Nobody downloaded yet

Effectiveness of Security Technology in Reducing Security Threats - Research Paper Example

Comments (0) Cite this document
Summary
The paper "Effectiveness of Security Technology in Reducing Security Threats" was undertaken with a view to addressing the fundamental issue of security threats. Security issues have become very fundamental to deal with in the modern day organization particularly propelled…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Effectiveness of Security Technology in Reducing Security Threats
Read TextPreview

Extract of sample "Effectiveness of Security Technology in Reducing Security Threats"

Download file to see previous pages Chapter five presents the conclusion and recommendations of the study based on the findings.
Security threats vary in both characteristics and magnitudes. One of the types of security threats faced by individuals is unlawful acts perpetrated by other individuals. Technology has lately developed to address this security threat. The most recent technology introduced to address this security threat is the surveillance technology (Monahan, 2010). This technology has played a very great part in enhancing security through prediction of unlawful and catastrophic events. The emergence of the information age after the introduction of computers resulted in other types of security threats. According to Stoneburner, Hayden, & Feringa (2004), one of the security threats that were associated with the emergence of the information age is a loss of essential information by an individual or a company. Several technologies in form of software systems have been generated to solve this security threat.
The purpose of this literature review is to aid the researcher gain a clear understanding and insight of the problem based on various studies done in the same field or related field. Various scholars have various schools of thoughts and perspectives regarding security threats, the technologies used to address the threats, their effectiveness or failure and whether these technologies respond to the dynamic times and circumstances brought about by the constantly changing field of the information and communication technology. This chapter reviews the available literature on this topic and looks at these different perspectives that these scholars have put forward (Hall, 2008).
Threats to personal security and that of property, information and other equipment have been in existence for a very long time. People have often engaged in criminal activities involving an unlawful threat to individuals’ lives. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Effectiveness of Security Technology in Reducing Security Threats Research Paper”, n.d.)
Effectiveness of Security Technology in Reducing Security Threats Research Paper. Retrieved from https://studentshare.org/information-technology/1788192-effectiveness-of-security-technology-in-reducing-security-threats
(Effectiveness of Security Technology in Reducing Security Threats Research Paper)
Effectiveness of Security Technology in Reducing Security Threats Research Paper. https://studentshare.org/information-technology/1788192-effectiveness-of-security-technology-in-reducing-security-threats.
“Effectiveness of Security Technology in Reducing Security Threats Research Paper”, n.d. https://studentshare.org/information-technology/1788192-effectiveness-of-security-technology-in-reducing-security-threats.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Effectiveness of Security Technology in Reducing Security Threats

Security Technology

...at Best Buy. The technology involved has been developing rapidly since its early use in 1940, and currently cameras are able to be operated remotely, providing clear images that are recorded and able to be accessed at a later date. Second generation systems are being used in some places in which the computers are able to determine what segments of video are relevant and which are not. This can dramatically reduce the workload for individuals. There is still room for many advances in the field, but even as it stands the technology is invaluable in security and the prevention of theft. References Beck, A., & Willis, A. (1999). Context-specific measures of CCTV...
8 Pages(2000 words)Essay

Threats to Global Security

...can no longer prosecute war effectively in the old manner because of draft resistance and social unrest. Thus, the domestic aspects of the anti-war movements condition and limit the response of the State technically, yet do not limit it totally in application, but rather force it into more covert actions, higher secrecy, greater division in society related to police control and mass-surveillance, and aspects of domestic security that run far more extreme than many of the worst elements of modernist States, such as the secret police in the Soviet State and Eastern Block. With the war on terrorism enacted at a cost of trillions of U.S. dollars to the taxpayer, the corporate interests rarely paying taxes,...
14 Pages(3500 words)Essay

Network security fundamentals, security threats, and issues

...?NETWORK SECURITY FUNDAMENTALS, SECURITY THREATS, AND ISSUES Network Security Fundamentals, Security Threats, and Issues Affiliation Date 3.1. Network Firewalls Security consists of tools, technologies, measures and laws used to ensure the safety of resources. At the present, security has become one of the biggest issues outlined by information technology firms and business organizations which connect their domestic Local Area Networks (LANs) and Wide Area Networks (WANs) to the Internet. In view of the fact that the Internet is a huge network of networks, as well as for...
4 Pages(1000 words)Case Study

Common Information Security Threats

...organization is crucial in terms of minimizing attacks on the information security systems. In essence, it enables the company to prepare adequately, and prevents the anticipated risks. Further, Identifying threats and vulnerability assist in planning for appropriate security tests. This allows the firm to put in place effective measures to minimize security threats on a long- term basis (Jenkins, 1998). Risk management techniques The appropriate risk management techniques for organizations, involve implementing programs, efficient in terms of protecting information systems. This requires a focus on a risk management policy geared toward...
3 Pages(750 words)Essay

Security: Threats and Security Analysis

.... They envision the formation of collaborative ties between states and consider the presence of nuclear weapons and the continuing risk of nuclear was a barrier to the attainment of this objective (Louka, 2011). Although numerous strategists would concur that nuclear supplies are quite massive and that the production of weapons of mass destruction (WMD) creates a major risk to global security, strategists and nuclear disarmers diverge in several key aspects. The strategists believe that the Cold War and the East-West tension control every security issue. Threats are analysed in relation to their effect on the relationship between East and West (Wittner, 2003). Nuclear...
10 Pages(2500 words)Essay

Security Threats in Louisiana

... The Mall of Louisiana is one of the biggest commercial structures located in Bluebonnet Boulevard. With more than 175 retailers, the number of visitors and shoppers per day could be thousands. As identified in PSOS (2011), “on the day-to-day level, the most common threats come from clients, employees and suppliers. Potential terrorist or criminal acts pose a threat whose impact on human and material loss could be enormous” (par. 2). In this regard, the security system for the shopping mall should encompass the following areas: a preventative intelligence infrastructure; advanced technological means; security procedures; professionally trained personnel;...
1 Pages(250 words)Term Paper

IT security threats

...IT security threats Affiliation: Discuss global IT security threats and potentialsolutions One of the threats to IT according to CERT (Computer Emergency Response Team) program is the insider threat (from employees, contractors or even business partners) since they are in a better position to access the information system of the organization without detection (http://www.cert.org/). The solutions to this are to enforce strict passwords and having account management practices as well as policies, responding quickly to suspicious and or disruptive behavior and especially on the information technology systems, enforcing stringent security access and controls and has less privileged access to users of the sensitive information systems... ...
1 Pages(250 words)Research Paper

Security Threats and Defenses

...Security threats and defenses Role of information system security The term social security in the context of organization is defined as the act in which, employees of an organization are manipulated by outsiders to rely key and confidential information details regarding an organization (Hadnagy, 2011). This information is sort by ill intentioned people for purposes of hacking computer systems or committing fraud. Social engineering is the newest form of crime in organizations and involves manipulation of the mind in hidden ways (Hadnagy, 2011). The successful operation of any organization is highly dependent on the performance of its work force. It is therefore the...
2 Pages(500 words)Essay

Security Threats and Defenses

...Security Threats and Defenses Need for security measures. Social engineering has caught on among many professionals. The techniques in use are based on cognitive biases, which are attributes of man decision making. Social engineers are aiming at exploiting these biases by creating attack techniques. Consequently, every company is at a risk of being attack by one of the many techniques in use. Preparing employees to recognize and respond to social engineering techniques will at help to protect the company in many ways, which include: 1. Use strong passwords. By using strong passwords in the computer network, they will protect the company from against unauthorized access to company’s confidential information and identity theft. 2... ...
1 Pages(250 words)Essay

Threats to the Global Security

...Threats to the Global Security of the of the Introduction One of the leading sponsor of terrorism in the whole world is Iran through its financial and operational support for some groups like the Hamas, Hezbollah and many others. Through its military groups, Iran could potentially share its vast nuclear technology and expertise with extremist groups that are very much hostile to the U.S and even to the West as a whole1. A nuclear-armed Iran would promote the aggressiveness of the Iranian policy and as a result, a great confrontations erupted with the international community. Nuclear weapons that were highly accessible to the Iranian regime had a very severe repercussions for the...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Effectiveness of Security Technology in Reducing Security Threats for FREE!

Contact Us