkill, L. (2010). Defining the
security professional: Definition through a body of knowledge.
Paper presented at the
Proceedings of the 3
rd
Australian Security and Intelligence Conference
, Perth, Western Australia. Retrieved from
http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1004&context=
asi
Securing Our Future: Cybersecurity and the Millennial
Workforce. (2017).
Raytheon
. Retrieved from
https://www.raytheon.com/sites/default/files/2017-
12/2017_cyber_report_rev1.pdf
Smith, C., & Brooks, D. J. (2012).
Security science: The theory and practice of security.
Burlington: Butterworth-Heinemann
Williams, M., Axon, L. Nurse, J. & Creese, S. (2016). Future
scenarios and challenges for security and privacy.
Department of Computer Science, University of Oxford
. Retrieved from https://www.cs.ox.ac.uk/files/8337/2016-rtsi-
wanc.pdf
Zorz, M. (2015). Do ethics get in the way of security
professionals?
Help Net Security
. Retrieved from
https://www.helpnetsecurity.com/2015/05/13/do-ethics-get-in-
the-way-of-security-professionals/
Discussion Questions The difficulty in predicting the future is .docx

More Related Content

Similar to Discussion Questions The difficulty in predicting the future is .docx

A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Booz Allen Hamilton
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxbriancrawford30935
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeriaijtsrd
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Security personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docxSecurity personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docxjeffreye3
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarClaudia Warwar
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationNexon Asia Pacific
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxdaniahendric
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxmohitsrivastavabtech
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 

Similar to Discussion Questions The difficulty in predicting the future is .docx (20)

A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Security personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docxSecurity personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docx
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia Warwar
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 

More from duketjoy27252

Discussion questions – Twain, The Man That Corrupted Hadleyburg.docx
Discussion questions – Twain, The Man That Corrupted Hadleyburg.docxDiscussion questions – Twain, The Man That Corrupted Hadleyburg.docx
Discussion questions – Twain, The Man That Corrupted Hadleyburg.docxduketjoy27252
 
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docxDiscussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docxduketjoy27252
 
Discussion Questions Identify the top three threats to the home.docx
Discussion Questions Identify the top three threats to the home.docxDiscussion Questions Identify the top three threats to the home.docx
Discussion Questions Identify the top three threats to the home.docxduketjoy27252
 
Discussion questions – Hurston Zora Neal Hurston attended Ho.docx
Discussion questions – Hurston Zora Neal Hurston attended Ho.docxDiscussion questions – Hurston Zora Neal Hurston attended Ho.docx
Discussion questions – Hurston Zora Neal Hurston attended Ho.docxduketjoy27252
 
Discussion Questions Compare and contrast through a critical an.docx
Discussion Questions Compare and contrast through a critical an.docxDiscussion Questions Compare and contrast through a critical an.docx
Discussion Questions Compare and contrast through a critical an.docxduketjoy27252
 
Discussion questions (self evaluation)Examine nursing roles th.docx
Discussion questions (self evaluation)Examine nursing roles th.docxDiscussion questions (self evaluation)Examine nursing roles th.docx
Discussion questions (self evaluation)Examine nursing roles th.docxduketjoy27252
 
Discussion QuestionReflecting on what you have learned abou.docx
Discussion QuestionReflecting on what you have learned abou.docxDiscussion QuestionReflecting on what you have learned abou.docx
Discussion QuestionReflecting on what you have learned abou.docxduketjoy27252
 
Discussion questionMotivation is the all-ensuing mechanism t.docx
Discussion questionMotivation is the all-ensuing mechanism t.docxDiscussion questionMotivation is the all-ensuing mechanism t.docx
Discussion questionMotivation is the all-ensuing mechanism t.docxduketjoy27252
 
Discussion QuestionHow much, if any, action on ergonomics in th.docx
Discussion QuestionHow much, if any, action on ergonomics in th.docxDiscussion QuestionHow much, if any, action on ergonomics in th.docx
Discussion QuestionHow much, if any, action on ergonomics in th.docxduketjoy27252
 
Discussion QuestionConsider a popular supplement you andor y.docx
Discussion QuestionConsider a popular supplement you andor y.docxDiscussion QuestionConsider a popular supplement you andor y.docx
Discussion QuestionConsider a popular supplement you andor y.docxduketjoy27252
 
Discussion QuestionDiscuss opportunities for innovation and en.docx
Discussion QuestionDiscuss opportunities for innovation and en.docxDiscussion QuestionDiscuss opportunities for innovation and en.docx
Discussion QuestionDiscuss opportunities for innovation and en.docxduketjoy27252
 
Discussion Question(s)Im interested in the role of women-- in t.docx
Discussion Question(s)Im interested in the role of women-- in t.docxDiscussion Question(s)Im interested in the role of women-- in t.docx
Discussion Question(s)Im interested in the role of women-- in t.docxduketjoy27252
 
Discussion Question(s)Why do you think that Native Allies and Af.docx
Discussion Question(s)Why do you think that Native Allies and Af.docxDiscussion Question(s)Why do you think that Native Allies and Af.docx
Discussion Question(s)Why do you think that Native Allies and Af.docxduketjoy27252
 
Discussion Question(This post must be at least 200 words.)What d.docx
Discussion Question(This post must be at least 200 words.)What d.docxDiscussion Question(This post must be at least 200 words.)What d.docx
Discussion Question(This post must be at least 200 words.)What d.docxduketjoy27252
 
Discussion Question(s)What were the colonial misgivings about m.docx
Discussion Question(s)What were the colonial misgivings about m.docxDiscussion Question(s)What were the colonial misgivings about m.docx
Discussion Question(s)What were the colonial misgivings about m.docxduketjoy27252
 
Discussion Question(s)The reading for this week was a grab bag o.docx
Discussion Question(s)The reading for this week was a grab bag o.docxDiscussion Question(s)The reading for this week was a grab bag o.docx
Discussion Question(s)The reading for this week was a grab bag o.docxduketjoy27252
 
Discussion Question(s)Could Latin American reactions to the Bour.docx
Discussion Question(s)Could Latin American reactions to the Bour.docxDiscussion Question(s)Could Latin American reactions to the Bour.docx
Discussion Question(s)Could Latin American reactions to the Bour.docxduketjoy27252
 
Discussion Question(s)Clearly there is potential for major probl.docx
Discussion Question(s)Clearly there is potential for major probl.docxDiscussion Question(s)Clearly there is potential for major probl.docx
Discussion Question(s)Clearly there is potential for major probl.docxduketjoy27252
 
Discussion Question Week #1·         Discover which agencies, in.docx
Discussion Question Week #1·         Discover which agencies, in.docxDiscussion Question Week #1·         Discover which agencies, in.docx
Discussion Question Week #1·         Discover which agencies, in.docxduketjoy27252
 
Discussion question  How does Environmental Health influence achi.docx
Discussion question  How does Environmental Health influence achi.docxDiscussion question  How does Environmental Health influence achi.docx
Discussion question  How does Environmental Health influence achi.docxduketjoy27252
 

More from duketjoy27252 (20)

Discussion questions – Twain, The Man That Corrupted Hadleyburg.docx
Discussion questions – Twain, The Man That Corrupted Hadleyburg.docxDiscussion questions – Twain, The Man That Corrupted Hadleyburg.docx
Discussion questions – Twain, The Man That Corrupted Hadleyburg.docx
 
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docxDiscussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
Discussion questions – Dunbar Paul Lawrence Dunbar was a pio.docx
 
Discussion Questions Identify the top three threats to the home.docx
Discussion Questions Identify the top three threats to the home.docxDiscussion Questions Identify the top three threats to the home.docx
Discussion Questions Identify the top three threats to the home.docx
 
Discussion questions – Hurston Zora Neal Hurston attended Ho.docx
Discussion questions – Hurston Zora Neal Hurston attended Ho.docxDiscussion questions – Hurston Zora Neal Hurston attended Ho.docx
Discussion questions – Hurston Zora Neal Hurston attended Ho.docx
 
Discussion Questions Compare and contrast through a critical an.docx
Discussion Questions Compare and contrast through a critical an.docxDiscussion Questions Compare and contrast through a critical an.docx
Discussion Questions Compare and contrast through a critical an.docx
 
Discussion questions (self evaluation)Examine nursing roles th.docx
Discussion questions (self evaluation)Examine nursing roles th.docxDiscussion questions (self evaluation)Examine nursing roles th.docx
Discussion questions (self evaluation)Examine nursing roles th.docx
 
Discussion QuestionReflecting on what you have learned abou.docx
Discussion QuestionReflecting on what you have learned abou.docxDiscussion QuestionReflecting on what you have learned abou.docx
Discussion QuestionReflecting on what you have learned abou.docx
 
Discussion questionMotivation is the all-ensuing mechanism t.docx
Discussion questionMotivation is the all-ensuing mechanism t.docxDiscussion questionMotivation is the all-ensuing mechanism t.docx
Discussion questionMotivation is the all-ensuing mechanism t.docx
 
Discussion QuestionHow much, if any, action on ergonomics in th.docx
Discussion QuestionHow much, if any, action on ergonomics in th.docxDiscussion QuestionHow much, if any, action on ergonomics in th.docx
Discussion QuestionHow much, if any, action on ergonomics in th.docx
 
Discussion QuestionConsider a popular supplement you andor y.docx
Discussion QuestionConsider a popular supplement you andor y.docxDiscussion QuestionConsider a popular supplement you andor y.docx
Discussion QuestionConsider a popular supplement you andor y.docx
 
Discussion QuestionDiscuss opportunities for innovation and en.docx
Discussion QuestionDiscuss opportunities for innovation and en.docxDiscussion QuestionDiscuss opportunities for innovation and en.docx
Discussion QuestionDiscuss opportunities for innovation and en.docx
 
Discussion Question(s)Im interested in the role of women-- in t.docx
Discussion Question(s)Im interested in the role of women-- in t.docxDiscussion Question(s)Im interested in the role of women-- in t.docx
Discussion Question(s)Im interested in the role of women-- in t.docx
 
Discussion Question(s)Why do you think that Native Allies and Af.docx
Discussion Question(s)Why do you think that Native Allies and Af.docxDiscussion Question(s)Why do you think that Native Allies and Af.docx
Discussion Question(s)Why do you think that Native Allies and Af.docx
 
Discussion Question(This post must be at least 200 words.)What d.docx
Discussion Question(This post must be at least 200 words.)What d.docxDiscussion Question(This post must be at least 200 words.)What d.docx
Discussion Question(This post must be at least 200 words.)What d.docx
 
Discussion Question(s)What were the colonial misgivings about m.docx
Discussion Question(s)What were the colonial misgivings about m.docxDiscussion Question(s)What were the colonial misgivings about m.docx
Discussion Question(s)What were the colonial misgivings about m.docx
 
Discussion Question(s)The reading for this week was a grab bag o.docx
Discussion Question(s)The reading for this week was a grab bag o.docxDiscussion Question(s)The reading for this week was a grab bag o.docx
Discussion Question(s)The reading for this week was a grab bag o.docx
 
Discussion Question(s)Could Latin American reactions to the Bour.docx
Discussion Question(s)Could Latin American reactions to the Bour.docxDiscussion Question(s)Could Latin American reactions to the Bour.docx
Discussion Question(s)Could Latin American reactions to the Bour.docx
 
Discussion Question(s)Clearly there is potential for major probl.docx
Discussion Question(s)Clearly there is potential for major probl.docxDiscussion Question(s)Clearly there is potential for major probl.docx
Discussion Question(s)Clearly there is potential for major probl.docx
 
Discussion Question Week #1·         Discover which agencies, in.docx
Discussion Question Week #1·         Discover which agencies, in.docxDiscussion Question Week #1·         Discover which agencies, in.docx
Discussion Question Week #1·         Discover which agencies, in.docx
 
Discussion question  How does Environmental Health influence achi.docx
Discussion question  How does Environmental Health influence achi.docxDiscussion question  How does Environmental Health influence achi.docx
Discussion question  How does Environmental Health influence achi.docx
 

Recently uploaded

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 

Recently uploaded (20)

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 

Discussion Questions The difficulty in predicting the future is .docx

  • 1. Discussion Questions : “The difficulty in predicting the future is that the outcomes are unreliable, due to the occurrence of wild-card events that distort the relatively well-understand trends for the near to mid- future.” Offer an example of such a “wild-card” event and some ways in which the security professional might address it in an effective manner. Regarding the need for the security industry as a whole to maintain the professionalism and competencies needed to address emerging threats and hazards, what do you feel are its primary areas of weakness and what proposals could you offer to address them? The Future of the Security When considering what awaits the security profession in the years to come and those that will operate within it, developments and forecasts related to security science will in large part be impacted by what has occurred in the past and in present day. What might occur, what is most plausible and feasible given current and expected occurrences, and what has proven to be effective (or not) will all need to be considered in determining those issues that will remain relevant or change. So predicting the future (not in the form of Nostradamus or similar prophets) as it relates to security is a technique that considers probable or desirable outcomes in the face of known or anticipated risks. So given this backdrop, where is security heading? Physical Security As long as there are structures that people operate within and house various assets, there will continue to be a need to offer needed protection related to them. All of the topics discussed in this course related to walls, fencing, sensors, alarm systems,
  • 2. guards, locks, and other such issues will be needed in some form or fashion. Whether through manual or technological means, these will remain a constant for the security administrator in providing appropriate defensive measures for the material, tangible assets they oversee. Concerning technology, the same trend will continue in serving as a needed aid in providing security moving forward. Mobile devices of various types, functions, capabilities, and their ability to access data, the ever-increasing use of robotics and the functions they can carry out, sensors that will be able to gain more intelligence regarding detection, and high frequency security cameras that will have the capability to verify the chemical compound of an object at a distance are just some of the many technical innovations on the horizon. Yet, just as technology has taken on a greater role in providing these efforts, so too does technology represent ever-increasing concerns to the security manager. Cyber Security As society becomes connected on an ever-increasing basis, attention must be directed towards what implications this environment has related to not only security, but related privacy concerns as well. In Future Scenarios and Challenges for Security and Privacy (2016, Williams, Axon, Nurse, & Creese), the researchers took a very methodical approach in considering some 30 predictions obtained from a variety of organizations and disciplines; consolidating them into ten defined scenarios. These scenarios took into consideration a range of not only technological possibilities that might occur over the next decade, but those that represented commercial and political ramifications as well. A brief overview will be provided regarding these various situations: Growth of the Internet-of-Things . The Internet-of-Things will permeate all aspects of daily life moving forward, making the lines between the physical and virtual worlds less defined. Unfortunately, this only lends itself to increased online risks and related threats and attacks.
  • 3. Proliferation of offensive tools . Although all public or private sector entities will not find themselves targeted by nation-states or other forms of government, the capabilities represented by a variety of simple attack tools can place individuals and organizations alike under the pervasive risk of identity theft. Privacy becomes reinterpreted . As it is with many issues, the overall concept of privacy can be viewed and defined differently. Nowhere is this more evident than in those labeled as “digital natives,” individuals who have been raised in an age of unfettered Internet access and increased use (and dependence) of social networking. Although the development and use of these platforms has become commonplace and offer a host of benefits, they can be seen as invasive and present a number of risks and concerns regarding confidentiality. Repressive enforcement of online order . Issues related to free speech have and will continue to have an impact on security; where liberal versus what might be seen as repressive approaches regarding online activity are taken. Issues regarding surveillance, censorship, and regulations not only have the potential to impact attacks that are carried out in the cyber operating environment, but could inadvertently affect commerce and free enterprise as well. Heterogeneity of state postures . An environment made up of dissimilar or diverse elements can certainly be a positive in many ways. However, when there is a great disparity in how Personally Identifiable Information (PII) is defined, cooperation over cyber norms could be negatively impacted. This would generally be seen at the uppermost levels where certain governments may decline to prosecute their cyber criminals; where working relationships would no doubt be impacted. However, even in corporate America, this could be seen as well to varying degrees. Traditional business models under pressure . Each and every day, it seems that the landscape the overall
  • 4. business community, associated operating frameworks, and issues related to intellectual property are all impacted by not only competitors, but those that would wish to do them harm through nefarious means. Although financial capital, ingenuity, and innovation will remain in high demand, “the evolution of new business models would see individuals’ personal data become the most valuable commodity (2016, p. 3). As such data resides in global repositories on an ever increasing basis, associated security concerns will also increase. Big data enables greater control . There is really nothing new with manipulating data in order to produce a desired outcome (as can be in every election cycle related to polls), but the amount of data that will continue to be accessible moving forward will have a great impact on how an individual’s behavior might be managed by both corporations and government. Such analysis could be utilized to customize everything from advertisements to campaigns, but straying away from these types of activities must be viewed with suspicion and appropriately guarded against. Growth of public-private partnerships . It should come as no surprise that as the amount of information submitted, stored, and retrieved about individuals increase, that it would be shared between various entities as well. However, even though the sharing of data between those within the public and private sectors can offer a number of advantages, the risk of confidentiality being violated as the spectrum of these partnerships increase as well. Citizens demand greater control . The demand for transparency has become commonplace in our world today, especially as it relates to those who hold elected office. Yet the same demands and expectations by members of the public regarding personal data held online will require appropriate approaches and policies. Organizations value cyber-resilience . As more activities are carried out within the virtual environment, it becomes increasingly important for
  • 5. organizations to be resilient in the face of attacks on it. These can come as a result activities carried out by external perpetrators, but insider threats but also be considered. Also, those known as “Advanced Persistent Threats” can especially wreak havoc and must be guarded against. This is where an attack is carried out on an entire network by unauthorized personnel and remains there undetected for a long period of time. After offering insight regarding each of these issues, the researchers turned their attention to what challenges await professionals in regards to both security and privacy in light of current practices. It was noted that a number of gaps can be found in existing guidelines; those that will prove insufficient in addressing the level to which technology permeates daily life. At its core, a fundamental understanding of online presence and protection of it is needed at the individual level. Likewise, organizations and the documents that have been developed to offer needed guidance would appear to fall short in relation to many of these issues noted. For instance, current recommendations do offer protection against certain risks as long as applicable devices are identified, inventoried, and monitored. Yet as it relates to the Internet-of-Things, it is expected that many of these devices will be personally owned; incorporated as part of their clothing or implanted. Therefore, accounting for each of them would simply not be feasible. So much work needs to be done in the areas of research and development, education and training, and the accompanying policies and guidance needed to enact and govern appropriate security measures. References Code of Ethics. (n.d.) ASIS International . Retrieved from https://admin.asisonline.org/About- ASIS/Pages/Code-of-Ethics.aspx Borodzicz, E. P., & Gibson, S. D. (2006). Corporate security education: Towards meeting the challenge.
  • 6. Security Journal , 19 (3), 180-195. Griffith, M., Brooks, D.J., & Corkill, L. (2010). Defining the security professional: Definition through a body of knowledge. Paper presented at the Proceedings of the 3 rd Australian Security and Intelligence Conference , Perth, Western Australia. Retrieved from http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1004&context= asi Securing Our Future: Cybersecurity and the Millennial Workforce. (2017). Raytheon . Retrieved from https://www.raytheon.com/sites/default/files/2017- 12/2017_cyber_report_rev1.pdf Smith, C., & Brooks, D. J. (2012). Security science: The theory and practice of security. Burlington: Butterworth-Heinemann Williams, M., Axon, L. Nurse, J. & Creese, S. (2016). Future scenarios and challenges for security and privacy. Department of Computer Science, University of Oxford . Retrieved from https://www.cs.ox.ac.uk/files/8337/2016-rtsi- wanc.pdf Zorz, M. (2015). Do ethics get in the way of security professionals? Help Net Security . Retrieved from https://www.helpnetsecurity.com/2015/05/13/do-ethics-get-in- the-way-of-security-professionals/