Saturday, June 8, 2019

Technology and civil security Essay Example | Topics and Well Written Essays - 750 words

Technology and civil security - Essay Exampleto employ and train technological staff with an involve of developing counter technologies that will effectively prevent terrorist attacks, mitigate natural hazards, protect critical infrastructure, improve all-hazards preparedness, support disaster response, continuity and recovery. As such, we ignore devise ways that will hinder the use of technology in terrorism, mass destruction, and disruption.Actually, in that respect are many demonstrations on the impact of technology on warfare and security. Most assuredly, the unavoidable diffusion of technology has led to the possibility of using technology in irresponsible manner that propagates terrorism and jeopardizes civil security (Mallik, 2012). Security is becoming an increasingly important facet of global society. However, many technological aspects enable the protection of citizens and state from organized crime, natural calamities, and terrorism (European Nanotechnology Gateway, 20 07). Nevertheless, there are various concepts of technology that enable crime, security, and policing (McQuade, 2011). As seen herein, the effects of technology on civil security are diverse. Indeed, criminals use technology to access mystery story government files, launch viral attacks to secret systems, create advanced missiles, and launch missile attacks, and counteracting security and policing procedures. As such, the use of technology by the criminals has led to convoluted criminal activities, unmanageable security threats to the society. On the other hand, the federal government adopts a security theme that seeks to develop technologies that will build significant emf to guarantee the security of citizens from terrorism and other forms of crime.Moreover, there is an objective to incorporate technology in European security for purposes of promoting civil security, reducing security gaps, and amend the competitiveness of the European security industry (European Commission, 2 012).Ideally, we can devise technological measures geared towards

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.