Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

The purpose of this assignment is to give you an opportunity to think creatively

ID: 3697613 • Letter: T

Question

The purpose of this assignment is to give you an opportunity to think creatively about the future of information security -- and to get a little experience making decisions on the basis of insufficient information, a situation that occurs all too often in the real world.

Choose a technology, product, service, legislative area, social phenomenon, or other topic related to information security, analyze the present situation and future possibilities, and forecast its future.

The detailed requirements are:

· Introduce the topic.

o (2 points) What is your forecast about?

o (2 points) How is it pertinent to information security?

o (2 points) What is important or interesting about this particular topic?

· Analyze the present.

o (1 point) Describe the present situation.

o (1 point) What are the current issues, if any?

· Consider possible futures.

o (2 points) Describe at least two changes you believe possible.

o (1 point) Identify one or more of these changes you consider likely.

o (1 point) Explain why you consider it (or them) likely.

o (1 point) Identify one or more of these changes you consider unlikely.

o (1 point) Explain why you consider it (or them) unlikely.

· Provide a future forecast.

o (1 point) When do you think the most likely changes will occur?

o (1 point) How will that affect other areas of technology or society?

o (1 point) What is your level of confidence in this forecast?

· (1 point) Base your analysis, at least in part, on relevant literature (and give citations).

· (1 point) Your forecast should be no longer than about 1500 words.

· (1 point) Deliver your review through BlackBoard

Explanation / Answer

1- security program to adapt to new forces like cloud, mobile communications and social media.Most of organizations targeted by major cyberattacks will spend more than two months cleansing backup, resulting in delayed recoveries.

2- while organizations are developing new security mechanisms, cybercriminals are cultivating new techniques to evade them. In the drive to become more cyber resilient, organizations need to extend their risk management focus from pure information confidentiality, integrity and availability to include risks such as those to reputation and customer channels, and recognize the unintended consequences from activity in cyberspace. By preparing for the unknown, organizations will have the flexibility to withstand unexpected, high impact security events.

3- A number of major security themes were part of this uncertainty – cloud, mobile, social media, big data, compliance, advanced persistent threats, physical infrastructure security, and the changing nature of information security leadership.

4- The Internet of Everything is a concept that extends the Internet of Things emphasis on machine-to-machine (M2M) communications to describe a more complex system that also encompasses people and processes. While the above mentioned compromises prove to be just a small fraction of the security incidents that occurred in 2014, those incidents do reveal some of trends, namely that financial gain is a key motivator for attackers and that even the most secure organizations are still susceptible to threats, two realizations that should be game changers for those seeking to protect IT assets from cybercrime.

5- security system has cybercrime, the complacency of the victims is sometimes at fault. While that does not excuse the criminal nature of the attackers, it does highlight the need for organizations to be proactive in protecting their assets - after all, the law only comes into play after a crime has be committed, meaning that the numerous anti-cybercrime laws on the books hold little sway against determined cybercriminals.

With the idea of a security paradigm shift on the table, today's cyber-defenders should be thinking in different terms than just traditional security initiatives, shifting their focus towards an ideology of "cyber risk management".Institutional IT leaders must determine how to leverage the wireless and device explosion to advance the educational mission. Today's mobile devices no longer just provide access to contacts and calendars; they are powerful computing devices that are capable of much more. Faculty, staff, and students want to consume all the content they need—ranging from campus maps to class schedules to campus news and alerts—when they want it, where they want it, and on whatever device they may be using at the time. Providing this content to them is no longer an extra resource; it is a requirement.

The confusion in cryptography is not doing any favors for the digital signature market. The federal government built a digital signature standard around a technology, that has a non-trivial side-benefit; it cannot be reverse engineered into a public key encryption system. The market seems to prefer RSA's private standard. Compared to encryption, the level of federal resistance to digital signatures is far less and parts of the federal government are, in fact, working hard to encourage its use. The immediate requirement, particularly for electronic commerce, is greater, and thus digital signatures are likely to proliferate. A real spur to its use may come if and when people exploit digital signatures as a apply-once use-forever stamp to documents. For instance, college graduates may get a signed and dated bitstream of their grades that they could give to anyone; recipients could verify its authenticity by computer.

Technology remains the wild-card behind any forecasts of encryption's use. Innovations such as elliptical methods or cryptographic analysis will affect the time required to generate or break codes. Yet, very little in the last fifteen years has broken the fundamental fact that increases in key length have a modest affect on the cost of making codes and a major affect on the cost of breaking them. The one joker in the deck is the prospect of quantum computing which can break the back of the prime factoring problem thereby rendering both public key encryption and digital signatures obsolete. But no one knows whether quantum computers will work.