"Internet Explosion" Please respond to the following:
Explain how advancing technologies in the security field are changing how end users are identified. In your response, identify potential security gaps that may be caused by these new identification procedures.
"Protecting Our Future" Please respond to the following:
Identify potential ethical challenges that may be faced by security professionals as technology advances, applications become more mobile, and computer criminals become more innovative.