answersLogoWhite

0


Best Answer

After considerable shake-ups in the security paradigm since 9/11, and the ensuing mad dash for "security", we're slowing starting to shy away from paranoia and, even though "security theatre" continues, we're now starting to develop some serious and effective security concepts. The fact of the matter is that, post 9/11, we took a lot of steps that, were someone to try to exactly recreate the 9/11 attack, they'd be stopped. This is brave but none too bright in that the attack modality used by the 9/11 terrorists died on flight 83, no more than an hour or so after this brand new attack modality was introduced. The fact is that that method will never work again, and unfortunately many of the security measures we put in place were using that attack as the basis for tactical response. As time has passed, however, more and more emphasis is being placed on a flexible, adaptive response to an unknown and unguessed attack modality. For instance: * Knowing who someone is doesn't always help. The 9/11 terrorists didn't bother with false names at all. And so security measures that strongly control identity work best against those who aren't trying to avoid being identified. And we see a slight decline in the more restrictive identification methodologies. * If attacked by an armed unit of 20 men, the first thing needs to be tactical response; not identification. We've improved in that area. We now adapt our response to whoever the attack is. * Modern disaster drills are becoming more flexible. A HazMat crisis requires similar reponse regardless of whether it's the result of a train wreck, a terrorist attack, or a plant leak. And so on. Inflexible, maladaptive methods of security will forever be easy ones to circumvent. As we reduce security rigidity, we increase the reailty of an effective security response.

User Avatar

Wiki User

15y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How flexibility and adaptability have come to be a security management goal?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

Does the 2003 Gran Prix have a security system?

The 2003 Pontiac Grand Prix does come with a factory security system installed. If your security system is enabled it should have a "security" light that flashes when the key is turned on.


What is security scanner?

In a computer system if computer is in risk of many viruses like Trojan they may be infected anytime. Virus may come from emails. Internet and external storage devices. They make our computer system secure our computer should be scanned properly. To prevent from this problem we can use many antiviruses as security scanner which protects our computers.


What security loopholes come to the fore in the situation described.how can these be plugged?

a) What security loopholes come to the fore in the situation described? How can these be pluggewas found that out of the 364 desktops at the corporate office; more than half did not have their antivirus software updated with recent virus signature files. Three - fourths had not changed the default e-mail password (it was the user name) and no one had installed OS patches. And one of its local mail servers seemed to be an open relay! For a fleeting moment, system manager of SystemX wondered about the situation at the seven branch offices across the country. SystemX used the Net extensively in dealing with its branches, customers and suppliers. Information like contract documents, marketing plans, Cheque and Draft numbers, bank account details and collection details were regularly transmitted by e-mail. These loopholes come into our mind. These loopholes can be plugged, if they update their antivirus which is virus signature files free. Because they use e-mail, and Net extensively so they need strong security measure in order to secure their system. In short we can say;- Security loopholes in the random number generator of windows which is fond In research. This is a program which is among the thing a critical building block for file and email encryption and the SSL encryption protocol with used by all internet browsers. For the following security loophole the plugged Mr Utpal need some action like. 1. Licence windows operating system use in the all required system 2. Using fire wale in main server. 3. The action in question can be reduced to operation of access modification and deletion. b. What is the importance of a "security budget" in the context of the given situation? Security budget is one of the important parts of every business. In this context "Security Budget" is very important. They need to provide security to their system. If manager recommends for appointing a new security consultant then it may not be granted because of budget. Any how they need to provide security. Also we can say that The initiative will include virus related product support, and online security tool kit and a new version of IIs wich can be tailored to meet customer's individual needs. The move has been greeted as a small but positive step in restoring faith in internet security , budget is required all of the level of system improvement. Such as user education, understanding best security practices, improvements in software development.


How do you lock your belkin54g wireless router so other users cannot access it?

open your browser and type in http://192.168.2.1 and this will open your router settings. go to the security tab and it will either come up with your security settings or ask you to login. if it asks for your password, the default belkin password is nothing. just click continue and your password setting will come up. from there you can change your password, encryption type, security mode and guest password.


What country does bosch tools come from?

the Bosch tools come from Asia

Related questions

Where would patch management and software updates fall under in security operations and management?

if the software updates are not taken care of, then security threats may come up. It is important that these things are done correctly to keep hackers out.


Where does blockchain's security come from?

Where does blockchain's security come from?


Which is come first safety or security?

security .


Where does flexibilty come from?

flexibility is the measure of how far a person's muscle, tendons and joints will stretch. One can improve their flexibility by gently stretching or moving their bodies.


Does production management come under logistics management?

No, logistics management is generally a peer to production management.


Does the computer come with asset management software?

Most new computers do not come with asset management software. Asset management software must be purchased separately.


How come the Bottlenose Dolphin is not endangered?

Because of their intelligence, and adaptability, and they have a wide range over most of the world's oceans. Remember, most animals are not endangered.


Do 4x6 envelopes come with any security features?

"Basically, 4x6 envelopes do not come with any security feature. If mailing an envelope you can purchase security features such as insuring your envelope reaches its destiniation."


What movie did goosfraba come out in?

Anger management


When did the movie ''Anger Management'' come out?

2003.


What movie did goosfraba come from?

Anger Management


What jobs does tennis create?

Many jobs come in the creation of clothing, shoes and equipment involved with playing this sport. Other job such as security and court management are seen in more prominently known locations that house major tournaments.