Verified Document

Security Technology In Next Five Years Globally Essay

¶ … Security Technology in Next Five Years Globally security concerns have placed great pressure on the survival of human life and had threatened the daily life, confidence and dignity of societies at large. To resolve the security concerns and overcome with this disastrous obstacles, security technological advancements have been made in many facets. Human life is playing its vital role in moving the world to a secure place where families, businesses, trade, educational system, media, governance, art and science thus all fields of life is affected by the security concerns (Sen, 2002). Now the big question here is how technological development can contribute towards the security concerns especially in the areas of biometrics, forensics and physical security.

Although, there has been intensive increase in human security as the consequences of technological development, the historical background of technology has not rooted much confidence in the societies that further technological development will reduce the fear. This is due to the fact that technology itself have been source of much of the destructions in the form of biological and chemical weapons of mass destructions, nuclear arms, toxic and fatal by products generated from industrial and energy generating product production procedure destroying the environment and ecosystem (McGinn, 1991).

Industrialization of the societies results in the economic growth and prosperity. Through economic growth and prosperity nations are able to sustain economic security for longer term. This economic security contributes in the welfare of societies and ensures human well-being, high quality of living and secure life (Magarinos, 2001). Technology is therefore an important ingredient in shaping the life of nations through power and profit maximization which is achieved in variant ways. Technological advancement promotes creativity and innovation.

Assessment of Security Technology development

It was in the year of 2007 where many global companies have entered into the regime of security market. The security industry was becoming more competitive than ever before. IT has played a crucial role in the development of the security industry. The future of security market was seen to be more competitive with the increase of customer demands and industries and households were demanding more customized security products.

Due to different market segments, purchasing patterns, customer needs and wants, security products also need customization and segmentation. The advancement of technology has enabled companies to plan the product according to the market needs and be flexible enough to fit in the customer requirements for their safety needs. In the recent times the market perspectives have promoted different types of products in different styles and models to be set as the security mechanism. The primitive style of monitoring project has now been replaced with the widely distributed network monitoring system. In the following text development and future prospects of security technology system will be discussed namely Biometrics, Forensics and Physical control.

Biometrics

Biometrics is the type of identity access management and access control system that recognizes humans from their physical or behavioral attribute. This system is also used to identify individuals in groups that are under observations. The biometric characteristics are basically characterized as physical behavior which includes fingerprints, face recognition, DNA, palm print, iris recognition and smell. However the behavioral characteristics are person's behavior such as voice, speaking type and typing style. The biometric system works with the principal of verification and identification.

Prevailing, Emerging and future prospects of biometrics

Biometric as provides the security system through access control on contrary if the person that has uniquely identified himself/herself through the application of biometric technology is in fact a malicious action performed by some culprit from the computer system. The control of the computer system can be illegally accessed by the hacker who can then use the information for some brutal action uninformed to the real person. The information about the identity of the person which can be critical to the safety of the thing in concern is misused even though it is password secured. Under such circumstances biometric will not serve the purpose of network security or help for the law enforcement activities.

Growth challenges

Biometrics technology for security mainstreaming...

These challenges will not only be resolved through strong technological framework but will require a thorough infrastructure for its development and implementation. The future critical areas for concern will be:
a) Secrecy and discrimination: It is quite possible that the data obtained about the enrolled person is taken without the permission of that individual.

b) Security items in Peril: There is the danger of theft of the security items in concern. Individual can be faced with loss of physical resource which can be irreversible in the protection of the security.

c) Biometrics inflexible: Biometric are inflexible in a way that it cannot be easily changed like password projection.

forensic & physical security

Forensics is the science that deals with the analysis of objects, people & places during crime investigation to gather evidence for proving guilt or innocence of the concerned individuals. In the security concern documentation of the facts and findings is primary to the process of investigation. Forensic security follows the scientific method of processing investigations. It requires assortment of equipments to record maximum possible details before its set for finalization.

The procedure of forensic security technology uses Dictaphones to record verbal notes which are than transcribed later and cameras are used for photo review and add minute details of the criminal activity or any security procedures. The characterization of forensic evidence is made into two main categories namely physical and biological. Physical evidence requires prints, firearms and other material items, however biological evidence requires the presence of human body or its components like blood, hair or any of the body part or fluids.

Digital Investigations and computer Forensics

The aim of digital forensics is to examine digital media in a forensically sound manner with the goal of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information. These may take form of:

1. Investigations into threatening emails, unsolicited offensive materials, and intellectual property theft

2. Cell phone and PDA device investigations.

3. HIPAA compliance security assessments

4. Hacking investigations

5. Evidence Storage and Archiving

6. Evidence Inventory Control and Tracking

7. Deleted File Recovery

8. Portable Electronic Device Data Recovery

Physical Security

Network system security starts at the physical level. Firewalls protection is of no use if an intruder is able to gain physical access to your network and computers. So the foundation for any IT security strategy lies at the appropriateness of physical security. Physical Security concerns all the actions that are taken to guard buildings, property and assets against trespassers. These include video surveillance and CCTV systems; electronic access controls; alarms; locking hardware and Crime Prevention through Environmental Design (Paris, 2001).

Application of the security system in organizations

Security technology is setup in the organizational environment as well as households for the protection of the humans and protection of the data. In the organizations like banks, manufacturing concerns, crime investigation departments, pharmaceuticals, nuclear reactors and service industry the combination of biometrics, forensic and physical security is utilized for the security reasons.

In today's business environment more people have been delegated the authority of accessing critical data across the borders and resources are shared in many of the regions which bears the threat of being destroyed within the network system. Internal users can also for any reason use the data for criminal activity. However trust is the main bond between the employees but this trust can shatter any moment. With the increase of the risk element in the society the need for security has increased many folds. New and advance type of security gadgets have been developed for the protection which included scanning machines, digital cameras, digital sensors and chemical reactors for checking of any chemical formulation which can disturbs security alerts.

Conclusion

To have the best possible security plan with the application of the security technology it's important that organizations make up the incident…

Sources used in this document:
References

Magarinos, C. (2001) Human Security and Science and Technology. Inauguration Statement of the UNIDO Director-General, 10 October, 2001. United Nations Industrial Development Organization.

McGinn, R (1991) Science, Technology and Society. Englewood Cliffs, New Jersey: Prentice Hall.

Paris, R. (2001). Human security: paradigm shift or hot air?,International Security, retrieved July 21, 2011 from http://www.mitpressjournals.org/doi/pdf/10.1162/016228801753191141

Sen, K. (2002). Basic Education and Human Security. Report of the Kolkata Meeting in Commission on Human Security Bangkok, Thailand. Compiled by Center for Social Development Studies, Faculty of Political Science, Chulalongkorn University. Retreived on July 21, 2011 from http://www.mofa.go.jp/policy/human_secu/sympo0007_s.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Detail Five-Year Plan for Career, Including Jobs
Words: 2777 Length: 10 Document Type: Admission Essay

Detail Five-Year Plan for Career, Including Jobs You Want, How Leverage Education and How Prepare Yourself for This Path. Experience has taught me that despite one's best intentions sometimes the unexpected evolves. Taking this into consideration I gladly outline my five-year goals understanding that unexpected events or circumstances may change my path slightly, but ultimately not interfere with my primary purpose, which is to develop and manage my own company. In the

Technology to Define Ethical Guidelines
Words: 1526 Length: 5 Document Type: Term Paper

This is a secondary revolution occurring in many compan9ies today directly as a result of technologies making the initiative of having employees use human resources securely, reliably, anytime they want - all leading to reduced costs and higher levels of customer satisfaction. References American Management Association, 2005- Excerpts from 2005 Electronic Monitoring & Surveillance Survey: Many Companies Monitoring, Recording, Videotaping -- and Firing -- Employees. Retrieved January 12, 2007 from the

Technology and Global Exosystem
Words: 2489 Length: 8 Document Type: Term Paper

Technology and Global Ecosystem An Analysis of the Implications of Technology and the Global Ecosystem The 21st century promises to usher in innovations in technology that cannot yet be imagined, and the advancements to date have provided many in the world with unprecedented standards of living. Improved methods of transportation and communication, combined with more leisure time than ever in which to spend it has resulted in many people developing a keen

Next Generation Air Transportation System
Words: 2879 Length: 8 Document Type: Term Paper

Global Position System (GPS) System Wide Information Management (SWIM) Advanced data Communication Next Network Enabled Weather The NAS Voice Switch Structural design of new aircrafts In this paper, we look into the new technological development in the air transport system such as GPS in air traffic management, airport infrastructure and proactive safety management. In details the paper discusses the user of specific situation awareness including a new broadband information network, weather observation, prediction and impacts; security,

Future of Security in Previous
Words: 1106 Length: 4 Document Type: Term Paper

National security cards also have the ability to provide useful information and insight to policymakers on which areas of a given country will most likely be the least secure and which pose potential security threats (Ortmeier, 2009). This will also force nations to into strategic identity management systems and taxonomies of how they classify threats to their populations. The use of analytics and big data or exceptionally large and

Value Digital Privacy Information Technology the Value
Words: 1893 Length: 4 Document Type: Essay

Value Digital Privacy Information Technology The Value Digital Privacy in an Information Technology Age National security concerns in society and the continual investing in Internet, telephone, text and e-mail monitoring systems by enterprises are reshaping the individual citizen's rights to privacy. For U.S. citizens and employees, this is particularly challenging to accept and is often outright rejected as this nations' culture has been predicated on individual liberties and an assurance of privacy. The

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now