Security Technology in Next Five Years Globally Essay
- Length: 5 pages
- Sources: 4
- Subject: Criminal Justice
- Type: Essay
- Paper: #23783697
Excerpt from Essay :
Security Technology in Next Five Years
Globally security concerns have placed great pressure on the survival of human life and had threatened the daily life, confidence and dignity of societies at large. To resolve the security concerns and overcome with this disastrous obstacles, security technological advancements have been made in many facets. Human life is playing its vital role in moving the world to a secure place where families, businesses, trade, educational system, media, governance, art and science thus all fields of life is affected by the security concerns (Sen, 2002). Now the big question here is how technological development can contribute towards the security concerns especially in the areas of biometrics, forensics and physical security.
Although, there has been intensive increase in human security as the consequences of technological development, the historical background of technology has not rooted much confidence in the societies that further technological development will reduce the fear. This is due to the fact that technology itself have been source of much of the destructions in the form of biological and chemical weapons of mass destructions, nuclear arms, toxic and fatal by products generated from industrial and energy generating product production procedure destroying the environment and ecosystem (McGinn, 1991).
Industrialization of the societies results in the economic growth and prosperity. Through economic growth and prosperity nations are able to sustain economic security for longer term. This economic security contributes in the welfare of societies and ensures human well-being, high quality of living and secure life (Magarinos, 2001). Technology is therefore an important ingredient in shaping the life of nations through power and profit maximization which is achieved in variant ways. Technological advancement promotes creativity and innovation.
Assessment of Security Technology development
It was in the year of 2007 where many global companies have entered into the regime of security market. The security industry was becoming more competitive than ever before. IT has played a crucial role in the development of the security industry. The future of security market was seen to be more competitive with the increase of customer demands and industries and households were demanding more customized security products.
Due to different market segments, purchasing patterns, customer needs and wants, security products also need customization and segmentation. The advancement of technology has enabled companies to plan the product according to the market needs and be flexible enough to fit in the customer requirements for their safety needs. In the recent times the market perspectives have promoted different types of products in different styles and models to be set as the security mechanism. The primitive style of monitoring project has now been replaced with the widely distributed network monitoring system. In the following text development and future prospects of security technology system will be discussed namely Biometrics, Forensics and Physical control.
Biometrics is the type of identity access management and access control system that recognizes humans from their physical or behavioral attribute. This system is also used to identify individuals in groups that are under observations. The biometric characteristics are basically characterized as physical behavior which includes fingerprints, face recognition, DNA, palm print, iris recognition and smell. However the behavioral characteristics are person's behavior such as voice, speaking type and typing style. The biometric system works with the principal of verification and identification.
Prevailing, Emerging and future prospects of biometrics
Biometric as provides the security system through access control on contrary if the person that has uniquely identified himself/herself through the application of biometric technology is in fact a malicious action performed by some culprit from the computer system. The control of the computer system can be illegally accessed by the hacker who can then use the information for some brutal action uninformed to the real person. The information about the identity of the person which can be critical to the safety of the thing in concern is misused even though it is password secured. Under such circumstances biometric will not serve the purpose of network security or help for the law enforcement activities.
Biometrics technology for security mainstreaming in the organizational as well as domestic purposes will be faced with challenges in the years ahead. These challenges will not only be resolved through strong technological framework but will require a thorough infrastructure for its development and implementation. The future critical areas for concern will be:
a) Secrecy and discrimination: It is quite possible that the data obtained about the enrolled person is taken without the permission of that individual.
b) Security items in Peril: There is the danger of theft of the security items in concern. Individual can be faced with loss of physical resource which can be irreversible in the protection of the security.
c) Biometrics inflexible: Biometric are inflexible in a way that it cannot be easily changed like password projection.
forensic & physical security
Forensics is the science that deals with the analysis of objects, people & places during crime investigation to gather evidence for proving guilt or innocence of the concerned individuals. In the security concern documentation of the facts and findings is primary to the process of investigation. Forensic security follows the scientific method of processing investigations. It requires assortment of equipments to record maximum possible details before its set for finalization.
The procedure of forensic security technology uses Dictaphones to record verbal notes which are than transcribed later and cameras are used for photo review and add minute details of the criminal activity or any security procedures. The characterization of forensic evidence is made into two main categories namely physical and biological. Physical evidence requires prints, firearms and other material items, however biological evidence requires the presence of human body or its components like blood, hair or any of the body part or fluids.
Digital Investigations and computer Forensics
The aim of digital forensics is to examine digital media in a forensically sound manner with the goal of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information. These may take form of:
1. Investigations into threatening emails, unsolicited offensive materials, and intellectual property theft
2. Cell phone and PDA device investigations.
3. HIPAA compliance security assessments
4. Hacking investigations
5. Evidence Storage and Archiving
6. Evidence Inventory Control and Tracking
7. Deleted File Recovery
8. Portable Electronic Device Data Recovery
Network system security starts at the physical level. Firewalls protection is of no use if an intruder is able to gain physical access to your network and computers. So the foundation for any IT security strategy lies at the appropriateness of physical security. Physical Security concerns all the actions that are taken to guard buildings, property and assets against trespassers. These include video surveillance and CCTV systems; electronic access controls; alarms; locking hardware and Crime Prevention through Environmental Design (Paris, 2001).
Application of the security system in organizations
Security technology is setup in the organizational environment as well as households for the protection of the humans and protection of the data. In the organizations like banks, manufacturing concerns, crime investigation departments, pharmaceuticals, nuclear reactors and service industry the combination of biometrics, forensic and physical security is utilized for the security reasons.
In today's business environment more people have been delegated the authority of accessing critical data across the borders and resources are shared in many of the regions which bears the threat of being destroyed within the network system. Internal users can also for any reason use the data for criminal activity. However trust is the main bond between the employees but this trust can shatter any moment. With the increase of the risk element in the society the need for security has increased many folds. New and advance type of security gadgets have been developed for the protection which included scanning machines, digital cameras, digital sensors and chemical…