Question

Explain the risk to personal security and privacy brought on by critical infrastructure failure?

  • Explain the risk to personal security and privacy brought on by critical infrastructure failure?

Homework Answers

Answer #1
  • The risk to personal security and privacy due to critical infrastructure failure are :
  1. As the critical infrastructure fail ,every sub sector dependent and related will be affected
  2. As in this 20th century we r more dependent on technology , we do most of things via Internet, so as the critical infrastructure failure occur it will cause our personal data leak by data hacking through our cloud storage,phone and even laptops. So this is the one point that how our personal privacy affected .
  3. Second point is CCTV and surveillance cameras as we know they are everywhere in public area , so with infrastructure failure they can be used to spy on us personally
  4. Another point is GPS in mobiles and cars can be a tool to access our location for spying which can effect our personal security
  5. On critical infrastructure failure misuses of technology is much more than the benefits
Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Why do HIPAA’s privacy and security requirements cover some health care entities and not others? How...
Why do HIPAA’s privacy and security requirements cover some health care entities and not others? How might an entity not covered by HIPAA pose a risk to a health care provider or organization? In addition to the privacy and security of confidential patient information, what are some other risks in a health care organization, both legal and ethical, that arise from using health IS/IT? Provide examples to support your response.
From the article, "The role of Critical Infrastructure Interdependencies on the Impacts Caused by Natural Disasters,"...
From the article, "The role of Critical Infrastructure Interdependencies on the Impacts Caused by Natural Disasters," is there any drawbacks or flaws with the top-down and bottom up techniques, if so what are they? Explain.
My question is In regards to using a personal health record. Please explain Why would you...
My question is In regards to using a personal health record. Please explain Why would you use a PHR, why others would use a PHR, what the privacy and security risks of using a PHR and and how you would propose to mitigate those risks? If able please explain in few paragraphs. This is all one question that I have to answer.
Concepts: security breach, security risk assessment, HIPAA violation related to data security, organizational database security, and/or...
Concepts: security breach, security risk assessment, HIPAA violation related to data security, organizational database security, and/or information security network. Explain how a health care organization could or did get impacted by a type of security and the implications to the organization. How would you prevent this from occurring at your organization?
In reference to risk managment strategies, how do you identify and analyze risk mitigation security controls....
In reference to risk managment strategies, how do you identify and analyze risk mitigation security controls. identify critical success factors (CSFs) and purpose of BIA
The HIPAA Security Rule is a critical document for Health care Information Technology professionals to understand...
The HIPAA Security Rule is a critical document for Health care Information Technology professionals to understand and support. Review the HIPAA Security Rule and discuss: (1) importance of access controls in addition to audit controls, (2) what “emergency access procedures” mean under the Access Control standard, (3) how role-based access controls meet the HIPAA Privacy Rule Minimum Necessary standard, (4) what form of authentication best meets the Person or Entity Authentication standard for different healthcare applications.
What type of security can minimize both price risk and reinvestment risk for an investor with...
What type of security can minimize both price risk and reinvestment risk for an investor with a fixed investment horizon? Explain.
what type of security can minimize both price risk and reinvestment risk for an investor with...
what type of security can minimize both price risk and reinvestment risk for an investor with a fixed investment horizon? explain.
What type of security can minimize both price risk and reinvestment risk for an investor with...
What type of security can minimize both price risk and reinvestment risk for an investor with a fixed investment horizon? Explain.
The Internet: The Internet is vulnerable to system failure because it is a single, monolithic network....
The Internet: The Internet is vulnerable to system failure because it is a single, monolithic network. The Internet had its beginnings in the 1990’s when it was first used by the military and universities. The Internet flourished when its infrastructure was transitioned to be supported by government grants. The Internet is a network of networks – millions of them around the world. Which of the following statement is not true? Technical and legal complexity make pursuit and prosecution of hackers...