Thursday, December 5, 2019
Rational Argument ICT professionalism
Question: Describe about the ICT professionalism? Answer: Introduction Cyber crime is such kind of criminal activities which are carried out by the internet or computer. From the last few decades internet has been introduced as a development in technical infrastructure in the field of information and communication technologies (ICT). In consequences of the globalization, the demand for the internet is emerging in day by day. The latest developing technologies are widely used in different areas such as, in military services, transportation infrastructures, cars, industrial infrastructure, building, and electronic instruments, logistics and several kinds of internet related products and services. The information and communication technologies also includes several kinds of services like different types of telecommunication technologies such as WIMAX technology, different services like e- commerce, e- applications, e-health, e-mail, e-education and other electronic services. Cyber crime is one of the prime issues of information and communication technology . The cyber crime mainly includes several kinds of crimes such as spreading of the malware or viruses, different types of distributed denial services (DDoS) or hacking attacks (Hynson, 2012). Various kinds of the offensive activities that can disrupt the computer from different network resources can be defined as the cyber crime. For instance, hacking of the email account is such kind of crime activities which lies on the cyber crime activity. Cyber Crime can be broadly classified into two different types such as the several kinds of interaction into the computer networks such as hacking and the disturbance of the various functionalities related to the computers and the network space such as attacks of the viruses. Step 1: The cyber crime can cause large economic harm which can disrupt the normal flow of the system in the economic scale and has impacts on the economic factor. The below map showcases the argument map; The cyber crime may be related to the issues of the viruses which can disrupt the normal flow of the system but in some cases it is not related to the cyber crime. Then below diagram showcases the argument map of the logic. Hacking is associated with the cyber crime in specifically, ethical hacking is not related to the cyber crime but non ethical hacking is related to the cyber crime. Network space may be affected by the cyber crime which is widely used for carrying out the information and data and may be affected by the different carriers of the cyber crime (McIntosh, 2003). The cyber crime may be related with the different kinds of personal data of the system (Stringer, 2008). Hackers can hack the different personal information for ethical reason but non ethical hackers also can hack for the personal data from system which is illegal. Step 2: The cyber crime can cause large economic harm which can disrupt the normal flow of the system in large economic scale and can cause the large impacts on the various economic factors. Cyber crime is such kind of crime which is related to different types of computing system with the help of interment services. Economic factors are such kind of factors with can reduce the overall GDP of the nation. Cyber crime may have several kinds of impacts on the economical factors. Different types of personal data and information may be hacked which can impact on the economical factors of the nation. Various types of cyber crimes which have impacts on the economical factors are hacking of a personal bank, hacking of the various information and others. So, it can be noted that the cyber crime can cause large economic harm (McIntosh, 2003). The cyber crime is related to the virus. The virus may be different types such as malware, spyware, Trojan viruses which are used for hacking the various types of personal information of the system. The information and data should be secured, the criminal can hack the various personal information for different types criminal activities. The viruses are injected to the system for sharing the various personal information which is illegal so, it can be concluded from the above discussion that the cyber crime may be related to the issues of the viruses. Hacking is strongly associated with cyber crime (Hynson, 2012). Hacking can be broadly classified into two types such as ethical hacking and the non ethical hacking. The ethical hacking is carried out for various types of ethical reason but non ethical hacking is illegal and which is related to the different types of crimes with the help of cyber crime. Different types of un-ethical hacking may hamper the various personal data and information. Network space is used for carrying out the signal information or data. The network space includes several kinds of components by which the carrier signals are generated such as router, hub and other connections. The network space may be affected by the cyber crime which causes the sharing of the personal data and information that is illegal. The account hacking is a kind of network space issue which is related to the cyber crime. The criminal may target the specific account for hacking with the help of network space such as the signal generated to the systems of the user. So, it can be concluded from the above discussion that Network space may be affected by the cyber crime (Bansal, 2003). The cyber crime may be related with the different kinds of personal data of the system. Different kinds of ethical hackers can hack the different types of accounts for gathering information for ethical reason but some unethical hackers hacks the several kinds of accounts information without informing the person, which is illegal. In some cases hacking is needed for gathering different information about the person so, it can understood from the above discussion that The cyber crime may be related with the different kinds of personal data of the system. Conclusion and recommendations The entire topic depicts the cyber crime issues related to the information and communication technologies. The overall report has been classified into four parts such as introduction, argument mapping, and analysis of the mapping, the overall conclusion of the easy and recommendation. The step 1 describes the argument mapping which have been analyzed in the step 2 of the essay. The five issues have been considered for mapping of the arguments. The argumentative analyses for different issues have been described in the step 2 parts. Cyber crime should be minimized with the help of different governmental policies and regulations. The data can be protected with the help of the policy named cyber surveillance. Individual data privacy is needed for preventing the cyber crime from different sources. References Bansal, S. (2003).Cyber crime. New Delhi: A.P.H. Pub. Chowbe, V. An Introduction to Cyber Crime: General Considerations.SSRN Journal. doi:10.2139/ssrn.1766234 Gerdes, L. (2009).Cyber crime. Detroit: Greenhaven Press. Goel, H. (2007).Cyber crime. New Delhi, India: Rajat Publications. Grant-Adamson, A. (2003).Cyber crime. Broomall, PA: Mason Crest Publishers. Hynson, C. (2012).Cyber crime. Mankato, Minn.: Smart Apple Media. Kirti, S. Cyber Crime.SSRN Journal. doi:10.2139/ssrn.2103758 Marcum, C.Cyber crime. McIntosh, N. (2003).Cyber crime. Chicago, IL: Raintree. Panwar, A. Cyber Crime Through Social Engineering.SSRN Journal. doi:10.2139/ssrn.2386521 Perumal, S. Impact of Cyber Crime on Virtual Banking.SSRN Journal. doi:10.2139/ssrn.1289190 Stringer, R. (2008). Six months of cyber-crime.Infosecurity,5(5), 11. doi:10.1016/s1754-4548(08)70074-3 Suri, R., Chhabra, T. (2003).Cyber crime. New Delhi: Pentagon. Wykes, M. (2007). Constructing crime: Culture, stalking, celebrity and cyber.Crime, Media, Culture,3(2), 158-174. doi:10.1177/1741659007078541
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.