StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Trust: A Necessary Compromise Between Vulnerability and Security - Essay Example

Cite this document
Summary
Trust is the state of mind wherein one accepts one's own vulnerability with the hope of positive intentions and behavior from others. One trusts when one believes in, and acts according to, the words and actions of others. When a person tells a friend about how he feels incompetent with his job, for example, he effectively put himself at the mercy of this friend, who may be able to tell his superior about his feelings.
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Trust: A Necessary Compromise Between Vulnerability and Security
Read Text Preview

Extract of sample "Trust: A Necessary Compromise Between Vulnerability and Security"

Thesis ment Trust is a necessary exercise in learning to balance personal vulnerability with personal security. Outline I. Operational definitiona. trust is the acceptance of one's vulnerabilityb. trust is the acceptance of another's powerII. What is trust likea. trust is like an open doorb. trust is like money III. What is not trusta. trust is the absence of worryb. trust is not ignorant blissc. to trust is to fear notd. trust involves self-relianceTrust: A Necessary Compromise BetweenVulnerability and SecurityTrust is the state of mind wherein one accepts one's own vulnerability with the hope of positive intentions and behavior from others.

One trusts when one believes in, and acts according to, the words and actions of others. When a person tells a friend about how he feels incompetent with his job, for example, he effectively put himself at the mercy of this friend, who may be able to tell his superior about his feelings. Trusting is the willing acceptance of one's power to affect another. When we trust others, we put our vulnerability in their safekeeping, with the hope and belief that our vulnerability will not be taken advantage of.

When we put our trust in others, we are in effect telling them to take care of something that we want to preserve, and something that they may have the ability to damage or even steal. What is trust likeTrust is like an open door-it is inviting and welcoming. However, depending on whom one opens his door to, trust can result in deeper and more fulfilling relationships, or in pain. However, as Frank Crane says, "You may be deceived if you trust too much, but you will live in torment if you do not trust enough.

"Trust is like money: it is saved, given, sometimes stolen. Trustingly lending an item to a friend who never returns it, for instance, means that the friend has betrayed-"stolen"-your trust, and it will be unlikely to return. This can result in future unwillingness to trust others when similar situations arise. Thus trust is also a form of "payment" for the perceived credibility of others. What is not trustTo trust is to accept, and not to worry. Especially in the context of a religious person putting his trust in God.

In considering the Biblical passage "Preserve me, O God: for in thee do I put my trust." (Psalms 16:1), trust does not mean that one is careless, indifferent, and neglectful, or that one just "goes with the flow"-with regards to one's relationship with God, it is something positive, a definite act of reaching out and acknowledging one's need for support. An analogy if this could be seen in an anchored ship: an anchored ship cannot be swept by waves or driven about by the winds. The same could be said for a person who is "anchored" to God.

Trust is not about blissful ignorance, and it's not about turning a blind eye to the realities on one's situation. It is about seeing things for what they are, about looking beyond the dangers and difficulties and assessing how others (or, from a Christian perspective, God) can help in one's predicament. The element of fear should not be present when one really trusts. Trust is about assurance; it implies an unquestioning belief in and reliance upon something. Fear torments and troubles the mind; thus it does not have a place in the concept of trust.

But this does not necessarily mean that nothing could ever frighten a person when he or she trusts; but a person who trusts will have the awareness that (again, from the Christian perspective) that God is with him or her always, and that he or she can rely on God's presence.Above all, trusting is not about total reliance on others. Trust is primarily an agreement with the self to the effect that one will have confidence in one's own abilities. As Johann Wolfgang von Goethe (1749 - 1832) said, "As soon as you trust yourself, you will know how to live.

"BibliographyBailey, Tom, "On Trust and Philosophy", University of Warwick, .McLeod, Carolyn, "Trust", The Stanford Encyclopedia of Philosophy (Winter 2006 Edition), Edward N. Zalta (ed.). < http://plato.stanford.edu/archives/win2006/entries/trust/>.Roy J. Lewicki, Roy J., & Tomlinson, Edward C, "Trust and Trust Building", December 2003. The Beyond Intractability Project, .

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Trust: A Necessary Compromise Between Vulnerability and Security Essay”, n.d.)
Trust: A Necessary Compromise Between Vulnerability and Security Essay. Retrieved from https://studentshare.org/miscellaneous/1515361-trust-a-necessary-compromise-between-vulnerability-and-security
(Trust: A Necessary Compromise Between Vulnerability and Security Essay)
Trust: A Necessary Compromise Between Vulnerability and Security Essay. https://studentshare.org/miscellaneous/1515361-trust-a-necessary-compromise-between-vulnerability-and-security.
“Trust: A Necessary Compromise Between Vulnerability and Security Essay”, n.d. https://studentshare.org/miscellaneous/1515361-trust-a-necessary-compromise-between-vulnerability-and-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Trust: A Necessary Compromise Between Vulnerability and Security

Domain Name System Security Extensions

An author of the present paper intends to introduce the concept of Domain Name System security Extensions.... hellip; The initial design of the Domain Name System (DNS) did not comprise of security, but it was devised to be a scalable dispersed system.... The Domain Name System security Extensions (DNSSEC) endeavors to include security, whereas upholding backward compatibility.... With no DNS, the Internet would fail instantly, thus it must be properly maintained and the proper security system put in place to secure it from people with bad intentions....
9 Pages (2250 words) Essay

What Is Electronic Authentication

A single sign-on solution allows end-users a secured authentication for access and usage of desktops, enterprise applications, electronic communications, administrative and operational tasks (“SECUDE IT security,” 2008).... Our existence in society has become dependent on proving our credentials, our identity and our right of access to a certain set of resources....
12 Pages (3000 words) Essay

Incident response policy

Proper incident response should be an integral part of your overall security policy and risk mitigation… This document will provide you with a recommended process and procedures to use when responding to incidents identified in a small- to medium-based network environment such as Gem Infosys.... The value of forming a security incident response team with explicit team member Incident response policy for Gem Infosys Incident response policy for Gem Infosys Introduction In the existing IT environment, incidents are common and appropriate measures should be taken to tackle them....
2 Pages (500 words) Essay

Cybersecurity Vulnerability Faced by IT Managers Today

This paper would help to identify and further creating a mechanism for safe operations and security of the organizations, their clients.... These managers and departments are at the forefront of the threats being posed in terms of security.... he possible vulnerability can be mitigated through safe practices and protective layers of security that ensures authentication.... These weaknesses of cybersecurity governance have been identified by the Department of Homeland security and proposals have been initiated to bring about change....
12 Pages (3000 words) Term Paper

Effective Techniques to Mitigate Risks, Incorporating Voice Signatures

These scenarios occur due to a deficiency of security.... Internet searches make available a thousand or more definitions to describe 'security'.... The definition of security, in the context of data theft on the internet, consists of concerns linked to i) communication privacy on the network, ii) data confidentiality over the network, iii) unauthorized access to classified data, iv) entry into prohibited network domains and v) internet utilization for hidden communication....
8 Pages (2000 words) Essay

The Analysis of the Heartbleed

SSL, this shorthand represents Secure Sockets Layer—It is a security standard that allows secure transmission of information to occur between you and a service without the risk of interception of vital information by a third party.... The Shellshock issue is a sample of ACE (arbitrary code execution) vulnerability.... Classically, ACE vulnerability attacks are carried out on running programs and entail an extremely advanced understanding of the internals of assembly language, code execution and memory layout—the kind of attack that calls for an expert, to be concise (Sampathkumar, Balasubramani 2014)....
16 Pages (4000 words) Essay

Trusted Platform Module Vulnerabilities

This article "Trusted Platform Module Vulnerabilities" focuses on TPM, an overview, is known to offer a protection space for key operations, provide a safe place for storing sensitive information and other critical security tasks, and report and store integrity measurements.... This shows the vulnerability of TPM (Varadharajan & Tupakula, 2014)Parno (2012) uses techniques from secure multiparty computation, a protocol for verifiable computing to provide computational integrity for work done by an untrusted party....
7 Pages (1750 words) Article

Privacy and Security in Cloud Services

… The paper "Privacy and security in Cloud Services" is a great example of a literature review on logic and programming.... The paper "Privacy and security in Cloud Services" is a great example of a literature review on logic and programming.... Cloud services thus face the biggest security threat especially because they transmit and pool huge amounts of important and private data on the Internet, where it becomes the target of cybercriminals....
20 Pages (5000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us