CONTEMPORARY SECURITY ISSUES 5
Thecontemporary security world has been characterized by a myriad ofinnovations and developments in a bid to counter the ever growinglevel of tactics by security breaching agents. The development of theinternet has posed even more challenges with regards to cybersecurity. This paper discusses two such contemporary issues thatemerging from both security as a profession and as an organizationalproblem.
Thesecurity profession is guide by a set of codes of ethics(Secureworks.com, 2014).However, ethical behavior ought to be conceived from within anindividual, mostly to exercise the good deeds imparted in them.Ethical behavior in security has been a great issues in thecontemporary world as professional are caught on the wrong side ofcommon beliefs and ethical dispensation of duty. The science behindethics has been developed over the decades, with various socialscientists coming up with theories that act as frameworks fordetermination and evaluation of ethical behavior. The most importantof the theories are: the utilitarian approach, the common goodapproach and the rights approach(Secureworks.com, 2014).
Theutilitarian approach proposes that an action is termed as ethicalwhen it has maximum benefits to the maximum number of people(Secureworks.com, 2014).This approach argues that the best choice to make when one is in adilemma is that which will provide maximum benefits to the maximumnumber of the people involved. For instance, in a case where asecurity commandant is prone to either tell a lie or have his wholetroop killed, lying would be the most amicable solution. In thecontemporary world, security professionals are faced by such similarsituations. For instance, a security professional may note that acompany’s network has been hacked into and that the best way tocatch the hacker is hacking back. Hacking would sound unethical andagainst the moral standards but with regard to utilitarianism,hacking back would be of maximum benefit to the organization as wellas others who were at the exposure of the ill-minded hacker.
Thecommon good approach proposes that an ethical decision making shouldbe based on commonly held beliefs(Secureworks.com, 2014).For instance, it is generally held that people ought to receiveinformation and feedback about anything that involves them. This iscontrary to the utilitarian approach that would withhold theinformation if it were to impact negatively on the people.
Theright approach is guided by the principle that execution of duties bysecurity personnel ought to be well informed so that it does notinfringe on other people’s rights(Secureworks.com, 2014).The rights of individuals are to be respect for that act in contextto be termed as ethical. For example, a security officer may haveclassified information about an individual that he is supposed tokeep secret and confidential. However, the individual becomes apotential threat to security the rights approach prohibits theofficer from disclosing such kind of information. The activities ofsecurity professionals should surpass collectively held rights by thesociety. The freedoms of speech, movement and life should not beinfringed unless by order from a court of law.
Ethicsin security has become such a huge issue of concern in thecontemporary world where everyone is aware of their rights andobligations. Myriads of movement have been established to monitor theactions of security professionals and hence the demand for competencein the field is high – and will keep growing by the day.
Terrorismhas been a great risk to business and human existence. Acts ofterrorism have been there since time immemorial. However, thecontemporary security field has relooked into the matter as it posesgreater risks in every passing day. Terrorists are often ruthless andcareless goons whose main aim is to destroy and kill. They arewilling to cause any amount of damage as long as their goals areachieved(Fed-soc.org, 2014).Terrorism could be executed in different ways and tactics, forinstance, they could launch a physical attack where they use armorysuch as bombs they could use diseases to infect humans, livestockand crops and they could also use the internet through cybercrime todestroy systems and valuable data(Fed-soc.org, 2014).It is also worth noting that terrorists are in continuous researchand innovations so as to imitate and beat the security systems oftheir targets.
Inthis light, the security profession has to be vigilant in ensuringthat its personnel are well equipped with knowledge on how to handleterrorism as a global or local issue. Special training is required toensure that experts are well versed with amicable tactics andtechniques so as to seal all the loopholes that terrorists wouldutilize(Fed-soc.org, 2014). There ought to be comprehensive contingency plans. Before that, thesecurity professionals ought to be well equipped with necessaryrespective equipment by departments. For instance, the cyberdepartment ought to have the most detailed and advanced equipmentsuch as computers. Business organizations also ought to employ thebest trained and experienced security personnel to detect and deteracts of terrorism from affect its operations.
Fed-soc.org,.(2014). TheWar on Terrorism: Law Enforcement or National Security?.Retrieved 28 November 2014, fromhttp://www.fed-soc.org/publications/detail/the-war-on-terrorism-law-enforcement-or-national-security
Secureworks.com,.(2014). Crossingthe Line: Ethics for the Security Professional | Dell SecureWorks.Retrieved 28 November 2014, fromhttp://www.secureworks.com/resources/articles/other_articles/ethics/