Reply for Student 1.2 Rhys Durham Re: Activity 1.2
I agree with Durham that personal privacy is a significant challenge and even though we can define and determine our confidentiality through our actions advanced technology makes it challenging to retain privacy. Many governments and organizations work hard to ensure personal data privacy especially the healthcare data and financial data privacy. Data privacy has not been an easy fete to achieve as hackers become more motivated and aggressive with the aid of the ever-changing technology environment. Social media sites are no longer safe due to the high number of cyberbullying attacks and information being tapped and used by advertisement and research organizations without the knowledge of the owner. I disagree with Durham regarding data laws, and in the future, there is a need for more tough laws against new and existing personal data security.
Reply for Student 1.8 Mohamed Rozmi Re: Activity 1.8
I disagree partially with Rozmi criteria of accepting the contract because it is only profit and reputation oriented while leaving out other important matters such as how the technology will be used and its ethical standing. Video Surveillance System is a useful technology application that could have a significant positive impact on the community be promoting the identification of criminal profiles and enhancing security. Therefore, the installation impact on the safety of individuals as well as the privacy of the community members should be considered before taking up the project. Besides, every manager has a responsibility of ensuring their business undertaking to ensure that the technology is not abused and should make the government accountable.
Reply for Student 2.8 Jason Payne Re: Activity 2.8
Payner assesses the development and trends in the web browser from the invention of the Mosaic web browser which increased internet access to the world populations. I agree with Payne that the dotcom bubble bust was foreseeable due to the government encouragement of speculative investments through the Taxpayer Relief Act of 1997 which increased investment. The 1996 Telecommunication Act further increased investments in technology which led to unsustainable speculative investments. However, it is important to note that the most dominating factor that led to the bubble bust was the use of stock price to value investments instead of the cash flow as well as the overvaluation of stocks. Therefore, Payne's argument is informative and factual regarding the development and decline of the DotCom bubble.
Reply for Student 3.2 Ben Hughes Re: Activity 3.2
Hughes discusses the radio frequency identification (RFIDs) types and their advantages. Hughes establishes a good profile of the active and the passive RFIDs which can help the users to choose between the two depending on the user application. As such, the passive RFID have limited use due to their weaker frequency range and can be used in shops and access control. However, I reckon that the passive RFID is more convenient due to its small size and the short range of access which reduces possible cyber breach. The active RFID can be used in long-range distances which makes them more applicable but more vulnerable to attacks. Organizations should adopt the active RFIDs because of their resilience and the wide range of application.
Reply for Student 3.8 Ben Hughes Re: Activity 3.8
In this activity, Hughes identifies the threats of using RFIDs such as cloning and skimming. Hughes discussion shows that RFIDs are also substantially vulnerable to attacks which organizations and individuals should guard against. Security measures should be put in place when using RFID to reduce skimming and cloning which can result in a security breach of RFID data. I agree with Hughes that using aluminum coatings and shielded badge holders which have RFID can reduce privacy invasion through cloning and skimming.
Reply for Student 4.1 Henry Chiti Re: Activity 4.1
Chiti argument denotes the different types of biometric data which has seen an increase of use due to their relative safety especially in areas where personal identification is required. Facial recognition, image capture, fingerprints, voice recordings, and Iris scanning are amongst the most used biometric data for individual identification and access. Chiti has left out DNA which is also a major biometric data in use today to identify people uniquely. However, I disagree with the signature used as a biometric identification due to the possible cloning of signatures using technology or manually by specialists. I agree with Chiti that the applications of biometric data continue to increase and there is a need to regulate how biometric data is collected and used to prevent a future security breach.
Reply for Student 4.13 Rhys Durham Re: Activity 4.13
I disagree with Durham on his stand on a new biometric-based security system of being hesitant to provide the required information to operationalize the system. From a personal perspective, technology has significantly changed, and a biometric system is one of the safest approaches to ensuring information safety and safety control measures creation in an organization. A biometric-based security system could enhance an organization cybersecurity and ensure that every employee is accountable for their actions. When an organization requires biometric information such as DNA, it is important to question their motive but if the motive is clear there is no need of being hesitant. However, I agree with Durham that scrutinizing the security of the system is important to ensure that personal data such as DNA does not get into the wrong hands.
Reply for Student 4.4 Paul Munro Re: Activity 4.4
I agree with Munro that the adoption of biometric security systems in educational institutions is a good approach to ensuring security and increasing access to services. Munro notes that parental consent is an important factor to be considered before a biometric system is created and sites the new GDPR update as an effective personal security regulation that requires the initial consent of the data owner. Therefore, schools should follow the right channels to create a biometric system by ensuring they have parental consent and provides detailed information on how the information will be used and the safety measures in place. I agree with Munro that biometric data could have a significant impact on the future of the student in case of breaches and unauthorized access will make the rest of the future student data insecure. Therefore, there is a need for significant caution and tough security measures to ensure that the student data is safe all the time.
Reply for Student 4.6 Ashwin Seegolam Re: Activity 4.6
Seegolam argues on the safety of the fingerprint security technology used by Apple and other device companies. I agree with Seegolam that the fingerprint technology provides greater device security. However, this feature does not protect users from cyber-related threats and only safeguards the device from unauthorized access externally through the device. It is true that people are becoming more creative and a fingerprint scanner can be hacked using a duplicated print of the user fingerprint. Therefore, those that use the fingerprint scanner should also use an additional security feature such as a password on the device.
Reply for Student 4.7 Paul Munro Re: Activity 4.7
I agree with Munro that drone swarms pose a significant future threat not only on military installations but also on civilians. The weaponization of drones is another technology that terrorists can easily acquire and manipulate to cause devastating attacks. The film 'Slaughterbots' creates a potential future scenario and security measures against drone swarms should be put in places such as the use of jamming signals around important military installations and nuclear facilities.
Cite this page
Response Paper on Data Security. (2022, Sep 13). Retrieved from https://proessays.net/essays/response-paper-on-data-security
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Mahatma Gadhi Leadership
- Paper Example on Leadership in Organizations
- Research Paper on Production of Sparkling Shiraz Wine
- Expected Monetary Value (EMV) and Evidence and Its Importance in Critical Thinking
- Catching the Interests of Physician Leadership Essay Example
- Paper Example on TechFite: Promoting Leadership & Community Involvement
- Effective Program Management: DHA's Strategy for Organization