Essay Available:
You are here: Home → Essay → Technology
Pages:
2 pages/≈550 words
Sources:
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:
Answering Questions about Quantum Technology (Essay Sample)
Instructions:
Answering questions about Quantum Technology
source..Content:
SEC 105 Security
Name:
Institution:
Question 1
Do a search on 'quantum technology' and identify a potential technology that would create a physical security threat; what that threat could be; and how it might be countered.
Answer
Quantum computing is a quantum technology that would have the potential to break modern computing codes and thus pose a major cyber security threat (Nakahara, 2013). A quantum Computer will have the capability of breaking the codes used universally (via the Internet) to protect business transactions. Any organizations obtaining a quantum computer could easily disrupt the electronic communication in the Internet. This would generate a situation where computer security would be out of control. Quantum computing is also sensitive to environment changes in comparison to the conventional computing which makes it easier for hackers to disable systems.
This can be countered by increasing security in business by making internet access stricter so as to ensure that the organizations information is safe. Another way to counter this is by building codes that quantum computers cannot be able to break. Resources should be put in understanding technology such as quantum cryptography to exchange key securely.
Question 2
Do a search on ‘quantum technology’ and identify a potential technology that would create a cyber security threat; what that threat could be; and how it might be countered.
Answer
Quantum cryptography is an example of Quantum technology that would create a physical security threat (Nakahara, 2013). This is because this new technology disseminate keys using quantum cryptography that are absolutely secure and random. Thus this technology is safe in regard to code breaking and computing. This makes physical security breach the strongest loophole that invaders can utilize.
Emergence of technology such as Quantum cryptography evidences that technology is continuously changing but it is important to note that physical security techniques has not changed. Healthcare IT news in 2012 reported that 9 out of 10 of the largest security breaches are caused by physical security issues.
To counter the physical security, staff should keep inventory of all their removable devices and know where they are at all times. Another strategy is by physically securing those devices so that only those people who should have access will have access to them. Creating position such as that of an Information Security Manager to help with monitoring physical security in the organizations. This does not have to be a new hire for that person but a staff can change positions until the organizations is contented that it has put all the quantum computing security under control.
Question 3
Do a search on ‘quantum technology’ and identify a potential technology that would create a personnel security threat; what that threat could be; and how it might be countered.
Answer
Quantum computing is also the potential technology that would create a personnel security threat (Nakahara, 2013). This is because code breaking abilities of a...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- ITM 441 Case Study AssignmentDescription: Internet based conferencing is not just a technological issue, but a classic case of sociotechnical balance...4 pages/≈1100 words| APA | Technology | Essay |
- The Ten CodesDescription: This sample is supposed to bring out my ability to research and compress information without leaving any important details out....1 page/≈275 words| APA | Technology | Essay |
- Internet Effects on ChildrenDescription: Firstly, internet acts as an education outlet for our children. It contains unlimited information hence its a rich source in the provision of knowledge....1 page/≈275 words| APA | Technology | Essay |