Premium Essay

Limitations Of Vulnerability

Submitted By
Words 2655
Pages 11
Agnieszka Zajewska
PHIL 3249
Professor Lucas
28 April 2015

When I first began to think about vulnerability at the beginning of our semester together, I was convinced that I had a good grasp on the word. As a class we read about the Tuskegee experiments and I knew with certainty that the people involved in these trials were a vulnerable population and had been taken advantage of. Before I was assigned the topic of vulnerability for my class presentation and dived into the readings, it seemed obvious that a clear and concise definition of who is, and is not, considered vulnerable in our population would be made all the more abundantly clear. It was my naive assumption that vulnerability was a science that came with a cohesive checklist. …show more content…
I quickly discovered how vast of a body vulnerable people make up, and how hard it is to ensure that all vulnerable groups are properly represented. When I was reading “The Limitations of ‘Vulnerability’ as a Protection for Human Research Participants” by Levine et al., I was faced with the seemingly endless limits of vulnerability. According to the article, the Belmont Report identifies some vulnerable populations as racial minorities, the economically disadvantaged, the very sick, and the institutionalized. Conversely, the US Code of Federal Regulations avoids providing a definition of vulnerability, instead stating that special protection is provided to those who are vulnerable, citing pregnant women, children, prisoners, and human fetuses as members of the vulnerable population. The article explains that these codes and regulations are direct responses to historical events, such as in the case of the Nuremberg Code, which was used as a response to experiments conducted on unwilling participants in WWII. Conversely, however, the actual U.S regulatory system recognizes a much larger category of vulnerable persons. “In the U.S. regulatory system, vulnerability has been ascribed primarily to the absence of, or presumed diminished, capacity to consent or to dependence based on incarceration… This opens the category of vulnerability to many more groups.” …show more content…
Legally, some standards instilled for the protection of children include that a child cannot provide consent for participation in experimental processes. The idea is that children are factually incapable of fully understanding the effects and repercussions of a study, deeming them too vulnerable to engage in the decision-making process. The dilemma that, hence, arises is that of whether children should be used in the experimentation process at all - a process that would, over time, ease the suffering of many future children. In the consideration of a study that will not benefit the child subject at all, the cost is the potential loss of health (physical or mental) or even life in those children who participate, with the benefit being greater knowledge and grasp on treatments of childhood conditions. This subject is discussed in Richard McCormick’s article titled, “Proxy Consent in the Experimentation Situation”. The true fact of the matter, as discussed in the article, is that child experimentation is an unfortunate necessity that arises from markedly different anatomical and physiological structure of a child versus that of an adult. However, a child’s autonomy must be respected as that of an adult’s, but the question of who should decide for or against the participation of children in research and experimental studies does

Similar Documents

Free Essay

Research Paper

... Jim Chen To: Professor Jim Chen Table Content 2………………………………………………………………………Abstract 3……………………………………………………………………….Introduction 4………………………………………………………………………Scope 4-5……………………………………………………………………Importance of IPS 5-6……………………………………………………………………IPS Challenges 7………………………………………………………………………IPS Sensor 8………………………………………………………………………Limitations and Benefits 8-9……………………………………………………………………Solution 10………………………………………………………………….…Conclusion 11…………………………………………………………………….References ABSTRACT This paper illustrate an Intrusion Prevention System (IPS) which is based on sensors in the Network. These sensors are considered honeypots. The system is designed to offer a lot of possibilities to get the most of information gathered about attackers. The analysis of network based intrusion prevention system process reveals one challenge facing administrator: containing the threats or mitigating the threats in the shortest possible time. Information security is crucial and plays a very important role in designing any high-speed network device on system. Since the present generation of intrusion prevention system has numerous limitations on performance and effectiveness, there should be an alternate solution. In this paper, I will discuss the analysis of the intrusion prevention system sensor process and the challenges administrators face in dealing with threats. This paper will also discuss ways to contain attacks by sensors that have the capability to divert attacks and avoiding...

Words: 2299 - Pages: 10

Premium Essay

Penetration Testing

...testing 2.6 Common tools and applications for peneration testing 7 2.7 Black box testing, grey box testing, Black/grey box testing 2.8 Social engineering testing 7 3. Test Plan 15 3.1 Task 3.1 Reporting 3.1 Schedule 3.2 Limitation of Liability 3.3 End of Testing 3.1 Unanswered Questions 10 3.4 Signatures 8 3.1 Authorization Letter 8 4. Conclusion 11 5. Bibiography 11 Acronyms 22 Appendix A – Test Case Procedures 23 Abstract This document is a proposal with a series of activities undertaken to identify and exploit security vulnerabilities. It helps confirm the effectiveness or ineffectiveness of the security measures that have been implemented. This proposal provides an understanding of penetration testing. It discusses the benefits, the strategies and the mythology of conducting penetration testing. The mythology of penetration testing includes three phases: test preparation, test and test analysis. Key Words: Security Testing, Vulnerability Assessment, Penetration Testing, Web Application Penetration Testing. What is a Penetration test? Penetration tests are a great way to identify vulnerabilities that exists in a system or Network that has an existing security measures in place. A penetration test usually involves the use of attacking methods conducted by trusted individuals that are similarly used by...

Words: 1995 - Pages: 8

Premium Essay

The Pros And Cons Of The Hero Initiative

...The idea of The Hero Initiative stemmed from the Alway’s brand campaign, “#LikeAGirl.” One video that really stood out to me was the one entitled “unstoppable.” Each girl talks of the limitations they feel society has placed on them such limitations that were mentioned included: “Not supposed to be proud of myself,” “Submissive,” “Incompetent” and “Overly Emotional.” One little girl, probably about 10 years old, stood out to me in particular. When asked what she felt her limitations were as a girl, she responded with, “I can’t rescue anybody. It’s always the boy who rescue the girls in the stories.” This brought me to question how many other girls felt this way. The “#LikeAGirl” campaign states that 72% of girls feel that society limits them. This is an unimpressive static for the year 2016-2017. I hope that my platform will help play a role in encouraging the female population in Oklahoma feel more empowered in their day to day lives. The Hero initiative is designed to encourage and empower other females through each other’s history and experiences. I plan to share my story of falling in love at 17, and my first heartbreak with the girls in surrounding elementary, middle, and high schools in Oklahoma to encourage them to be their own independent human, and that they don’t need a boy to be their hero at this point in their lives. It is found...

Words: 486 - Pages: 2

Premium Essay

Computer and Technology

...Security testing Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements. Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Security testing as a term has a number of different meanings and can be completed in a number of different ways. As such a Security Taxonomy helps us to understand these different approaches and meanings by providing a base level to work from. Confidentiality A security measure which protects against the disclosure of information to parties other than the intended recipient is by no means the only way of ensuring the security. Integrity A measure intended to allow the receiver to determine that the information provided by a system is correct. Integrity schemes often use some of the same underlying technologies as confidentiality schemes, but they usually involve adding information to a communication, to form the basis of an algorithmic check, rather than the encoding all of the communication. Authentication This might involve confirming...

Words: 844 - Pages: 4

Free Essay

Vulnerability Asses Vulnerability Assessment System Penetration and Analysis Testingsment System Penetration and Analysis Testing

...| Vulnerability Assessment System Penetration and Analysis Testing | |Memo | Internal Penetration Testing Tool and Purchase | | | | With the recent attack/hack on agency's network town police department authorities came to a decision to conduct a complete assessment on network vulnerabilities. The main goal of this memo is to assess or evaluate the network penetration tools available in the market. Compare the tools. Cost to buy and implement these tools internally. Hire a professional service to evaluate these tools. In this memo we will cover the internal implementation at high level. In the market there are many penetration tools like a. Nmap - Worlds Best Port Scanner b. Nessus - Vulnerability Scanner c. Metasploit - Exploit framework For testing Vulnerabilities I picked the above three mentioned tools which are widely used in many organizations and would be perfect for this scenario. The penetration tools that could be used to conduct a vulnerability analysis are; Nmap and Nessus which provide a number of penetration testing techniques such as port scanning, Credentialed and uncredentialed scans, enumeration, patch...

Words: 1156 - Pages: 5

Premium Essay

Stereotype Threats

...the stereotype threat condition nevertheless levels of arousal are still a factor and in order to get accurate and better statistics research should find a way to reduce such arousal. Also when women identify themselves without other social identities they tend to perform a lot better. They suggest that the stereotype vulnerable participants should be in more align with their identities. It is very clear that when using stereotype lift it can decrease the effect of stereotype threat. In simple words by lifting the stereotype threat the math performance will be a lot better. There are some limitations they faced one of them was just the small sample size. Also the participants were not asked what they were majoring in. they also got participant females from a university that was consequently smarted which meant that they couldn’t necessarily generalize to the population. Another limitation was taking the full range of mediators and other...

Words: 965 - Pages: 4

Premium Essay

Vulnerability

...conduct vulnerability assessments is of the upmost importance if a company or organization has information that is confidential or vital in nature. The need to conduct penetration testing should be an ongoing task for organizations as new technologies emerge. Even with security measures in place hackers continue to find ways around the roadblocks which are put in place to secure our networks. Just this month alone the Federal Bureau of Investigation’s network was compromised as a hacker was able to penetrate the emails of one of the organization’s special agents (Brito, 2012). The FBI has some of the most sophisticated computer security measures in place known to man and if their systems can be hacked I assure you that no one is safe. In order to properly examine a computer network for vulnerabilities a company’s information systems manager needs to determine whether such testing can be completed in house or should be outsourced to a penetration testing contractor. It is my belief that penetration testing is best left to contractors whose sole function is in conducting these types of tests, as they are better equipped with the tools and knowledge needed to get an accurate overview of a business network. However, penetration testing should be completed periodically by a business internal IT staff as they can apply updates to prevent vulnerabilities throughout the year and can assist a third party vendor in getting the best snapshot of a network’s vulnerabilities. Take...

Words: 1998 - Pages: 8

Premium Essay

Gathering Information Pertaining to a Glba Compliance

...Lab#5 Define a process for Gathering Information pertaining to a GLBA Compliance 1. GLBA repealed parts of an act. Name the act and explain why it was significant for financial institutions and insurance companies. Parts of the glass Steagall act of 1933 GLBA allows financial institutions such as banks to act as insurance companies. GLBA covers both financial institutions and insurance companies since both can perform financial services for its customers. This reform requires banks and insurance companies to comply with both the privacy and safeguard rules of GLBA. 2. What is another name for obtaining information under false pretenses and what does it have to do with GLBA? What is an example of the safeguard pertinent to this requirement? Pre-texting or social engineering. GLBA specifically mentions this in title 15 US code chapter 94 sub chapter 2, section 6821. GLBA encourages companies to implement safeguards around pre-texting and social engineering. Security awareness training and periodic reminders of awareness to pre-texting and social engineering is a best practice performed within the user domain. 3. How does GLBA impact information system security and the need for information systems security practitioners and professionals? The safeguards rule within GLBA requires financial institutions and insurance companies to develop security plan detailing how they will protect their customers nonpublic personal information. The safeguards rule impacts the security...

Words: 1267 - Pages: 6

Premium Essay

E Comemec

...merce and e-business has limitations Ignoring those limitations can cause problems because a company may have expectations that cannot be met, and therefore think the website is "not working" . WTGR .... Limitations of e-Commerce (e-Business) - you should understand some of the limitations and be able to explain these to a potential client because not everyone is convinced the internet will be a major way to conduct business - example TV has been around for a long time - but only a small percentage of all companies advertize on TV !! - radio - some very successful companies, like Sleep Country Canada advertise on radio KEY POINTS Schneider uses the term "Disadvantages" but we can interpret this to mean the same thing as "limitations" . WTGR . o Technical Limitations o Non-Technical Limitations o Technical Limitations costs of a technological solution some protocols are not standardized around the world reliability for certain processes insufficient telecommunications bandwidth software tools are not fixed but constantly evolving (ie. Netscape 3,4,4.7,4.75 etc.) integrating digital and non-digital sales and production information access limitations of dial-up, cable, ISDN, wireless some vendors require certain software to show features on their pages, which is not common in the standard browser used by the majority Difficulty in integrating...

Words: 394 - Pages: 2

Premium Essay

Vulnerability Management Policy

...Vulnerability Management Policy Purpose The purpose of this policy is to increase the security posture of IHS systems and mitigate threats posed by vulnerabilities within all IHS-owned or leased systems and applications. Scope This policy applies to all IHS employees, contractors, vendors and agents with access to any part of IHS networks and systems. This policy applies to remote access connections used to do work from a remote location, including reading or sending email and viewing intranet web resources. Policy 1. Approved Scanning Tools 1.1 There are numerous, tools that can provide insight into the vulnerabilities on a system. Not all scanning tools have the same set of features. The CSO shall be the sole entity to implement an enterprise...

Words: 1400 - Pages: 6

Free Essay

Sql Injection

...injection attacks, an attacker could thus obtain and/or modify confidential/sensitive information. An attacker could even use a SQL injection vulnerability as a rudimentary IP/Port scanner of the internal corporate network. Several papers in literature have proposed ways to prevent SQL injection attacks in the application layer by examining dynamic SQL query semantics at runtime. Although researchers and practitioners have proposed various methods to address the SQL injection problem, current approaches either fail to address the full scope of the problem or have limitations that prevent their use and adoption. Despite these risks an incredible number of systems on the internet are still susceptible to this form of attack.Many researchers and practitioners are familiar with only a subset of the wide range of techniques available to attackers who are trying to take advantage of SQL injection vulnerabilities. As a consequence, many solutions proposed in the literature address only some of the issues related to SQL injection. Not only is it a threat easily instigated, it is also a threat that, with a little common-sense and forethought, can be almost totally prevented.Over ten years have passed since a famous hacker coined the term “SQL injection” and it is still considered one of the major application threats. A lot has been said on this vulnerability, but not...

Words: 363 - Pages: 2

Premium Essay

Tft2 Task 4

...TFT2 Cyber Law Task 4 Jordan Dombrowski Western Governors University Situation Report It has come to my attention from the security analysts of VL Bank and victims that commercial customers of VL Bank have been involved in identity theft and fraud. Multiple user accounts were created without authorization claiming the identity of our customers. These fake accounts were used to make twenty-nine transfers of $10,000 each, equaling $290,000. The bank transfers were being sent to several U.S. bank accounts of unknown individuals. The U.S. banks involved in the transfers were Bank A in California, Bank B in New York, Bank C in Texas, and Bank D in Florida. After the funds were transferred to one of these banks, the funds were automatically transferred to several international bank accounts located in Romania, Thailand, Moldavia, and China. After further analysis we discovered that the banks affected customers all used computers infected with a keystroke logger virus that collected usernames, passwords, account numbers, personal identification numbers, URL addresses, and digital certificates. The computers infected did not have an anti-virus or security software of any type installed. Additionally, these customers have reported that they have been frequently experiencing spear phishing attacks, which is most likely the way that the keylogging virus software was installed. Finally we concluded that our banks systems have not been breached and no customer data has been...

Words: 3994 - Pages: 16

Premium Essay

Frailty In Adulthood

...known as one of geriatric syndromes. Frailty in older adults is a multidimensional and multidetermined experience, characterized by the vulnerability to biopsychosicial and environment stressors, the musculoskeletal system declination, and motor system dysfunction that results in functional impairment and adverse health outcomes or death. The antecedence of frail in older adults are intricate and interfere with the interrelationship between individual and environment context, such as personal characteristics, individual behaviors, social and culture, and environment and policy. Thus, using the ecological model will provide better understand frailty in older adults (Figure1); the model will discuss as follow: According to an ecology model on personal characteristics dimension, the strong predictor for functional limitation in older adults is personal characteristics which are personal factors including biological and physiology. As per personal factors, a number of study reveal that personal characteristics related to frailty are including age,...

Words: 577 - Pages: 3

Premium Essay

Persuasion

...persuasion theory, are ways to acknowledge and understand how the nature of persuasion may apply in a person’s personal and professional life. Therefore, to reform and gradually make intentional or unintentional progress being consistent, measured to maintain growth in a person’s personal or professional life as a benefit. Gaining personal enjoyment, academic pursuits, and professional advancement. This may include understanding techniques of force to reflect social influence which may occur through the human history of genre timeless stories, identification, value systems, and moral decision making. Managing or making modification to the mindset, behaviors, or attitude through to discipline vulnerabilities, enhance perseverance, and purpose through interest to reduce the divergence of limitations when socially influenced. It subconsciously intuitive ways to persuade others to envision a person’s point of view as their way to achieve personal and professional goals, fulfillment, and a desired outcome of their life. The measures and force of persuasion and how may be interpreted of perceived by definition, contributing factors, or a different ways persuasion may be applied as a positive or negative aspect in today’s...

Words: 578 - Pages: 3

Premium Essay

Vulnerability-Assessment

...Page 1 Chapter 1 Vulnerability Assessment Solutions in this Chapter: I What Is a Vulnerability Assessment? I Automated Assessments I Two Approaches I Realistic Expectations Summary Solutions Fast Track Frequently Asked Questions 1 285_NSS_01.qxd 2 8/10/04 10:40 AM Page 2 Chapter 1 • Vulnerability Assessment Introduction In the war zone that is the modern Internet, manually reviewing each networked system for security flaws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack. Each technical advance brings wave after wave of security holes. A new protocol might result in dozens of actual implementations, each of which could contain exploitable programming errors. Logic errors, vendor-installed backdoors, and default configurations plague everything from modern operating systems to the simplest print server.Yesterday’s viruses seem positively tame compared to the highly optimized Internet worms that continuously assault every system attached to the global Internet. To combat these attacks, a network administrator needs the appropriate tools and knowledge to identify vulnerable systems and resolve their security problems before they can be exploited. One of the most powerful tools available today is the vulnerability assessment, and this...

Words: 9203 - Pages: 37