StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security and the Technological Revolution - Research Paper Example

Cite this document
Summary
A critical examination of the changing ways of perpetrating crime will validate the importance of technological revolution in the security profession. The study will embark on investigating various technologies that are applicable in the security profession, and also document…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
Security and the Technological Revolution
Read Text Preview

Extract of sample "Security and the Technological Revolution"

Download file to see previous pages

According to Dulles (2014), one of the greatest threats to the security profession is cybercrime. Security officers are forced to implement new technologies in order to detect any malicious attempts of cybercriminals and undertake counteractive measures to avoid exposing citizens to harm. For instance, cybercriminals are currently using sniffer malware to extract password files from their targeted computers hence using them to gain unauthorized access to critical information within organization’s system.

Therefore, the security profession has been forced to implement new technology that would enable security officers to curb such kinds of crime. They have implemented audit trailing technology that enables them detect the log in details that were used to access information within the system during the time of crime. The report generated after performing audit trailing enables the security officers to identify the possible security loopholes that might have been used by the cybercriminals to perpetrate the crime.

Technology has also enabled them to track cybercriminals to their exact locations hence making arrests in efforts to curb the vice. The security profession used to face a lot of challenges before establishment of the audit trailing technology because it was hard for them to detect any unauthorized access to organization’s information. Moreover, Back-off Malware has been another cyber threat that forced the security profession to implement new technology in efforts to curb it. Back-off is a Malware program that is installed in the Point of Sale (POS) terminals by cybercriminals in order to collect credit card information and transaction data of the users.

The malware uses traditional scraping mechanisms to record critical information from customers and using it to initiate transactions without the account owners’ consent. The

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security and the Technological Revolution Research Paper”, n.d.)
Security and the Technological Revolution Research Paper. Retrieved from https://studentshare.org/miscellaneous/1699423-security-and-the-technological-revolution
(Security and the Technological Revolution Research Paper)
Security and the Technological Revolution Research Paper. https://studentshare.org/miscellaneous/1699423-security-and-the-technological-revolution.
“Security and the Technological Revolution Research Paper”, n.d. https://studentshare.org/miscellaneous/1699423-security-and-the-technological-revolution.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security and the Technological Revolution

Organizational Business Mission and Related Security Goals

With prevailing drastic revolution in cyber technology, the human dimension of the security problem cannot be disregarded.... Cyber security Name Instructor Course Date Organizational business mission and related security goals Intellectual property is a juridical concept that refers to creative formations of the mind that have exclusive rights.... The behavior of the users, failure in compliance with security policy and ignorance of cyber threats are common human factors that compromise the overall security of cyberspace....
5 Pages (1250 words) Coursework

Syria Revolution

hellip; It made it strong with administrative institutions, security and military forces, and even social systems and economic systems seemed quite strong and effective.... Discussion revolution outbreak The Syrian revolution traces its origin to the various coups and counter-coups that happened in the early 1960s.... Assad response and effects of the uprising Assad responded to the revolution and protest by providing reforms and ordering the military to calm the uprisings....
3 Pages (750 words) Research Paper

A Business Proposal to Modify a Law

The world is in the midst of an all-purpose technological revolution based on CCTV related security technology, defined here as visual security, software related surveillance techniques, and CCTV related security equipment.... The macroeconomic benefits of the CCTV related security technology revolution are already apparent in some economies, especially the United States and United Kingdom.... Historical experience has shown that such revolutions have often been accompanied by financial booms and busts, and the CCTV related security technology revolution has been no exception....
6 Pages (1500 words) Essay

Revolution in Military Affairs

hellip; The 2003 invasion of Iraq is likely to be the last conflict to showcase what has been called a new American way of war - what in the 1990s was called an American revolution in military affairs. Probably the most widely used and accepted detailed definition was provided by Andrew F.... He explained RMA as "What is a military revolution It is what occurs when the application of new technologies into a significant number of military systems combines with innovative operational concepts and organizational adaptation in a way that fundamentally alters the character and conduct of conflict....
5 Pages (1250 words) Essay

The Industrial Revolution: Creating Opportunities for Women and for Labor

 This study discusses the definition and inventions of the Industrial revolution....  …  The Industrial revolution was a period of tremendous and tumultuous change.... nbsp; The Industrial revolution: Creating Opportunities for Women and for Labor The Industrial revolution was a period of tremendous and tumultuous change.... The introduction of women into the labor force was a revolutionary feature of the Industrial revolution....
2 Pages (500 words) Case Study

International criminal matters, policies, regulations, standards,

Modern day terrorism has become… Due to globalization and technological advancement terrorism too has developed and terrorists are now using sophisticated means to carry out terrorist acts all around the world. The first formal adoption of a resolution to fight against global International Criminal Matters Against Terrorism One of the first recorded incidents of terrorist activities was the use of assassins by the army of Saladin against the crusaders in the eleventh century....
2 Pages (500 words) Essay

Advancement in Green Revolution Technology

The dramatic revolution resulted into immense change in the field of agriculture including improvement in crop and animal… It is indispensable that the technological advancement era resulted into availability of modern agricultural resources including fertilizers and other contemporary farm tools that remained vital to agricultural change1.... It is indispensable that the technological advancement era resulted into availability of modern agricultural resources including fertilizers and other contemporary farm tools that remained vital to agricultural change1....
1 Pages (250 words) Research Paper

River Valley Civilizations

The agricultural revolution produced two types of society that include pastoralist societies and settled societies.... The agricultural revolution produced two types of society that include pastoralist societies and settled societies.... The old and middle kingdoms where characterized by unprecedented cultural and technological revolutions such as Hieroglyphic writing, the use of Rosetta stone in building Pyramids and unified belief systems such as prayers to gods such as Osiris, Amon-Re and Isis....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us