Security The First 10 Years The 21st Essay

¶ … Security The first 10 years the 21st century began a seemingly new age of terror and fear where heightened alert statuses and preventive measures can be seen as taken to extremes. The macrocosmic status of the global affairs which are often riddled with warfare, strife and suspicion can be examined at the microcosmic level within the information security and data protection industry. The purpose of this essay is to examine these questions: "How should we decide how secure we want our information to be? And who should be responsible to make these decisions? I'll answer these questions using ideas connecting the rationality of fear and security. Next I'll examine how materialism has distracted technology from its true essence, to help mankind. Lastly I will offer solutions to hopefully eliminate confusing and overbearing problems that humanity's quest for security can both effectively and efficiently have serious impact on that condition.

Fear and Security

It is essential to understand the causes for individuals, companies, organizations and all types of groupings need for a sense of security. In the Fact Forum Framework reading, a relationship between the known and unknown is graphically represented between two variables, cooperation and safety. What is impossible to know, could also be represented by fear, or ignorance. The balance between knowing and not knowing is represented as gray matter on this graph. This may also be interpreted as fear where a chasm is drawn to demonstrate the lack of conceptual understanding to grasp what is not known in the mysteries that can occur in everyday living.

Security needs rise from the sources of fear. Eliminating fear would eliminate the need for security in this type of relationship. The question is how is this done practically? Antonopoulos ( 2011) summed up an argument of a particular symptom of this problem, "the irony of all this of course is that rigid security rules do not make a company 'too secure 'or even 'more secure' than it used to be. A rigid set of security policies simply creates the illusion of security." It appears that the problem is at least being...

...

What are reasonable amounts of fear as a business owner, individual or any other type of person who desires to protect the information they have on their computers? Since all problems and solutions are relative to the individual organization or business, then adequate amounts of fear and the need for security should be relative as well. More is not always better in this case. Balancing and finding an equilibrium point where adequate amounts of resources are devoted to adequate amounts of problems. This can only be accomplished when self-analysis and critical thinking is applied to the problem at hand. Addressing the fear that is causing one to invest in this type of technology almost guarantees the correct amount of security will be applied and efficiency and rationality reemerge.
Materialism's Impact on Securing Information

Lipowicz (2010) narrated how the executive branch of the United States government ordered every "federal agency to immediately evaluate their security practices to see if they have adequate restrictions in place on employees access to classified data and the ability copy classified documents onto mobile devices. The move comes after wiki leaks massive disclosure of classified diplomatic cables." As the leadership of this country panics amid a wave of overreaction, it should be understood why this may be happening in this manner. The quest for security, contextualized by fear, certainly stems from materialistic outlook of Western life. Technology can often be used to help and heal others in its greatest form. However, it seems technology is building upon itself for its own sake. The newest phone, the quickest CPU processor, the most secure network all represent great amounts of hard work, dedication and science. What is so valuable about information? Is to protect competitive advantages in the business world? This is helpful only to the fact that privacy, a common decency, is observed. A Social…

Sources Used in Documents:

Bibliography

Antonopoulos, A. (2011). " Can you have too much security? "NetworkWorld May31, 2011. Retrieved from: http://www.networkworld.com/columnists/2011/053111-andreas.html

CIOinsight. (2005). "Jurassic Plaque: the u-curve of security." April 21, 2005.

Fact Forum Framework. (n.d.) "Computer Security." Retrieved from http://www.caplet.com/security/taxonomy/index.html

Lipowicz, A. (2010). "Wikileaks fallout: white house orders classified data security review." Federal Computer Week Nov 30, 2010. Retrieved from http://fcw.com/articles/2010/11/30/white-house-wikileaks-classified-data-security- review.aspx
Sjvn (2009). " When is their too much security?" ITWorld Oct 26, 2009. Retrieved from http://www.itworld.com/security/82437/when-there-too-much-security


Cite this Document:

"Security The First 10 Years The 21st" (2011, August 06) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/security-the-first-10-years-the-21st-84849

"Security The First 10 Years The 21st" 06 August 2011. Web.18 April. 2024. <
https://www.paperdue.com/essay/security-the-first-10-years-the-21st-84849>

"Security The First 10 Years The 21st", 06 August 2011, Accessed.18 April. 2024,
https://www.paperdue.com/essay/security-the-first-10-years-the-21st-84849

Related Documents

10-year-old boy, Alec. The child has had pervasive relocations in his life, beginning at age 2 and endured a challenging separation between his parents. Since the separation he first experienced 50% split parenting, living with his mother one week then his father and stepmother the next, until such time as he was school age. He then began to live full time with his mother during the school week and

Computer Security Information In the 21st century, information is the key to almost every organization's success. Data is the lifeblood of business -- the information one uses to be competitive and the information that spells success or failure in the marketplace. Data is so important that an entirely new security focus has arisen -- Computer Information Security. In an era in which we must choose which issues for focus, the issue

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it