Your Perfect Assignment is Just a Click Away
We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

Question:Convey the integral role that knowledge, data, information, and intelligence play

Question:Convey the integral role that knowledge, data, information, and intelligence play

Question:Convey the integral role that knowledge, data, information, and intelligence play (provide appropriate details and examples for each of these) not only in providing security as a whole, but how they are utilized in business continuity management efforts as well. Also, what future issues will have a direct impact on these topics as well and how should they be approached? 6 pages neededThe Future of the SecurityWhen considering what awaits the security profession in the years to come and those that will operate within it, developments and forecasts related to security science will in large part be impacted by what has occurred in the past and in present day. Whatmightoccur, what is mostplausibleandfeasiblegiven current and expected occurrences, and what has proven to be effective (or not) will all need to be considered in determining those issues that will remain relevant or change. So predicting the future (not in the form of Nostradamus or similar prophets) as it relates to security is a technique that considers probable or desirable outcomes in the face of known or anticipated risks. So given this backdrop, where is security heading?Physical SecurityAs long as there are structures that people operate within and house various assets, there will continue to be a need to offer needed protection related to them. All of the topics discussed in this course related to walls, fencing, sensors, alarm systems, guards, locks, and other such issues will be needed in some form or fashion. Whether through manual or technological means, these will remain a constant for the security administrator in providing appropriate defensive measures for the material, tangible assets they oversee. Concerning technology, the same trend will continue in serving as a needed aid in providing security moving forward. Mobile devices of various types, functions, capabilities, and their ability to access data, the ever-increasing use of robotics and the functions they can carry out, sensors that will be able to gain more intelligence regarding detection, and high frequency security cameras that will have the capability to verify the chemical compound of an object at a distance are just some of the many technical innovations on the horizon. Yet, just as technology has taken on a greater role in providing these efforts, so too does technology represent ever-increasing concerns to the security manager.Cyber SecurityAs society becomes connected on an ever-increasing basis, attention must be directed towards what implications this environment has related to not only security, but related privacy concerns as well. InFuture Scenarios and Challenges for Security and Privacy(2016, Williams, Axon, Nurse, & Creese), the researchers took a very methodical approach in considering some 30 predictions obtained from a variety of organizations and disciplines; consolidating them into ten defined scenarios. These scenarios took into consideration a range of not only technological possibilities that might occur over the next decade, but those that represented commercial and political ramifications as well. A brief overview will be provided regarding these various situations:Growth of the Internet-of-Things. The Internet-of-Things will permeate all aspects of daily life moving forward, making the lines between the physical and virtual worlds less defined. Unfortunately, this only lends itself to increased online risks and related threats and attacks.Proliferation of offensive tools. Although all public or private sector entities will not find themselves targeted by nation-states or other forms of government, the capabilities represented by a variety of simple attack tools can place individuals and organizations alike under the pervasive risk of identity theft.Privacy becomes reinterpreted. As it is with many issues, the overall concept of privacy can be viewed and defined differently. Nowhere is this more evident than in those labeled as “digital natives,” individuals who have been raised in an age of unfettered Internet access and increased use (and dependence) of social networking. Although the development and use of these platforms has become commonplace and offer a host of benefits, they can be seen as invasive and present a number of risks and concerns regarding confidentiality.Repressive enforcement of online order. Issues related to free speech have and will continue to have an impact on security; where liberal versus what might be seen as repressive approaches regarding online activity are taken. Issues regarding surveillance, censorship, and regulations not only have the potential to impact attacks that are carried out in the cyber operating environment, but could inadvertently affect commerce and free enterprise as well.Heterogeneity of state postures. An environment made up of dissimilar or diverse elements can certainly be a positive in many ways. However, when there is a great disparity in how Personally Identifiable Information (PII) is defined, cooperation over cyber norms could be negatively impacted. This would generally be seen at the uppermost levels where certain governments may decline to prosecute their cyber criminals; where working relationships would no doubt be impacted. However, even in corporate America, this could be seen as well to varying degrees.Traditional business models under pressure. Each and every day, it seems that the landscape the overall business community, associated operating frameworks, and issues related to intellectual property are all impacted by not only competitors, but those that would wish to do them harm through nefarious means. Although financial capital, ingenuity, and innovation will remain in high demand, “the evolution of new business models would see individuals’ personal data become the most valuable commodity (2016, p. 3). As such data resides in global repositories on an ever increasing basis, associated security concerns will also increase.Big data enables greater control. There is really nothing new with manipulating data in order to produce a desired outcome (as can be in every election cycle related to polls), but the amount of data that will continue to be accessible moving forward will have a great impact on how an individual’s behavior might be managed by both corporations and government. Such analysis could be utilized to customize everything from advertisements to campaigns, but straying away from these types of activities must be viewed with suspicion and appropriately guarded against.Growth of public-private partnerships. It should come as no surprise that as the amount of information submitted, stored, and retrieved about individuals increase, that it would be shared between various entities as well. However, even though the sharing of data between those within the public and private sectors can offer a number of advantages, the risk of confidentiality being violated as the spectrum of these partnerships increase as well.Citizens demand greater control. The demand for transparency has become commonplace in our world today, especially as it relates to those who hold elected office. Yet the same demands and expectations by members of the public regarding personal data held online will require appropriate approaches and policies.Organizations value cyber-resilience. As more activities are carried out within the virtual environment, it becomes increasingly important for organizations to be resilient in the face of attacks on it. These can come as a result activities carried out by external perpetrators, but insider threats but also be considered. Also, those known as “Advanced Persistent Threats” can especially wreak havoc and must be guarded against. This is where an attack is carried out on an entire network by unauthorized personnel and remains there undetected for a long period of time.After offering insight regarding each of these issues, the researchers turned their attention to what challenges await professionals in regards to both security and privacy in light of current practices. It was noted that a number of gaps can be found in existing guidelines; those that will prove insufficient in addressing the level to which technology permeates daily life. At its core, a fundamental understanding of online presence and protection of it is needed at the individual level. Likewise, organizations and the documents that have been developed to offer needed guidance would appear to fall short in relation to many of these issues noted. For instance, current recommendations do offer protection against certain risks as long as applicable devices are identified, inventoried, and monitored. Yet as it relates to the Internet-of-Things, it is expected that many of these devices will be personally owned; incorporated as part of their clothing or implanted. Therefore, accounting for each of them would simply not be feasible. So much work needs to be done in the areas of research and development, education and training, and the accompanying policies and guidance needed to enact and govern appropriate security measures.The Security Professional of the FutureBased upon what has been discussed thus far, a rather dismal picture has been painted moving forward regarding the myriad of threats organizations will face and how to properly protect against them; especially related to technology. Yet as noted in the reportSecuring Our Future: Cybersecurity and the Millennial Workforce, the following concluding remarks are offered. “Cyber risks are likely to grow more pervasive and complex as technology becomes more ingrained in today’s lifestyle. However, this doesn’t mean the cause is lost — not even close. An increased cyber talent pool and efforts by governments, businesses and employees to practice safe-cyber activities can still lead to a safer online world for everyone” (2017, p. 16). It is obvious from this quote that a concerted, coordinated effort will be needed, and the security professional is an integral part of that broad-based initiative.So what elements defined and support the security professional, and what elements were most assist the drive to the security professional? These are the two primary questions posed and addressed within the documentDefining the Security Professional: Definition through a Body of Knowledge.Although conducted and published in 2010, I feel it still offers great insight regarding not only how the overall role of security has evolved in a way that incorporates a variety of disciplines and competencies, but seeks to move forward with a degree of certainty in the midst of an oftentimes ambiguous world. As we have noted throughout this study, security is far from being single dimensional in nature. This is evident in the fact that a single definition for security and all that it represents remains elusive; simply because it contains so many different facets. It has been stated that there are four key internal drivers of security, and those have been identified as criminology, risk, terrorism, and management (Borodzicz & Gibson, 2006). We have touched upon each of these throughout the preceding weeks, so they remain valid and will continue to impact the direction the overall profession of security takes in the future. Therefore, what steps must be taken on the road to professionalism? Let us now turn our attention there.Education and TrainingAs it relates to any profession, there are certain characteristics that apply to all of them, and security certainly would be included as well. These include the workforce that is educated, and underline infrastructure that is mature to the degree that it is self-regulating, has leadership that is proactive in nature and recognizes its responsibility to all within the security sector as a whole, is proactive in nature in developing and conveying a vision for the future, as well as ensuring that a competent workforce is maintained. Yet what makes the security industry somewhat unique is that it is actually a mixture of a host of different disciplines that must work together in a defined and coordinated manner. Yet through it all, the greatest benefits will be derived from a workforce that is highly educated; advantages that will be realized by security professionals and clients alike. These include a higher-level of service being provided to consumers of security services, the fact that all levels of training and education represent the most cost-effective solution in meeting customer’s needs, the management and technical skills needed “out in the field” will be enhanced, and a standardized approach regarding procedures and techniques will be attained through broad-based education as well. There are various avenues in which such learning and instruction can be attained, and ASIS International is one such example. ASIS is a professional organization focused upon the needs of security professionals and offers various certifications, standards, and guidelines for the security profession as a whole. As it relates to education, a number of options are provided to the security professional that allows them to build their base of knowledge, skills, and expertise at any stage of their career; both online and within the classroom. This serves as but one of many options that are currently available, and stresses the importance of professional development as a whole, as well as building of, maintaining, and sharing a robust body of knowledge.EthicsEthical considerations are also at the heart of any recognized profession, and security cannot be any different. This should be stressed and receive appropriate attention by any organization, association, etc. associated with the educating, training, and certifying of those within the security industry. For instance, the previously mentioned ASIS offers the following on their website: Aware that the quality of professional security activity ultimately depends upon the willingness of practitioners to observe special standards of conduct and to manifest good faith in professional relationships, ASIS adopts the following Code of Ethics and mandates its conscientious observance as a binding condition of membership in or affiliation with ASIS.Details are then provided regarding how members shall perform professional duties in accordance with the law and highest moral principles, observe the principles of truthfulness, honesty, and integrity, shall be diligent in carrying out their professional responsibilities and do so in a competent manner, shall take needed steps to protect confidential information, and shall not maliciously harm the reputation of any colleague, client, or employer. Yet in the ever-changing landscape of providing security in the face of mounting threats, especially related to technology, it has been determined that a stressful situation can cause individuals to perform in an unscrupulous manner. This was the focal point of an article entitledDo ethics get in the way of security professionals?,where the author noted that a distinct increase in data breaches and an overabundance of successful cyber attacks may produce less than enviable responses and actions. In a study that was conducted at a security conference related to this issue, it was found that 20% of respondents have witnessed a company hide or cover up a breach, and that such security breaches are oftentimes used as leverage to increase security budgets (Zorz, 2015). Considering the fact that information technology security is somewhat in its infancy, it has been thrust into the spotlight from a number of different sources, whether they are political or business in nature, or related to the media. Unfortunately, such pressure and attention can often lead to the cutting of corners in order to meet expectations and demands. This only highlights the need to be attentive to this component of the security profession and the manner in which the various individuals operating within it understand their individual and collective responsibilities.ConclusionIn this final lesson, we have but scratched the surface regarding what awaits the security industry moving forward in regards to threats and hazards that may be looming on the horizon, as well as the industry itself and what is needed to make it the respected and animal profession it truly is. The student is encouraged to build upon what has been offered here through various avenues. These include conducting your own research regarding the topics that have been addressed, becoming a member of a recognized organization within the overall security industry, attending related conferences and other such opportunities to not only build upon your base of knowledge and technical expertise, but expanding your professional network as well. The future is one that promises to be both challenging and exciting for the security administrator; offering a host of opportunities to take advantage of.ReferencesCode of Ethics. (n.d.)ASIS International. Retrieved from https://admin.asisonline.org/About-ASIS/Pages/Code-of-Ethics.aspxBorodzicz, E. P., & Gibson, S. D. (2006). Corporate security education: Towards meeting the challenge.Security Journal,19(3), 180-195.Griffith, M., Brooks, D.J., & Corkill, L. (2010). Defining the security professional: Definition through a body of knowledge. Paper presented at theProceedings of the 3rdAustralian Security and Intelligence Conference, Perth, Western Australia. Retrieved from http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1004&context=asiSecuring Our Future: Cybersecurity and the Millennial Workforce. (2017).Raytheon. Retrieved from https://www.raytheon.com/sites/default/files/2017-12/2017_cyber_report_rev1.pdfSmith, C., & Brooks, D. J. (2012).Security science: The theory and practice of security.Burlington: Butterworth-HeinemannWilliams, M., Axon, L. Nurse, J. & Creese, S. (2016). Future scenarios and challenges for security and privacy.Department of Computer Science, University of Oxford. Retrieved from https://www.cs.ox.ac.uk/files/8337/2016-rtsi-wanc.pdfZorz, M. (2015). Do ethics get in the way of security professionals?Help Net Security. Retrieved from https://www.helpnetsecurity.com/2015/05/13/do-ethics-get-in-the-way-of-security-professionals/

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Homework Free only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Homework Free are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Homework Free is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Homework Free, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

Homework Free Org

Your one stop solution for all your online studies solutions. Hire some of the world's highly rated writers to handle your writing assignments. And guess what, you don't have to break the bank.

© 2020 Homework Free Org