- Published: November 17, 2021
- Updated: November 17, 2021
- University / College: Clemson University
- Level: Masters
- Language: English
- Downloads: 44
Q1 Explain how advancing technologies in the security field are changing how end users are identified. In your response, identify potential security gaps that may be caused by these new identification procedures.
Committee on Advances in Technology and the Prevention of Their Application to Next Generation Biowarfare Threats, 2005). Through these methods, end users are identified by; imaging, eye retina recognition and in most cases voice recognition as well as fingerprints. This has not eliminated all security gaps though, as criminals have also been exposed to the ever-growing technology. These gaps may include the replication of the fingerprints as well as manually recording the voices of legitimate users through devices like mobile phones.
Q2. Identify potential ethical challenges that may be faced by security professionals as technology advances, applications become more mobile, and computer criminals become more innovative.
It is obvious that as technology advances so does the challenge of managing it. This may result in the braking of professional ethics as one tries to manage emerging challenges. These challenges may include; Control, meaning to what degree do employees behavior is to be monitored, Ownership, what part of an information belongs to the firm and what is for the employees or what is expected by employer from their employees with regards to nondisclosure while working with other companies, Privacy, these may involve the efforts and expenses incurred by managers while questioning data access and privacy as well to what extent does the availability of information justifies its utilization, Accuracy, this heavily engages in the explicit part of a persons responsibility and the implications of possible errors that are anticipated and lastly, Security itself, that relies on the reviewing of security breach vulnerability and liability of exposure by the firm and its employees (Hongladarom & Ess, 2007).