SlideShare a Scribd company logo
1 of 10
Question:
Convey the integral role that knowledge, data, information, and
intelligence play (provide appropriate details and examples for
each of these) not only in providing security as a whole, but
how they are utilized in business continuity management efforts
as well. Also, what future issues will have a direct impact on
these topics as well and how should they be approached?
6 pages needed
The Future of the Security
When considering what awaits the security profession in the
years to come and those that will operate within it,
developments and forecasts related to security science will in
large part be impacted by what has occurred in the past and in
present day. What
might
occur, what is most
plausible
and
feasible
given current and expected occurrences, and what has proven to
be effective (or not) will all need to be considered in
determining those issues that will remain relevant or change.
So predicting the future (not in the form of Nostradamus or
similar prophets) as it relates to security is a technique that
considers probable or desirable outcomes in the face of known
or anticipated risks. So given this backdrop, where is security
heading?
Physical Security
As long as there are structures that people operate within and
house various assets, there will continue to be a need to offer
needed protection related to them. All of the topics discussed in
this course related to walls, fencing, sensors, alarm systems,
guards, locks, and other such issues will be needed in some
form or fashion. Whether through manual or technological
means, these will remain a constant for the security
administrator in providing appropriate defensive measures for
the material, tangible assets they oversee. Concerning
technology, the same trend will continue in serving as a needed
aid in providing security moving forward. Mobile devices of
various types, functions, capabilities, and their ability to access
data, the ever-increasing use of robotics and the functions they
can carry out, sensors that will be able to gain more intelligence
regarding detection, and high frequency security cameras that
will have the capability to verify the chemical compound of an
object at a distance are just some of the many technical
innovations on the horizon. Yet, just as technology has taken on
a greater role in providing these efforts, so too does technology
represent ever-increasing concerns to the security manager.
Cyber Security
As society becomes connected on an ever-increasing basis,
attention must be directed towards what implications this
environment has related to not only security, but related privacy
concerns as well. In
Future Scenarios and Challenges for Security and Privacy
(2016, Williams, Axon, Nurse, & Creese), the researchers took
a very methodical approach in considering some 30 predictions
obtained from a variety of organizations and disciplines;
consolidating them into ten defined scenarios. These scenarios
took into consideration a range of not only technological
possibilities that might occur over the next decade, but those
that represented commercial and political ramifications as well.
A brief overview will be provided regarding these various
situations:
Growth of the Internet-of-Things
. The Internet-of-Things will permeate all aspects of daily life
moving forward, making the lines between the physical and
virtual worlds less defined. Unfortunately, this only lends itself
to increased online risks and related threats and attacks.
Proliferation of offensive tools
. Although all public or private sector entities will not find
themselves targeted by nation-states or other forms of
government, the capabilities represented by a variety of simple
attack tools can place individuals and organizations alike under
the pervasive risk of identity theft.
Privacy becomes reinterpreted
. As it is with many issues, the overall concept of privacy can
be viewed and defined differently. Nowhere is this more evident
than in those labeled as “digital natives,” individuals who have
been raised in an age of unfettered Internet access and increased
use (and dependence) of social networking. Although the
development and use of these platforms has become
commonplace and offer a host of benefits, they can be seen as
invasive and present a number of risks and concerns regarding
confidentiality.
Repressive enforcement of online order
. Issues related to free speech have and will continue to have an
impact on security; where liberal versus what might be seen as
repressive approaches regarding online activity are taken.
Issues regarding surveillance, censorship, and regulations not
only have the potential to impact attacks that are carried out in
the cyber operating environment, but could inadvertently affect
commerce and free enterprise as well.
Heterogeneity of state postures
. An environment made up of dissimilar or diverse elements can
certainly be a positive in many ways. However, when there is a
great disparity in how Personally Identifiable Information (PII)
is defined, cooperation over cyber norms could be negatively
impacted. This would generally be seen at the uppermost levels
where certain governments may decline to prosecute their cyber
criminals; where working relationships would no doubt be
impacted. However, even in corporate America, this could be
seen as well to varying degrees.
Traditional business models under pressure
. Each and every day, it seems that the landscape the overall
business community, associated operating frameworks, and
issues related to intellectual property are all impacted by not
only competitors, but those that would wish to do them harm
through nefarious means. Although financial capital, ingenuity,
and innovation will remain in high demand, “the evolution of
new business models would see individuals’ personal data
become the most valuable commodity (2016, p. 3). As such data
resides in global repositories on an ever increasing basis,
associated security concerns will also increase.
Big data enables greater control
. There is really nothing new with manipulating data in order to
produce a desired outcome (as can be in every election cycle
related to polls), but the amount of data that will continue to be
accessible moving forward will have a great impact on how an
individual’s behavior might be managed by both corporations
and government. Such analysis could be utilized to customize
everything from advertisements to campaigns, but straying away
from these types of activities must be viewed with suspicion
and appropriately guarded against.
Growth of public-private partnerships
. It should come as no surprise that as the amount of
information submitted, stored, and retrieved about individuals
increase, that it would be shared between various entities as
well. However, even though the sharing of data between those
within the public and private sectors can offer a number of
advantages, the risk of confidentiality being violated as the
spectrum of these partnerships increase as well.
Citizens demand greater control
. The demand for transparency has become commonplace in our
world today, especially as it relates to those who hold elected
office. Yet the same demands and expectations by members of
the public regarding personal data held online will require
appropriate approaches and policies.
Organizations value cyber-resilience
. As more activities are carried out within the virtual
environment, it becomes increasingly important for
organizations to be resilient in the face of attacks on it. These
can come as a result activities carried out by external
perpetrators, but insider threats but also be considered. Also,
those known as “Advanced Persistent Threats” can especially
wreak havoc and must be guarded against. This is where an
attack is carried out on an entire network by unauthorized
personnel and remains there undetected for a long period of
time.
After offering insight regarding each of these issues, the
researchers turned their attention to what challenges await
professionals in regards to both security and privacy in light of
current practices. It was noted that a number of gaps can be
found in existing guidelines; those that will prove insufficient
in addressing the level to which technology permeates daily
life. At its core, a fundamental understanding of online presence
and protection of it is needed at the individual level. Likewise,
organizations and the documents that have been developed to
offer needed guidance would appear to fall short in relation to
many of these issues noted. For instance, current
recommendations do offer protection against certain risks as
long as applicable devices are identified, inventoried, and
monitored. Yet as it relates to the Internet-of-Things, it is
expected that many of these devices will be personally owned;
incorporated as part of their clothing or implanted. Therefore,
accounting for each of them would simply not be feasible. So
much work needs to be done in the areas of research and
development, education and training, and the accompanying
policies and guidance needed to enact and govern appropriate
security measures.
The Security Professional of the Future
Based upon what has been discussed thus far, a rather dismal
picture has been painted moving forward regarding the myriad
of threats organizations will face and how to properly protect
against them; especially related to technology. Yet as noted in
the report
Securing Our Future: Cybersecurity and the Millennial
Workforce
, the following concluding remarks are offered. “Cyber risks are
likely to grow more pervasive and complex as technology
becomes more ingrained in today’s lifestyle. However, this
doesn’t mean the cause is lost — not even close. An increased
cyber talent pool and efforts by governments, businesses and
employees to practice safe-cyber activities can still lead to a
safer online world for everyone” (2017, p. 16). It is obvious
from this quote that a concerted, coordinated effort will be
needed, and the security professional is an integral part of that
broad-based initiative.
So what elements defined and support the security professional,
and what elements were most assist the drive to the security
professional? These are the two primary questions posed and
addressed within the document
Defining the Security Professional: Definition through a Body
of Knowledge.
Although conducted and published in 2010, I feel it still offers
great insight regarding not only how the overall role of security
has evolved in a way that incorporates a variety of disciplines
and competencies, but seeks to move forward with a degree of
certainty in the midst of an oftentimes ambiguous world. As we
have noted throughout this study, security is far from being
single dimensional in nature. This is evident in the fact that a
single definition for security and all that it represents remains
elusive; simply because it contains so many different facets. It
has been stated that there are four key internal drivers of
security, and those have been identified as criminology, risk,
terrorism, and management (Borodzicz & Gibson, 2006). We
have touched upon each of these throughout the preceding
weeks, so they remain valid and will continue to impact the
direction the overall profession of security takes in the future.
Therefore, what steps must be taken on the road to
professionalism? Let us now turn our attention there.
Education and Training
As it relates to any profession, there are certain characteristics
that apply to all of them, and security certainly would be
included as well. These include the workforce that is educated,
and underline infrastructure that is mature to the degree that it
is self-regulating, has leadership that is proactive in nature and
recognizes its responsibility to all within the security sector as a
whole, is proactive in nature in developing and conveying a
vision for the future, as well as ensuring that a competent
workforce is maintained. Yet what makes the security industry
somewhat unique is that it is actually a mixture of a host of
different disciplines that must work together in a defined and
coordinated manner. Yet through it all, the greatest benefits will
be derived from a workforce that is highly educated; advantages
that will be realized by security professionals and clients alike.
These include a higher-level of service being provided to
consumers of security services, the fact that all levels of
training and education represent the most cost-effective solution
in meeting customer’s needs, the management and technical
skills needed “out in the field” will be enhanced, and a
standardized approach regarding procedures and techniques will
be attained through broad-based education as well. There are
various avenues in which such learning and instruction can be
attained, and ASIS International is one such example. ASIS is a
professional organization focused upon the needs of security
professionals and offers various certifications, standards, and
guidelines for the security profession as a whole. As it relates to
education, a number of options are provided to the security
professional that allows them to build their base of knowledge,
skills, and expertise at any stage of their career; both online and
within the classroom. This serves as but one of many options
that are currently available, and stresses the importance of
professional development as a whole, as well as building of,
maintaining, and sharing a robust body of knowledge.
Ethics
Ethical considerations are also at the heart of any recognized
profession, and security cannot be any different. This should be
stressed and receive appropriate attention by any organization,
association, etc. associated with the educating, training, and
certifying of those within the security industry. For instance,
the previously mentioned ASIS offers the following on their
website:
Aware that the quality of professional security activity
ultimately depends upon the willingness of practitioners to
observe special standards of conduct and to manifest good faith
in professional relationships, ASIS adopts the following Code
of Ethics and mandates its conscientious observance as a
binding condition of membership in or affiliation with ASIS.
Details are then provided regarding how members shall perform
professional duties in accordance with the law and highest
moral principles, observe the principles of truthfulness,
honesty, and integrity, shall be diligent in carrying out their
professional responsibilities and do so in a competent manner,
shall take needed steps to protect confidential information, and
shall not maliciously harm the reputation of any colleague,
client, or employer. Yet in the ever-changing landscape of
providing security in the face of mounting threats, especially
related to technology, it has been determined that a stressful
situation can cause individuals to perform in an unscrupulous
manner. This was the focal point of an article entitled
Do ethics get in the way of security professionals?,
where the author noted that a distinct increase in data breaches
and an overabundance of successful cyber attacks may produce
less than enviable responses and actions. In a study that was
conducted at a security conference related to this issue, it was
found that 20% of respondents have witnessed a company hide
or cover up a breach, and that such security breaches are
oftentimes used as leverage to increase security budgets (Zorz,
2015). Considering the fact that information technology security
is somewhat in its infancy, it has been thrust into the spotlight
from a number of different sources, whether they are political or
business in nature, or related to the media. Unfortunately, such
pressure and attention can often lead to the cutting of corners in
order to meet expectations and demands. This only highlights
the need to be attentive to this component of the security
profession and the manner in which the various individuals
operating within it understand their individual and collective
responsibilities.
Conclusion
In this final lesson, we have but scratched the surface regarding
what awaits the security industry moving forward in regards to
threats and hazards that may be looming on the horizon, as well
as the industry itself and what is needed to make it the
respected and animal profession it truly is. The student is
encouraged to build upon what has been offered here through
various avenues. These include conducting your own research
regarding the topics that have been addressed, becoming a
member of a recognized organization within the overall security
industry, attending related conferences and other such
opportunities to not only build upon your base of knowledge
and technical expertise, but expanding your professional
network as well. The future is one that promises to be both
challenging and exciting for the security administrator; offering
a host of opportunities to take advantage of.
References
Code of Ethics. (n.d.)
ASIS International
. Retrieved from https://admin.asisonline.org/About-
ASIS/Pages/Code-of-Ethics.aspx
Borodzicz, E. P., & Gibson, S. D. (2006). Corporate security
education: Towards meeting the challenge.
Security Journal
,
19
(3), 180-195.
Griffith, M., Brooks, D.J., & Corkill, L. (2010). Defining the
security professional: Definition through a body of knowledge.
Paper presented at the
Proceedings of the 3
rd
Australian Security and Intelligence Conference
, Perth, Western Australia. Retrieved from
http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1004&context=
asi
Securing Our Future: Cybersecurity and the Millennial
Workforce. (2017).
Raytheon
. Retrieved from
https://www.raytheon.com/sites/default/files/2017-
12/2017_cyber_report_rev1.pdf
Smith, C., & Brooks, D. J. (2012).
Security science: The theory and practice of security.
Burlington: Butterworth-Heinemann
Williams, M., Axon, L. Nurse, J. & Creese, S. (2016). Future
scenarios and challenges for security and privacy.
Department of Computer Science, University of Oxford
. Retrieved from https://www.cs.ox.ac.uk/files/8337/2016-rtsi-
wanc.pdf
Zorz, M. (2015). Do ethics get in the way of security
professionals?
Help Net Security
. Retrieved from
https://www.helpnetsecurity.com/2015/05/13/do-ethics-get-in-
the-way-of-security-professionals/

More Related Content

More from tenoelrx

Discuss the nuclear reactions within the reactor of a nuclear power .docx
Discuss the nuclear reactions within the reactor of a nuclear power .docxDiscuss the nuclear reactions within the reactor of a nuclear power .docx
Discuss the nuclear reactions within the reactor of a nuclear power .docxtenoelrx
 
Discuss the social impact that musicians such as Bob Dylan and the B.docx
Discuss the social impact that musicians such as Bob Dylan and the B.docxDiscuss the social impact that musicians such as Bob Dylan and the B.docx
Discuss the social impact that musicians such as Bob Dylan and the B.docxtenoelrx
 
Discuss the responsibility and authority of OSHA as well as OSHA sta.docx
Discuss the responsibility and authority of OSHA as well as OSHA sta.docxDiscuss the responsibility and authority of OSHA as well as OSHA sta.docx
Discuss the responsibility and authority of OSHA as well as OSHA sta.docxtenoelrx
 
Discuss the role of the Indians in the wars for empire from the 1690.docx
Discuss the role of the Indians in the wars for empire from the 1690.docxDiscuss the role of the Indians in the wars for empire from the 1690.docx
Discuss the role of the Indians in the wars for empire from the 1690.docxtenoelrx
 
Discuss the spread of Christianity in the late antiquity. What chang.docx
Discuss the spread of Christianity in the late antiquity. What chang.docxDiscuss the spread of Christianity in the late antiquity. What chang.docx
Discuss the spread of Christianity in the late antiquity. What chang.docxtenoelrx
 
Discuss the required skills and competencies of a RN in the communit.docx
Discuss the required skills and competencies of a RN in the communit.docxDiscuss the required skills and competencies of a RN in the communit.docx
Discuss the required skills and competencies of a RN in the communit.docxtenoelrx
 
Discuss the many costs that businesses face today.  Is it always pra.docx
Discuss the many costs that businesses face today.  Is it always pra.docxDiscuss the many costs that businesses face today.  Is it always pra.docx
Discuss the many costs that businesses face today.  Is it always pra.docxtenoelrx
 
Discuss the reasons that an expatriates compensation varies b.docx
Discuss the reasons that an expatriates compensation varies b.docxDiscuss the reasons that an expatriates compensation varies b.docx
Discuss the reasons that an expatriates compensation varies b.docxtenoelrx
 
Discuss the purpose of an interrogation.After reviewing the YouTub.docx
Discuss the purpose of an interrogation.After reviewing the YouTub.docxDiscuss the purpose of an interrogation.After reviewing the YouTub.docx
Discuss the purpose of an interrogation.After reviewing the YouTub.docxtenoelrx
 
discuss the key process that a forensic analyst could use in order t.docx
discuss the key process that a forensic analyst could use in order t.docxdiscuss the key process that a forensic analyst could use in order t.docx
discuss the key process that a forensic analyst could use in order t.docxtenoelrx
 
Discuss the issue of securing backups. There have been several inc.docx
Discuss the issue of securing backups. There have been several inc.docxDiscuss the issue of securing backups. There have been several inc.docx
Discuss the issue of securing backups. There have been several inc.docxtenoelrx
 
Discuss the key components and players involved in effective city pl.docx
Discuss the key components and players involved in effective city pl.docxDiscuss the key components and players involved in effective city pl.docx
Discuss the key components and players involved in effective city pl.docxtenoelrx
 
discuss the Kashmir dispute between Pakistan and India in your text..docx
discuss the Kashmir dispute between Pakistan and India in your text..docxdiscuss the Kashmir dispute between Pakistan and India in your text..docx
discuss the Kashmir dispute between Pakistan and India in your text..docxtenoelrx
 
Discuss the four Cs that are determinants of high performing teams, .docx
Discuss the four Cs that are determinants of high performing teams, .docxDiscuss the four Cs that are determinants of high performing teams, .docx
Discuss the four Cs that are determinants of high performing teams, .docxtenoelrx
 
Discuss the following question. Write about 250 words.Aldo Leopo.docx
Discuss the following question. Write about 250 words.Aldo Leopo.docxDiscuss the following question. Write about 250 words.Aldo Leopo.docx
Discuss the following question. Write about 250 words.Aldo Leopo.docxtenoelrx
 
Discuss the importance of developing skills in detecting deceitEx.docx
Discuss the importance of developing skills in detecting deceitEx.docxDiscuss the importance of developing skills in detecting deceitEx.docx
Discuss the importance of developing skills in detecting deceitEx.docxtenoelrx
 
Discuss the first permanent settlements of present day Tennessee. Wh.docx
Discuss the first permanent settlements of present day Tennessee. Wh.docxDiscuss the first permanent settlements of present day Tennessee. Wh.docx
Discuss the first permanent settlements of present day Tennessee. Wh.docxtenoelrx
 
Discuss the following in 150 + words with citations.Discussion 1.docx
Discuss the following in 150 + words with citations.Discussion 1.docxDiscuss the following in 150 + words with citations.Discussion 1.docx
Discuss the following in 150 + words with citations.Discussion 1.docxtenoelrx
 
Discuss the functions of the following types of federal government.docx
Discuss the functions of the following types of federal government.docxDiscuss the functions of the following types of federal government.docx
Discuss the functions of the following types of federal government.docxtenoelrx
 
Discuss the followingWhat evidence did you see and hear by watchi.docx
Discuss the followingWhat evidence did you see and hear by watchi.docxDiscuss the followingWhat evidence did you see and hear by watchi.docx
Discuss the followingWhat evidence did you see and hear by watchi.docxtenoelrx
 

More from tenoelrx (20)

Discuss the nuclear reactions within the reactor of a nuclear power .docx
Discuss the nuclear reactions within the reactor of a nuclear power .docxDiscuss the nuclear reactions within the reactor of a nuclear power .docx
Discuss the nuclear reactions within the reactor of a nuclear power .docx
 
Discuss the social impact that musicians such as Bob Dylan and the B.docx
Discuss the social impact that musicians such as Bob Dylan and the B.docxDiscuss the social impact that musicians such as Bob Dylan and the B.docx
Discuss the social impact that musicians such as Bob Dylan and the B.docx
 
Discuss the responsibility and authority of OSHA as well as OSHA sta.docx
Discuss the responsibility and authority of OSHA as well as OSHA sta.docxDiscuss the responsibility and authority of OSHA as well as OSHA sta.docx
Discuss the responsibility and authority of OSHA as well as OSHA sta.docx
 
Discuss the role of the Indians in the wars for empire from the 1690.docx
Discuss the role of the Indians in the wars for empire from the 1690.docxDiscuss the role of the Indians in the wars for empire from the 1690.docx
Discuss the role of the Indians in the wars for empire from the 1690.docx
 
Discuss the spread of Christianity in the late antiquity. What chang.docx
Discuss the spread of Christianity in the late antiquity. What chang.docxDiscuss the spread of Christianity in the late antiquity. What chang.docx
Discuss the spread of Christianity in the late antiquity. What chang.docx
 
Discuss the required skills and competencies of a RN in the communit.docx
Discuss the required skills and competencies of a RN in the communit.docxDiscuss the required skills and competencies of a RN in the communit.docx
Discuss the required skills and competencies of a RN in the communit.docx
 
Discuss the many costs that businesses face today.  Is it always pra.docx
Discuss the many costs that businesses face today.  Is it always pra.docxDiscuss the many costs that businesses face today.  Is it always pra.docx
Discuss the many costs that businesses face today.  Is it always pra.docx
 
Discuss the reasons that an expatriates compensation varies b.docx
Discuss the reasons that an expatriates compensation varies b.docxDiscuss the reasons that an expatriates compensation varies b.docx
Discuss the reasons that an expatriates compensation varies b.docx
 
Discuss the purpose of an interrogation.After reviewing the YouTub.docx
Discuss the purpose of an interrogation.After reviewing the YouTub.docxDiscuss the purpose of an interrogation.After reviewing the YouTub.docx
Discuss the purpose of an interrogation.After reviewing the YouTub.docx
 
discuss the key process that a forensic analyst could use in order t.docx
discuss the key process that a forensic analyst could use in order t.docxdiscuss the key process that a forensic analyst could use in order t.docx
discuss the key process that a forensic analyst could use in order t.docx
 
Discuss the issue of securing backups. There have been several inc.docx
Discuss the issue of securing backups. There have been several inc.docxDiscuss the issue of securing backups. There have been several inc.docx
Discuss the issue of securing backups. There have been several inc.docx
 
Discuss the key components and players involved in effective city pl.docx
Discuss the key components and players involved in effective city pl.docxDiscuss the key components and players involved in effective city pl.docx
Discuss the key components and players involved in effective city pl.docx
 
discuss the Kashmir dispute between Pakistan and India in your text..docx
discuss the Kashmir dispute between Pakistan and India in your text..docxdiscuss the Kashmir dispute between Pakistan and India in your text..docx
discuss the Kashmir dispute between Pakistan and India in your text..docx
 
Discuss the four Cs that are determinants of high performing teams, .docx
Discuss the four Cs that are determinants of high performing teams, .docxDiscuss the four Cs that are determinants of high performing teams, .docx
Discuss the four Cs that are determinants of high performing teams, .docx
 
Discuss the following question. Write about 250 words.Aldo Leopo.docx
Discuss the following question. Write about 250 words.Aldo Leopo.docxDiscuss the following question. Write about 250 words.Aldo Leopo.docx
Discuss the following question. Write about 250 words.Aldo Leopo.docx
 
Discuss the importance of developing skills in detecting deceitEx.docx
Discuss the importance of developing skills in detecting deceitEx.docxDiscuss the importance of developing skills in detecting deceitEx.docx
Discuss the importance of developing skills in detecting deceitEx.docx
 
Discuss the first permanent settlements of present day Tennessee. Wh.docx
Discuss the first permanent settlements of present day Tennessee. Wh.docxDiscuss the first permanent settlements of present day Tennessee. Wh.docx
Discuss the first permanent settlements of present day Tennessee. Wh.docx
 
Discuss the following in 150 + words with citations.Discussion 1.docx
Discuss the following in 150 + words with citations.Discussion 1.docxDiscuss the following in 150 + words with citations.Discussion 1.docx
Discuss the following in 150 + words with citations.Discussion 1.docx
 
Discuss the functions of the following types of federal government.docx
Discuss the functions of the following types of federal government.docxDiscuss the functions of the following types of federal government.docx
Discuss the functions of the following types of federal government.docx
 
Discuss the followingWhat evidence did you see and hear by watchi.docx
Discuss the followingWhat evidence did you see and hear by watchi.docxDiscuss the followingWhat evidence did you see and hear by watchi.docx
Discuss the followingWhat evidence did you see and hear by watchi.docx
 

Question Convey the integral role that knowledge, data, informati

  • 1. Question: Convey the integral role that knowledge, data, information, and intelligence play (provide appropriate details and examples for each of these) not only in providing security as a whole, but how they are utilized in business continuity management efforts as well. Also, what future issues will have a direct impact on these topics as well and how should they be approached? 6 pages needed The Future of the Security When considering what awaits the security profession in the years to come and those that will operate within it, developments and forecasts related to security science will in large part be impacted by what has occurred in the past and in present day. What might occur, what is most plausible and feasible given current and expected occurrences, and what has proven to be effective (or not) will all need to be considered in determining those issues that will remain relevant or change. So predicting the future (not in the form of Nostradamus or similar prophets) as it relates to security is a technique that considers probable or desirable outcomes in the face of known or anticipated risks. So given this backdrop, where is security heading? Physical Security As long as there are structures that people operate within and house various assets, there will continue to be a need to offer needed protection related to them. All of the topics discussed in this course related to walls, fencing, sensors, alarm systems, guards, locks, and other such issues will be needed in some form or fashion. Whether through manual or technological means, these will remain a constant for the security
  • 2. administrator in providing appropriate defensive measures for the material, tangible assets they oversee. Concerning technology, the same trend will continue in serving as a needed aid in providing security moving forward. Mobile devices of various types, functions, capabilities, and their ability to access data, the ever-increasing use of robotics and the functions they can carry out, sensors that will be able to gain more intelligence regarding detection, and high frequency security cameras that will have the capability to verify the chemical compound of an object at a distance are just some of the many technical innovations on the horizon. Yet, just as technology has taken on a greater role in providing these efforts, so too does technology represent ever-increasing concerns to the security manager. Cyber Security As society becomes connected on an ever-increasing basis, attention must be directed towards what implications this environment has related to not only security, but related privacy concerns as well. In Future Scenarios and Challenges for Security and Privacy (2016, Williams, Axon, Nurse, & Creese), the researchers took a very methodical approach in considering some 30 predictions obtained from a variety of organizations and disciplines; consolidating them into ten defined scenarios. These scenarios took into consideration a range of not only technological possibilities that might occur over the next decade, but those that represented commercial and political ramifications as well. A brief overview will be provided regarding these various situations: Growth of the Internet-of-Things . The Internet-of-Things will permeate all aspects of daily life moving forward, making the lines between the physical and virtual worlds less defined. Unfortunately, this only lends itself to increased online risks and related threats and attacks. Proliferation of offensive tools . Although all public or private sector entities will not find themselves targeted by nation-states or other forms of
  • 3. government, the capabilities represented by a variety of simple attack tools can place individuals and organizations alike under the pervasive risk of identity theft. Privacy becomes reinterpreted . As it is with many issues, the overall concept of privacy can be viewed and defined differently. Nowhere is this more evident than in those labeled as “digital natives,” individuals who have been raised in an age of unfettered Internet access and increased use (and dependence) of social networking. Although the development and use of these platforms has become commonplace and offer a host of benefits, they can be seen as invasive and present a number of risks and concerns regarding confidentiality. Repressive enforcement of online order . Issues related to free speech have and will continue to have an impact on security; where liberal versus what might be seen as repressive approaches regarding online activity are taken. Issues regarding surveillance, censorship, and regulations not only have the potential to impact attacks that are carried out in the cyber operating environment, but could inadvertently affect commerce and free enterprise as well. Heterogeneity of state postures . An environment made up of dissimilar or diverse elements can certainly be a positive in many ways. However, when there is a great disparity in how Personally Identifiable Information (PII) is defined, cooperation over cyber norms could be negatively impacted. This would generally be seen at the uppermost levels where certain governments may decline to prosecute their cyber criminals; where working relationships would no doubt be impacted. However, even in corporate America, this could be seen as well to varying degrees. Traditional business models under pressure . Each and every day, it seems that the landscape the overall business community, associated operating frameworks, and issues related to intellectual property are all impacted by not only competitors, but those that would wish to do them harm
  • 4. through nefarious means. Although financial capital, ingenuity, and innovation will remain in high demand, “the evolution of new business models would see individuals’ personal data become the most valuable commodity (2016, p. 3). As such data resides in global repositories on an ever increasing basis, associated security concerns will also increase. Big data enables greater control . There is really nothing new with manipulating data in order to produce a desired outcome (as can be in every election cycle related to polls), but the amount of data that will continue to be accessible moving forward will have a great impact on how an individual’s behavior might be managed by both corporations and government. Such analysis could be utilized to customize everything from advertisements to campaigns, but straying away from these types of activities must be viewed with suspicion and appropriately guarded against. Growth of public-private partnerships . It should come as no surprise that as the amount of information submitted, stored, and retrieved about individuals increase, that it would be shared between various entities as well. However, even though the sharing of data between those within the public and private sectors can offer a number of advantages, the risk of confidentiality being violated as the spectrum of these partnerships increase as well. Citizens demand greater control . The demand for transparency has become commonplace in our world today, especially as it relates to those who hold elected office. Yet the same demands and expectations by members of the public regarding personal data held online will require appropriate approaches and policies. Organizations value cyber-resilience . As more activities are carried out within the virtual environment, it becomes increasingly important for organizations to be resilient in the face of attacks on it. These can come as a result activities carried out by external perpetrators, but insider threats but also be considered. Also,
  • 5. those known as “Advanced Persistent Threats” can especially wreak havoc and must be guarded against. This is where an attack is carried out on an entire network by unauthorized personnel and remains there undetected for a long period of time. After offering insight regarding each of these issues, the researchers turned their attention to what challenges await professionals in regards to both security and privacy in light of current practices. It was noted that a number of gaps can be found in existing guidelines; those that will prove insufficient in addressing the level to which technology permeates daily life. At its core, a fundamental understanding of online presence and protection of it is needed at the individual level. Likewise, organizations and the documents that have been developed to offer needed guidance would appear to fall short in relation to many of these issues noted. For instance, current recommendations do offer protection against certain risks as long as applicable devices are identified, inventoried, and monitored. Yet as it relates to the Internet-of-Things, it is expected that many of these devices will be personally owned; incorporated as part of their clothing or implanted. Therefore, accounting for each of them would simply not be feasible. So much work needs to be done in the areas of research and development, education and training, and the accompanying policies and guidance needed to enact and govern appropriate security measures. The Security Professional of the Future Based upon what has been discussed thus far, a rather dismal picture has been painted moving forward regarding the myriad of threats organizations will face and how to properly protect against them; especially related to technology. Yet as noted in the report Securing Our Future: Cybersecurity and the Millennial Workforce , the following concluding remarks are offered. “Cyber risks are likely to grow more pervasive and complex as technology
  • 6. becomes more ingrained in today’s lifestyle. However, this doesn’t mean the cause is lost — not even close. An increased cyber talent pool and efforts by governments, businesses and employees to practice safe-cyber activities can still lead to a safer online world for everyone” (2017, p. 16). It is obvious from this quote that a concerted, coordinated effort will be needed, and the security professional is an integral part of that broad-based initiative. So what elements defined and support the security professional, and what elements were most assist the drive to the security professional? These are the two primary questions posed and addressed within the document Defining the Security Professional: Definition through a Body of Knowledge. Although conducted and published in 2010, I feel it still offers great insight regarding not only how the overall role of security has evolved in a way that incorporates a variety of disciplines and competencies, but seeks to move forward with a degree of certainty in the midst of an oftentimes ambiguous world. As we have noted throughout this study, security is far from being single dimensional in nature. This is evident in the fact that a single definition for security and all that it represents remains elusive; simply because it contains so many different facets. It has been stated that there are four key internal drivers of security, and those have been identified as criminology, risk, terrorism, and management (Borodzicz & Gibson, 2006). We have touched upon each of these throughout the preceding weeks, so they remain valid and will continue to impact the direction the overall profession of security takes in the future. Therefore, what steps must be taken on the road to professionalism? Let us now turn our attention there. Education and Training As it relates to any profession, there are certain characteristics that apply to all of them, and security certainly would be included as well. These include the workforce that is educated, and underline infrastructure that is mature to the degree that it
  • 7. is self-regulating, has leadership that is proactive in nature and recognizes its responsibility to all within the security sector as a whole, is proactive in nature in developing and conveying a vision for the future, as well as ensuring that a competent workforce is maintained. Yet what makes the security industry somewhat unique is that it is actually a mixture of a host of different disciplines that must work together in a defined and coordinated manner. Yet through it all, the greatest benefits will be derived from a workforce that is highly educated; advantages that will be realized by security professionals and clients alike. These include a higher-level of service being provided to consumers of security services, the fact that all levels of training and education represent the most cost-effective solution in meeting customer’s needs, the management and technical skills needed “out in the field” will be enhanced, and a standardized approach regarding procedures and techniques will be attained through broad-based education as well. There are various avenues in which such learning and instruction can be attained, and ASIS International is one such example. ASIS is a professional organization focused upon the needs of security professionals and offers various certifications, standards, and guidelines for the security profession as a whole. As it relates to education, a number of options are provided to the security professional that allows them to build their base of knowledge, skills, and expertise at any stage of their career; both online and within the classroom. This serves as but one of many options that are currently available, and stresses the importance of professional development as a whole, as well as building of, maintaining, and sharing a robust body of knowledge. Ethics Ethical considerations are also at the heart of any recognized profession, and security cannot be any different. This should be stressed and receive appropriate attention by any organization, association, etc. associated with the educating, training, and certifying of those within the security industry. For instance, the previously mentioned ASIS offers the following on their
  • 8. website: Aware that the quality of professional security activity ultimately depends upon the willingness of practitioners to observe special standards of conduct and to manifest good faith in professional relationships, ASIS adopts the following Code of Ethics and mandates its conscientious observance as a binding condition of membership in or affiliation with ASIS. Details are then provided regarding how members shall perform professional duties in accordance with the law and highest moral principles, observe the principles of truthfulness, honesty, and integrity, shall be diligent in carrying out their professional responsibilities and do so in a competent manner, shall take needed steps to protect confidential information, and shall not maliciously harm the reputation of any colleague, client, or employer. Yet in the ever-changing landscape of providing security in the face of mounting threats, especially related to technology, it has been determined that a stressful situation can cause individuals to perform in an unscrupulous manner. This was the focal point of an article entitled Do ethics get in the way of security professionals?, where the author noted that a distinct increase in data breaches and an overabundance of successful cyber attacks may produce less than enviable responses and actions. In a study that was conducted at a security conference related to this issue, it was found that 20% of respondents have witnessed a company hide or cover up a breach, and that such security breaches are oftentimes used as leverage to increase security budgets (Zorz, 2015). Considering the fact that information technology security is somewhat in its infancy, it has been thrust into the spotlight from a number of different sources, whether they are political or business in nature, or related to the media. Unfortunately, such pressure and attention can often lead to the cutting of corners in order to meet expectations and demands. This only highlights the need to be attentive to this component of the security profession and the manner in which the various individuals operating within it understand their individual and collective
  • 9. responsibilities. Conclusion In this final lesson, we have but scratched the surface regarding what awaits the security industry moving forward in regards to threats and hazards that may be looming on the horizon, as well as the industry itself and what is needed to make it the respected and animal profession it truly is. The student is encouraged to build upon what has been offered here through various avenues. These include conducting your own research regarding the topics that have been addressed, becoming a member of a recognized organization within the overall security industry, attending related conferences and other such opportunities to not only build upon your base of knowledge and technical expertise, but expanding your professional network as well. The future is one that promises to be both challenging and exciting for the security administrator; offering a host of opportunities to take advantage of. References Code of Ethics. (n.d.) ASIS International . Retrieved from https://admin.asisonline.org/About- ASIS/Pages/Code-of-Ethics.aspx Borodzicz, E. P., & Gibson, S. D. (2006). Corporate security education: Towards meeting the challenge. Security Journal , 19 (3), 180-195. Griffith, M., Brooks, D.J., & Corkill, L. (2010). Defining the security professional: Definition through a body of knowledge. Paper presented at the Proceedings of the 3 rd Australian Security and Intelligence Conference , Perth, Western Australia. Retrieved from http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1004&context=
  • 10. asi Securing Our Future: Cybersecurity and the Millennial Workforce. (2017). Raytheon . Retrieved from https://www.raytheon.com/sites/default/files/2017- 12/2017_cyber_report_rev1.pdf Smith, C., & Brooks, D. J. (2012). Security science: The theory and practice of security. Burlington: Butterworth-Heinemann Williams, M., Axon, L. Nurse, J. & Creese, S. (2016). Future scenarios and challenges for security and privacy. Department of Computer Science, University of Oxford . Retrieved from https://www.cs.ox.ac.uk/files/8337/2016-rtsi- wanc.pdf Zorz, M. (2015). Do ethics get in the way of security professionals? Help Net Security . Retrieved from https://www.helpnetsecurity.com/2015/05/13/do-ethics-get-in- the-way-of-security-professionals/