The movie is about a planned robbery that is to be undertaken by a number of actors one of them being Jason Statham who is the professional driver in this movie. The master planners of the big robbery are Donald and Stella Bridger the daughter. The venue of the incident is Vernice and the use of technical expert is involved in order to blow walls by Def an explosion expert in this category with the assistance of Lyle. Ethical issues pertaining use of technology systems for IT security professionals (1).
The main actor or the spearheaded of the robbery is killed by one of the compatriots who have selfish motives known as Steve jealous to occupy the gold for him. The use of tracking system is incorporated by hiring an outside party known as Stella who finds where Steve is hiding. Steve kills the potential buyer of the gold who asks a lot of questions about the whereabouts of the gold the money launderer was to but at $35 million dollar. The information technology expert is authorized to read the current documents being used as at that time by the users of the computers (2).
The revenge is to be undertaken by Krutong the cousin of Ukrainian Mafia who is ready for anything. Stella has plan to enter Steve’s premises as a cable woman where she has the intention of loading the gold in three private coopers that have been modified by Wrench Rob’s friend. Steve is lured by the beauty of Stella and she agrees to take her out where the controversy begins found Charlie another party in the deal believed to be dead. The use of Seth Green Lyles’s expertise is incorporated to control the traffic lights by Charlie in the intent of hacking into the track with the gold (5).
The gold is stolen with the help of three modified coopers. Steve shares the gold with Charlie and the remaining is divided among the members on their way to fulfill their wishes.
The use of technology is deemed to facilitate easier communication between the parties in order to plan the deal. The incorporation of the expert ology raises a lot of controversy between the involved parties this emancipation of the scientific contradiction and dishonesty among the robbers.
The use of tracking systems where the user is intended to use the location of the site of the gold, the point of interest is the site where the gold is hidden. The individual navigation is incorporated by Stella by use of the network and internet connectivity. The core aspect that enhances tracking to take place is use of the GPS applications that have got a certain criteria for global coverage.
The buildings in the region are easily navigated by use of the applications that have got powerful systems and software capable of decoding and transfer of information from one location to another. The radio frequency identification is utilized in the movie to determine the hide point of the thieve Steve who has got the possession of stolen gold. This technology encompasses the electromagnetic waves that facilitate receiving of the signal from the targeting person to the saving location where the activity is being conducted or on the reader that can be easily observed through a software that enhances easier monitoring. The other style of tracking that is usable in the movie and must have been put into use while locating Steve. The real time locating systems which are enabled by the systems of Wireless for the confined areas thus the target must have been hiding (4).
The requirement that is supposed to be fulfilled is the system level deployments and the server functionality to be effective with high operating systems.
Wrench Rob’s friend uses the modified cooper’s to steal gold from the safe by the use of the radiation aspect of technology and magnetizes ends zones to determine the attractive material and nonmagnetic. The technology involves the use of computer software to scan all the materials that are thought of being gold and thus enhancing easier identification. The issues that is being discusses is the counterfeit where the same but not original packet of the gold can be modified and given to the buyer of the gold.
The traffic systems are hacked into by using the Seth Green Lyle’s expertise; this involves diversion of the lights to show different colors to allow interfering with the traffic order of the day. The use of server by the host computer in a location is undertaken in the movie by Charlie. Charlie possess the knowledge of computer scientist and digital analysis helps him to decode the information that only the transport authority are capable of understanding in Italy. The MacBook computer with a processor above 3.22 Hz speed is used to hack into the traffic lights and confuse the rest of the individuals in the transport convoy trying to locate the gold. The use of the database of the high operating system and heavier servers assists in ensuring that the gold is removed from the holder initially deemed to be Stella.
The technology issue is that the hacking is illegal since it has been seen to cause a traffic jam at the time of convening the crime intended. The cybercrimes are undertaken by professional hackers who possess the expertise of entering into the security systems of the government or pros of interfering with the private information by use of codes and codecs to transcript the data. The information is sent over a highly secured network that only the host computer from the site can be able to interpret and reverse the action. The issue of incriminating and network accessibility is used to determine the location of the gold by the third party Charlie. The person with the intention of possessing the gold is seen to incorporate higher level machinery to access and possess the entire package by going to an extent of hiring experts such as the information technology and the engineers who are abused to use the skills that have been acquired legally. The use of the computer skills and the cloud computing is violated where the user is hacking the transport to alter the flow and stop the car possessing the riches.
The spy who is Jason also has a machinery of relating with the parties by use of the mobile phones and gadgets that assist in communication. The vehicles are modified in order to maneuver the regions where difficulty may arise in case of attack. The bullet proves technology is incorporated in the rear wheels and screens to prevent the attack of the inner tubes of the vehicle. The car that Jason is driving is using a tracking system of GPS that helps in navigation. The direction of the safe house to Steve is determined by the car GPS location point that is highly computerized and programmed in such a way that the maps of the region are inbuilt with the use of internet to locate the Google maps and other content. The privacy of information is compromised (3).
Donald is killed who has the detrimental information and the master planner, elimination of the subject in the movie makes the mission to be impossible because of the selfish interests of one of the robbers and the member or the beneficiary to the gold possessions. There is misunderstanding of the scope and this leads to the death of Donald the chief of the robbery who has got the knowledge of the technology to be used such as that in the tracking systems. The counter is experienced as result of the issue of technological expertise lacking in the team by killing of Donald.
1) D. Shinder, ‘Ethical Issues for IT security professionals’, Herman: Parker, 2015.
(2)M. Vincent, et al. The information technology expert is authorized to read the current documents being used as at that time by the users of the computers, B. M. New York: Institution of computer pros, 2015, pp.289-315.
(3)W. Felix. The privacy of information is compromised: Lowman, Pigeon, 2014.
(4)T. Norman. Real time locating systems which are enabled by the systems of Wireless for the confined areas thus the target must have been hiding: Gotham, Parker.
(5)W. Martin. The use of Seth Green Lyles’s expertise is incorporated to control the traffic lights by Charlie in the intent of hacking into the track with the gold. Jape, Reedman.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Information Technology Ethics: IT Security Professionals . Retrieved from https://myassignmenthelp.com/free-samples/information-technology-ethics-it-security-professionals.
"Information Technology Ethics: IT Security Professionals ." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/information-technology-ethics-it-security-professionals.
My Assignment Help (2018) Information Technology Ethics: IT Security Professionals [Online]. Available from: https://myassignmenthelp.com/free-samples/information-technology-ethics-it-security-professionals
[Accessed 08 April 2020].
My Assignment Help. 'Information Technology Ethics: IT Security Professionals ' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/information-technology-ethics-it-security-professionals> accessed 08 April 2020.
My Assignment Help. Information Technology Ethics: IT Security Professionals [Internet]. My Assignment Help. 2018 [cited 08 April 2020]. Available from: https://myassignmenthelp.com/free-samples/information-technology-ethics-it-security-professionals.
MyAssignmenthelp.com has become one of the leading assignment help provider in New York City and Boston. We provide top class auditing assignment help. Not only auditing, but we also cover more than 100 subjects and our writers deal with all types of assignments with utmost expertise. To make writing process faster and accurate, we have segmented our assignment experts' teams as per their expertise on writing different types of assignments. We guaranteed that students who buy our assignment online get solutions worth their investment.
Answer: Introduction The Shrine of Remembrance is the construction with a soul. Unfastened in 1934, the Shrine is the Victorian state honoring to Australians who helped in worldwide conflicts through the country’s history (Winter, 2009). Encouraged by Classical construction, the Shrine was planned and constructed by experts of the First World War. Well-known for its construction the Shrine provides a multi-layered trip rich in sense and...Read More
Answer: Regional Comprehensive Economic Partnership (RCEP) and Australian Advanced Manufacturing Council. The Trans-Pacific Partnership (TPP) that has now become defunct provided a chance to all strata to make sure that it was deeply involved in the regional alliance framework taking place in the Asia Pacific region and continued with the process of economic integration with its regional counterparts. Therefore it is the geopolitical im...Read More
Answer: Introduction The data analysis is the process through which the data is analyzed in order to draw proper conclusion. The conclusion is drawn by the information contained with the solution of specialized systems and software. The data analytics technologies are broadly used especially in the commercial industries which enables the organizations to make more concerned and appropriate decisions (Abbott et al. 2017). The data a...Read More
Answer: Introduction The organization Property Millionaires is an organization which offers real-estate investment advice and services to the ordinary people along with the various educational seminars that the organization offers to the customers so as to educate them regarding the real-estate business. The primary philosophy which is being used by the organization is the fact that “anybody can become a property millionaire if th...Read More
Answer: Circuit Description The relaxation operational amplifier circuit is very easy to make only with a few components required for it. It is possible to generate an output signal with no visibly applied input signal. In such conditions feedback plays a vital role in order to achieve this. To be particular with positive feedback the oscillator as well as other circuits can be build that can create an output signal in the absence of external i...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Good work. it was on topic base, understandable and relevant. Help me to achieve great mark. Really appreciate.
got assignment completed on time. I had lot of important information and up to the point.
I was so excited to share my experience. I had Peter help me with assignment. He did and exceptional job that I couldn\'t believe it. I got an A+ PERFECT SCORE! ALL i can say is WOW! THANK YOU.
Excellent work from the teacher. I got excellent marks and Assignment help had given the. assignment in the time.