Research the SANS 20 Critical Security Controls.
Choose Control, Limitation and Control of Network Ports, Protocols, and Services.
Discuss the relationship between security controls and risk. What is the importance of specifying priority and sequence?
devices (Li et al., 2006). Evidence shows that the introduction of RFID on products has met criticism in the press with regard to privacy threats because of which retailers hesitate about whether and how to fully launch the technology in areas where it interfaces with consumers. For example, IBM uses RFID tags to track and identify objects, however, the company believes there are privacy concerns in the attachment of these tags as they can be covertly monitored, spoofed, or tampered with (Ibm.com, n.d.). In addition, recognizing customers individually and automatically upon arrival, tracking them through the store, observing their interactions with products and offering them personalized advertisements are all activities which can be realized through RFID, but have the potential to be viewed as privacy intrusive (Farshidi, 2016). DISCUSSION To summarize, this data-centric world has and will continue to negatively impact the ability and freedom of individuals to exercise their freedom of speech and challenge those in power as well as encroaching on people’s privacy (Alex and Fieke, 2018). Therefore, retailers must aim to address the issue relating to the privacy of their customers. This could be done by providing customers with ways to opt-out of in-store tracking in online communications, increasing data security, or tightening limits on how long data can be stored. In addition, there are a number of laws and policies undertaken by both the public and private sectors to address the issue. Countries like UK and India have recently incorporated laws that seek to monitor the threats to privacy of individuals. Furthermore, companies are also taking strict actions against the violation of privacy and seeking to provide more transparency to their customers. For example, recently a federal judge asked Apple to provide reasonable technical assistance and help the FBI unlock an iPhone belonging to a terrorist. Apple declined to help the FBI as this required the company to overhaul the system that disables the iPhone after a few unsuccessful password attempts and once this feature kicked it, all that data on the phone would be inaccessible (Kharpal, 2016). Furthermore, to address the issue of RFID privacy in retail, IBM, developed a system limiting the distance a radio frequency identification (RFID) chip tag can transmit information from retail goods. The Clipped Tag system allowed consumers to disable RFID tags on items after purchase, whilst enabling companies to use the information on the tag to iden>GET ANSWER