country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Information Technology Ethics: IT Security Professionals

tag 0 Download6 Pages / 1,446 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the Information Technology Ethics for IT Security Professionals.

 

Answer:

The Technological Issues that have been Disclosed in the Movie the Italian Job

The movie is about a planned robbery that is to be undertaken by a number of actors one of them being Jason Statham who is the professional driver in this movie. The master planners of the big robbery are Donald and Stella Bridger the daughter. The venue of the incident is Vernice  and the use of technical expert is involved in order to blow walls by Def an explosion expert in this category with the assistance of Lyle. Ethical issues pertaining use of technology systems for IT security professionals (1).

The main actor or the spearheaded of the robbery is killed by one of the compatriots who have selfish motives known as Steve jealous to occupy the gold for him. The use of tracking system is incorporated by hiring an outside party known as Stella who finds where Steve is hiding. Steve kills the potential buyer of the gold who asks a lot of questions about the whereabouts of the gold the money launderer was to but at $35 million dollar. The information technology expert is authorized to read the current documents being used as at that time by the users of the computers (2).

The revenge is to be undertaken by Krutong the cousin of Ukrainian Mafia who is ready for anything. Stella has plan to enter Steve’s premises as a cable woman where she has the intention of loading the gold in three private coopers that have been modified by Wrench Rob’s friend. Steve is lured by the beauty of Stella and she agrees to take her out where the controversy begins found Charlie another party in the deal believed to be dead. The use of Seth Green Lyles’s expertise is incorporated to control the traffic lights by Charlie in the intent of hacking into the track with the gold (5).

The gold is stolen with the help of three modified coopers. Steve shares the gold with Charlie and the remaining is divided among the members on their way to fulfill their wishes.

The use of technology is deemed to facilitate easier communication between the parties in order to plan the deal. The incorporation of the expert ology raises a lot of controversy between the involved parties this emancipation of the scientific contradiction and dishonesty among the robbers.

The use of tracking systems where the user is intended to use the location of the site of the gold, the point of interest is the site where the gold is hidden. The individual navigation is incorporated by Stella by use of the network and internet connectivity. The core aspect that enhances tracking to take place is use of the GPS applications that have got a certain criteria for global coverage.

The buildings in the region are easily navigated by use of the applications that have got powerful systems and software capable of decoding and transfer of information from one location to another. The radio frequency identification is utilized in the movie to determine the hide point of the thieve Steve who has got the possession of stolen gold. This technology encompasses the electromagnetic waves that facilitate receiving of the signal from the targeting person to the saving location where the activity is being conducted or on the reader that can be easily observed through a software that enhances easier monitoring. The other style of tracking that is usable in the movie and must have been put into use while locating Steve. The real time locating systems which are enabled by the systems of Wireless for the confined areas thus the target must have been hiding (4).

The requirement that is supposed to be fulfilled is the system level deployments and the server functionality to be effective with high operating systems.

 

Wrench Rob’s friend uses the modified cooper’s to steal gold from the safe by the use of the radiation aspect of technology and magnetizes ends zones to determine the attractive material and nonmagnetic. The technology involves the use of computer software to scan all the materials that are thought of being gold and thus enhancing easier identification. The issues that is being discusses is the counterfeit where the same but not original packet of the gold can be modified and given to the buyer of the gold.

The traffic systems are hacked into by using the Seth Green Lyle’s expertise; this involves diversion of the lights to show different colors to allow interfering with the traffic order of the day. The use of server by the host computer in a location is undertaken in the movie by Charlie. Charlie possess the knowledge of computer scientist and digital analysis helps him to decode the information that only the transport authority are capable of understanding in Italy. The MacBook computer with a processor above 3.22 Hz speed is used to hack into the traffic lights and confuse the rest of the individuals in the transport convoy trying to locate the gold. The use of the database of the high operating system and heavier servers assists in ensuring that the gold is removed from the holder initially deemed to be Stella.

The technology issue is that the hacking is illegal since it has been seen to cause a traffic jam at the time of convening the crime intended. The cybercrimes are undertaken by professional hackers who possess the expertise of entering into the security systems of the government or pros of interfering with the private information by use of codes and codecs to transcript the data. The information is sent over a highly secured network that only the host computer from the site can be able to interpret and reverse the action. The issue of incriminating and network accessibility is used to determine the location of the gold by the third party Charlie. The person with the intention of possessing the gold is seen to incorporate higher level machinery to access and possess the entire package by going to an extent of hiring experts such as the information technology and the engineers who are abused to use the skills that have been acquired legally. The use of the computer skills and the cloud computing is violated where the user is hacking the transport to alter the flow and stop the car possessing the riches.

The spy who is Jason also has a machinery of relating with the parties by use of the mobile phones and gadgets that assist in communication. The vehicles are modified in order to maneuver the regions where difficulty may arise in case of attack. The bullet proves technology is incorporated in the rear wheels and screens to prevent the attack of the inner tubes of the vehicle. The car that Jason is driving is using a tracking system of GPS that helps in navigation. The direction of the safe house to Steve is determined by the car GPS location point that is highly computerized and programmed in such a way that the maps of the region are inbuilt with the use of internet to locate the Google maps and other content. The privacy of information is compromised (3).

Donald is killed who has the detrimental information and the master planner, elimination of the subject in the movie makes the mission to be impossible because of the selfish interests of one of the robbers and the member or the beneficiary to the gold possessions. There is misunderstanding of the scope and this leads to the death of Donald the chief of the robbery who has got the knowledge of the technology to be used such as that in the tracking systems. The counter is experienced as result of the issue of technological expertise lacking in the team by killing of Donald.

 

References

1) D. Shinder, ‘Ethical Issues for IT security professionals’, Herman: Parker, 2015.

https://www.computerworld.com/article/2557944/security0/ethical-issues-for-it-securityprofessionals.

(2)M. Vincent, et al. The information technology expert is authorized to read the current documents being used as at that time by the users of the computers, B. M.  New York: Institution of computer pros, 2015, pp.289-315.

(3)W. Felix. The privacy of information is compromised: Lowman, Pigeon, 2014.

(4)T. Norman. Real time locating systems which are enabled by the systems of Wireless for the confined areas thus the target must have been hiding: Gotham, Parker.

(5)W. Martin. The use of Seth Green Lyles’s expertise is incorporated to control the traffic lights by Charlie in the intent of hacking into the track with the gold. Jape, Reedman.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Information Technology Ethics: IT Security Professionals . Retrieved from https://myassignmenthelp.com/free-samples/information-technology-ethics-it-security-professionals.

"Information Technology Ethics: IT Security Professionals ." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/information-technology-ethics-it-security-professionals.

My Assignment Help (2018) Information Technology Ethics: IT Security Professionals [Online]. Available from: https://myassignmenthelp.com/free-samples/information-technology-ethics-it-security-professionals
[Accessed 05 August 2020].

My Assignment Help. 'Information Technology Ethics: IT Security Professionals ' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/information-technology-ethics-it-security-professionals> accessed 05 August 2020.

My Assignment Help. Information Technology Ethics: IT Security Professionals [Internet]. My Assignment Help. 2018 [cited 05 August 2020]. Available from: https://myassignmenthelp.com/free-samples/information-technology-ethics-it-security-professionals.


MyAssignmenthelp.com has become one of the leading assignment help provider in New York City and Boston. We provide top class auditing assignment help. Not only auditing, but we also cover more than 100 subjects and our writers deal with all types of assignments with utmost expertise. To make writing process faster and accurate, we have segmented our assignment experts' teams as per their expertise on writing different types of assignments. We guaranteed that students who buy our assignment online get solutions worth their investment.

Latest Management Samples

HOS803 Sustainable Tourism Development

Download : 0 | Pages : 5

Answer: Annotated bibliography 1. This article aims at examining the impact on sustainable tourism due to the hotel industry by using variables such as positive cultural and social factors alongside negative ecological and economic-cantered impacts. The study is based on sustainable tourism development in Jordan's Aqaba hotels where 44 items containing 170 questionaries were conducted to verify the research hypothesis. T-Test, sample regress...

Read More arrow Tags: Australia Sydney 9 Sustainable Tourism Development Other 

HI6008 Assignment 2 Requirements

Download : 0 | Pages : 14
  • Course Code: HI6008
  • University: Holmes Colleges
  • Country: Australia

Answer: Introduction This research report relies on the topic ‘advantages and disadvantages of outsourcing the business functions. This report discusses the data collection method and different approaches that will be undertaken by a researcher to attain the research objectives. Outsourcing is used as a procedure in which the organization transfers their business functions to other corporation to perform these functions by paying a char...

Read More arrow

SIT772 Database And Information Retrieval1

Download : 0 | Pages : 3

Answer: The three selected topics are; Science Computer vision Search Engine Document for each topic Search engine –DOC1 The Union of Concerned Scientists puts rigorous, independent science to work to solve our planet's most pressing problems Computer vision- DOC2 Computer vision systems are implemented in a wide range of industrial and scientific applications Search Engine – (DOC3) Com...

Read More arrow

HI5002 Finance For Business For Governance Structure Of K2Fly Limited

Download : 0 | Pages : 6

Answer: Introduction and company description: This report depicts about the valuation and the worth of the K2Fly limited. This company is managing its business through Australian market. For evaluating the worth of the company, various financial evaluation and analysis techniques have been used. Firstly, the ownership of the company has been evaluated and in addition, the study has been conducted over the stock price, financial statement and th...

Read More arrow

HI5002 Finance For Business For Governance Structure Of K2Fly Limited

Download : 0 | Pages : 6

Answer: Introduction and company description: This report depicts about the valuation and the worth of the K2Fly limited. This company is managing its business through Australian market. For evaluating the worth of the company, various financial evaluation and analysis techniques have been used. Firstly, the ownership of the company has been evaluated and in addition, the study has been conducted over the stock price, financial statement and th...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,377,905

Orders

4.9/5

Overall Rating

5,085

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1758 Order Completed

99% Response Time

William Martinez

MS in Biology

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2115 Order Completed

97% Response Time

Kimberley Chen

MPA in Accounting

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

453 Order Completed

98% Response Time

Howard Asuncion

LLM in Criminal Law

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Awesome work. Awesome response time. Very thorough & clear. Love the results I get with MAH!

flag

User Id: 383727 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

Work was done in a timely manner took it through grammarly checked for plagiarism very well satisfied

flag

User Id: 463334 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

Great work for the short notice given. Thank you for never disappointing and helping out.

flag

User Id: 194216 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

I received a full point on the assignment. Thank you for all the help with the assignment.

flag

User Id: 411395 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?