Wednesday, May 6, 2020

Information Technology Ethics Professionals - MyAssignmenthelp.com

Question: Discuss about theInformation Technology Ethicsfor IT Security Professionals. Answer: The Technological Issues that have been Disclosed in the Movie the Italian Job The movie is about a planned robbery that is to be undertaken by a number of actors one of them being Jason Statham who is the professional driver in this movie. The master planners of the big robbery are Donald and Stella Bridger the daughter. The venue of the incident is Vernice and the use of technical expert is involved in order to blow walls by Def an explosion expert in this category with the assistance of Lyle. Ethical issues pertaining use of technology systems for IT security professionals (1). The main actor or the spearheaded of the robbery is killed by one of the compatriots who have selfish motives known as Steve jealous to occupy the gold for him. The use of tracking system is incorporated by hiring an outside party known as Stella who finds where Steve is hiding. Steve kills the potential buyer of the gold who asks a lot of questions about the whereabouts of the gold the money launderer was to but at $35 million dollar. The information technology expert is authorized to read the current documents being used as at that time by the users of the computers (2). The revenge is to be undertaken by Krutong the cousin of Ukrainian Mafia who is ready for anything. Stella has plan to enter Steves premises as a cable woman where she has the intention of loading the gold in three private coopers that have been modified by Wrench Robs friend. Steve is lured by the beauty of Stella and she agrees to take her out where the controversy begins found Charlie another party in the deal believed to be dead. The use of Seth Green Lyless expertise is incorporated to control the traffic lights by Charlie in the intent of hacking into the track with the gold (5). The gold is stolen with the help of three modified coopers. Steve shares the gold with Charlie and the remaining is divided among the members on their way to fulfill their wishes. The use of technology is deemed to facilitate easier communication between the parties in order to plan the deal. The incorporation of the expert ology raises a lot of controversy between the involved parties this emancipation of the scientific contradiction and dishonesty among the robbers. The use of tracking systems where the user is intended to use the location of the site of the gold, the point of interest is the site where the gold is hidden. The individual navigation is incorporated by Stella by use of the network and internet connectivity. The core aspect that enhances tracking to take place is use of the GPS applications that have got a certain criteria for global coverage. The buildings in the region are easily navigated by use of the applications that have got powerful systems and software capable of decoding and transfer of information from one location to another. The radio frequency identification is utilized in the movie to determine the hide point of the thieve Steve who has got the possession of stolen gold. This technology encompasses the electromagnetic waves that facilitate receiving of the signal from the targeting person to the saving location where the activity is being conducted or on the reader that can be easily observed through a software that enhances easier monitoring. The other style of tracking that is usable in the movie and must have been put into use while locating Steve. The real time locating systems which are enabled by the systems of Wireless for the confined areas thus the target must have been hiding (4). The requirement that is supposed to be fulfilled is the system level deployments and the server functionality to be effective with high operating systems. Wrench Robs friend uses the modified coopers to steal gold from the safe by the use of the radiation aspect of technology and magnetizes ends zones to determine the attractive material and nonmagnetic. The technology involves the use of computer software to scan all the materials that are thought of being gold and thus enhancing easier identification. The issues that is being discusses is the counterfeit where the same but not original packet of the gold can be modified and given to the buyer of the gold. The traffic systems are hacked into by using the Seth Green Lyles expertise; this involves diversion of the lights to show different colors to allow interfering with the traffic order of the day. The use of server by the host computer in a location is undertaken in the movie by Charlie. Charlie possess the knowledge of computer scientist and digital analysis helps him to decode the information that only the transport authority are capable of understanding in Italy. The MacBook computer with a processor above 3.22 Hz speed is used to hack into the traffic lights and confuse the rest of the individuals in the transport convoy trying to locate the gold. The use of the database of the high operating system and heavier servers assists in ensuring that the gold is removed from the holder initially deemed to be Stella. The technology issue is that the hacking is illegal since it has been seen to cause a traffic jam at the time of convening the crime intended. The cybercrimes are undertaken by professional hackers who possess the expertise of entering into the security systems of the government or pros of interfering with the private information by use of codes and codecs to transcript the data. The information is sent over a highly secured network that only the host computer from the site can be able to interpret and reverse the action. The issue of incriminating and network accessibility is used to determine the location of the gold by the third party Charlie. The person with the intention of possessing the gold is seen to incorporate higher level machinery to access and possess the entire package by going to an extent of hiring experts such as the information technology and the engineers who are abused to use the skills that have been acquired legally. The use of the computer skills and the cloud computing is violated where the user is hacking the transport to alter the flow and stop the car possessing the riches. The spy who is Jason also has a machinery of relating with the parties by use of the mobile phones and gadgets that assist in communication. The vehicles are modified in order to maneuver the regions where difficulty may arise in case of attack. The bullet proves technology is incorporated in the rear wheels and screens to prevent the attack of the inner tubes of the vehicle. The car that Jason is driving is using a tracking system of GPS that helps in navigation. The direction of the safe house to Steve is determined by the car GPS location point that is highly computerized and programmed in such a way that the maps of the region are inbuilt with the use of internet to locate the Google maps and other content. The privacy of information is compromised (3). Donald is killed who has the detrimental information and the master planner, elimination of the subject in the movie makes the mission to be impossible because of the selfish interests of one of the robbers and the member or the beneficiary to the gold possessions. There is misunderstanding of the scope and this leads to the death of Donald the chief of the robbery who has got the knowledge of the technology to be used such as that in the tracking systems. The counter is experienced as result of the issue of technological expertise lacking in the team by killing of Donald. References 1) D. Shinder, Ethical Issues for IT security professionals, Herman: Parker, 2015. https://www.computerworld.com/article/2557944/security0/ethical-issues-for-it-securityprofessionals. (2)M. Vincent, et al. The information technology expert is authorized to read the current documents being used as at that time by the users of the computers, B. M. New York: Institution of computer pros, 2015, pp.289-315. (3)W. Felix. The privacy of information is compromised: Lowman, Pigeon, 2014. (4)T. Norman. Real time locating systems which are enabled by the systems of Wireless for the confined areas thus the target must have been hiding: Gotham, Parker. (5)W. Martin. The use of Seth Green Lyless expertise is incorporated to control the traffic lights by Charlie in the intent of hacking into the track with the gold. Jape, Reedman.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.