Discuss about the golden age for intelligence

Assignment Help Management Information Sys
Reference no: EM131848386

Secure Collaboration As the methods and modes of communication continue to evolve, challenges will mount for businesses trying to secure their data and for law enforcement looking to monitor communications as part of their investigations.

That was the theme of the keynote that Sun Microsystems chief security officer and renowned cryptographer Whitfield Diffie delivered at the AT&T Cyber Security Conference. The growth of virtual communities across the Web as a communications channel creates a double-edged sword in this respect.

Second Life and other virtual communities offer a growing abundance of information, although this information will ultimately need to be protected if virtual communities are to grow as meaningful channels of business-to-business and business-tocustomer communication. Diffie believes that with millions of people joining Second Life and companies building facilities there, it may be that [virtual communities] become the preferred medium of human communication.

This growing volume of information opens the opportunity to use virtual communities as a source of intelligence, and communications will always be spied on. Of course, the volume of businesses present in virtual communities such as Second Life will have to grow before they become a meaningful source of information. Once this happens, though, watch out.

Diffie believes that communication always outstrips the ability to protect it. Do you wonder who would be interested in gathering intelligence floating through virtual communities?

The answer is businesses, governments (domestic and foreign), and reporters-the same entities that have adapted every other form of communication preceding the Web.

Diffie believes the future will be a golden age for intelligence. PROJECT FOCUS

What is your answer to the following question: "As we create new and better ways to collaborate- what happens to information security?"

Reference no: EM131848386

Questions Cloud

Determine fair value of the stock on the date of the gift : Your city has a voluntary health and welfare organization (VHWD) that provides musical opportunities for inner-city youth. It does not use fund accounting.
Variety of racial and religious groups : Imagine you are the mayor of a community and think of the demographic of your citizens. Every age group, variety of racial and religious groups.
Determine reba federal income taxes due or taxes payable : Determine Reba’s federal income taxes due or taxes payable for the current year. Complete pages 1 and 2 of Form 1040 for Reba.
Catagories of people who are excluded from bargaining units : What are the 3 catagories of people who are excluded from bargaining units?
Discuss about the golden age for intelligence : What is your answer to the following question: "As we create new and better ways to collaborate- what happens to information security?"
Describe the four manufacturing strategies : In materials management describe the four manufacturing strategies and their impact on the related lead time?
When you assign a default value to a parameter : When you assign a default value to a parameter, it then becomes an optional parameter.
Proposed teamwork project : Suggest two (2) key ways in which the proposed teamwork project would affect organizational performance.
Identify the theorist and rationale for the selection : Identify the theorist and rationale for the selection. Describe the theorist (short biography and major influences on the theorist)

Reviews

Write a Review

Management Information Sys Questions & Answers

  What risks do you think the project would face

Once identified, develop a communication and engagement plan for your group of stakeholders. Consider questions such as what communication tools would you use, how often would you communicate, what are the key messages you need to share, have you ..

  What kind of information is collected through scanning

Define scanning and why it's considered one of the most important phases of intelligence gathering for an attacker. Also discuss what kind of information is collected through scanning and explain why it is important to hackers

  Why does ascap work so diligently to enforce its rights

Why does ASCAP work so diligently to enforce its rights and collect the fees for its members' songs?

  Implementation of electronic health records

From the e-Activity, determine a key factor that has delayed the widespread implementation of electronic health records in health care organizations. Provide an example of the effects of each factor to support your rationale

  Discuss the role of data dictionaries

Discuss the role of data dictionaries. Identify the information that should be stored in the data dictionary repository

  Develop a secure application development procedure

In 2-3 pages, develop a Secure Application Development Procedure which addresses each of the OWASP Top Ten Vulnerabilities. Make sure to address the following:

  What would be some of the benefits of having such technology

What would be some of the benefits of having such technology? More importantly, what would be the ramifications of this technology for the user and community?

  How steganography works in the world of data security

Explain how Steganography works in the world of data security. Discuss the many benefits as well as challenges or drawbacks.

  Methods to reduce the frustrations among disabled population

Suggest at least three (3) methods to reduce the frustrations among the disabled population and how this population can be better served

  Define and explain what the strategic technology is

Provide a definition of the term ENTERPRISE as it relates to technology. Select one of the top strategic technologies in the article and then conduct some research on it.

  Analyze the pros and cons for each given option

Analyze the pros and cons for each option. What action should she take, and why? Prepare a 2 page answer to submit in BB.

  Describe how e-commerce begin and what made it successful

Describe how e-commerce begin and what made it successful. As a member of an IT staff, how can you use social media to support e-commerce? You can search business websites to find good practices of using social media in e-commerce

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd