Wednesday, December 19, 2018
'Cyber war Vs Cyber terrorism Essay\r'
'In this duration and era, we conf accustom witnessed the emergence of electronic resources as the most alpha exploitation of the modern day confabulation schema. Technologies a lot(prenominal) as cellular phones, home reckoners, the cyberspace and weavesites throw off added an otherwisewise dimension to the way we live our lives today. This insertion seeks to address and analyse the negative and positive aspects in arrest of the introduction of computing machines and tele intercourse theory techniques as follows: Firstly, it raises awarf argonness with reckon to the modernistic age of crimes, termed as cyber crimes. The paper focexercisings, in character referenceicular, on the distinction between the two familiar types of cyber crimes, cyber war and cyber terrorism. Secondly, the paper examines the limitations and impact of having ammonium alums finished and through e- pick uping. third and lastly, the paper disputees on whether reckoner practitioners sho uld be pick uped to bedevil a practicing license as it is with other non diversionals much(prenominal) as doctors, lawyers and teachers.\r\n1. (a) Difference Between Cyber struggle and Cyber Terrorism\r\nThe end result of both cyber war and cyber terrorism is the alike, to damage critical infrastructures and computer systems. The major difference organism that cyber war is launched by governments whereas cyber terrorism is launched by soulfulnesss or a group of individuals. Cyber war, practic wholey through in juncture with traditional s centenarianiery attacks, is an organised attack by one democracy against a nonher nationââ¬â¢s training and communication systems with an aim of gaining an advantage over the enemy by disrupting their top executive to fight back. Cyber war attacks much targets an enemies systems such as command and control systems, intelligence eitherurement and distribution, discipline processing and distribution, tactical communication, troo p and weapons fix and so on. For instance, when the United States of America invaded Iraq, they disrupted the hoidenishââ¬â¢s communication and defence systems, crippling their ability to find and take down US aircrafts. On the other hand, cyber terrorism is when individuals or terrorist groups use computers, computer net forges and the internet against persons or property to intimidate or coerce government, civilians, society in regulate to come to political, religious or ideological agenda. The things that argon targeted ar power plant systems, telephone systems, transportation systems, piss or oil pipelines, financial institutions and so on. ([online] procurable at: community.mis.temple.edu/mis2901001ââ¬Â¦[Accessed 5 April 2014])\r\nCyber terrorism takes some forms. one and only(a) of the more than popular is to threaten a large-mouthed slang. The terrorist hacks into the bankââ¬â¢s system and then appropriate an encrypted message for senior directors deman ding for a sum of money. If the bank does non cooperate, the terrorist threatens to use anything from logic bombs to electromagnetic pulses and high-emission guns to suppress the bankââ¬â¢s files. Most banks would rather honorarium the money than sacrifice the public know how unprotected they argon for fear of loss of business. ([online] Available at: csciwww.etsu.edu/../cases.htm [Accessed 6 April 2014]) One practical example is where banks in Zambia devour lost an estimated US$4 meg to cybercrime through Automated Teller Machines (ATMs) withdrawals. This was reported in the local Post revolutionaryspaper dated 14 June 2013. This was after the state police discovered a scam in which three foreign criminals had recruited and skilful Zambians in cyber-crime. ([online] Available at: www.postzambia.com/post-readââ¬Â¦article [Accessed 6 April 2014]) Cyber terrorism brush off besides include terrorists acquire secret data from defence files, net mold with other terrorist s, or raise and manage funds for terrorism by hacking. (b)\r\nLimitations and Impact of Having Graduates\r\n Through E-learning E-learning has become an increasingly popular learning approach in high educational institutions due to the fast growth of internet technologies. Many foreign renowned universities offer all types of coursemes ranging from Bachelor, Master and PhD programmes, to Short Courses. Essentially, emerging evidence suggests that having graduates through e-learning has substantial beneficial impact on cordial and economic engenderment of our societies today and includes the following. It has enhanced skills organic evolution to would be graduates and their countries to cope with the demands of the 21st century where rapid change and globalisation is taking place. For instance, graduates have acquired an modify ability to conduct independent research, think critically to solve problems through the use of e- engine room to communicate and collaborate. It has t ouch to an increased trail-age child turnover because of its flexibility and live effectiveness and hence has broadened educational opportunity for many, popicularly financially disadvantaged students and those with disabilities. This has resulted in an increased homosexual resource base and enhanced economic get up from direct job creation in the engine room industry as tumesce as from growth a better educated work force, much needed in developing countries such as Zambia. Online advance promises a innovative regain roadway for millions of students.\r\nThis modern approach of learning facilitates different students at different continents to attend the same sectionalisationes well-nigh at the same condemnation. It has brought about improved learning methods and teachers have a more positive attitude towards their work and ar able to provide personalized learning. On the other hand, although e-learning has brought about many benefits for students and memorial ta blets alike, it in like manner has its limitations. In order to perform the tasks controld by system, an e-learning environment requires basic state of the art equipment and minimum direct of computer skills. Thus, a student that does non have the minimum computer knowledge, or have access to these equipment is disadvantaged and will not follow in an e-learning program. Certain subjects, such as sports and public speaking, require sensual exertion and practice. Thus, they nominatenot be applied in an e-learning environment. Needless to say, it good deal be a serviceable companion to traditional education for teaching soil and skillful information. A victorious e-learning program requires students that are well organised, self motivated and have nifty time management skills. In other words, an e-learning program is directly related to the amount of stew applied.\r\n self-made e-learning students are able to study independently and represent study time into their busy lives. scholarly persons that miss ensure and are not good at time management are disadvantaged and will not succeed. E-learning requires good reading and writing skills. Most activities and communications are compose, and thus, the ability to efficiently interpret operating instructions is a critical skill to a successful e-learning program. Students that are not comfortable with the ability to take themselves through writing will not succeed in e-learning. 2. Are computer practitioners similar complete to other professionals that they should be needful to have a License too? Licensing is not currently required for computer practitioners but is creation considered by several(prenominal)(prenominal)(prenominal) professional computing governing bodys and is believed, in principle, as necessary as the certification and licensing of doctors, lawyers, teachers, hairdressers and other professionals. The question of licensing professionals in general is a very controversial and political question. Licensing generally means that to practice a legitimate profession requires a government licensee, usually administered through a professional organization. The general theory of licensing professional is that it is supposed to help the general public foreign the professional to be assured that just aboutone else is resourceful of doing certain jobs.\r\nFor instance, one of the top e-learning institutions, the University of Liverpool in conjunction with Laureate Online Education offer 41 outmatch learning courses from a wide area of disciplines. The flavor that crystallises through e-learning are perceived not to be as rewarding or valuable as full-time traditional degree has been proved not to be the case. In fact, in the late 1990s, the fictitious character Assurance Agency for Higher Education of the British Government measured academic excellence in more than 100 universities, including the clear-cut University. Surprisingly, the Open University wa s stratified in the top ten of British Universities in terms of academic excellence. The only underlying difference between a traditional degree and e-learning degree is the manner in which information is conveyed. The traditional setup has been based on a compositors case to face communication where students and lecturers are brought together at the same time and the same place in classes, laboratories and recreation centers for the purpose of learning, whereas in e-learning systems use engine room to crystalize the learner from the teacher, and the learner from the learning group musical composition maintaining the integrity of the learning process. Follow up statistics placing the Open University in the top 10 with Oxford and Cambridge have been recurrent for several age and poopnot be statistically be explained as a mere coincidence.\r\n([online] Available at: http.//www.webbasedtraining.com/ [Accessed 3 ring 2014]) The main focus of this instauration is to gain insig hts into critical issues confronting two major stakeholders in the new era of WBT, the student and stave. The question at hand requires objective views on the advantages and disadvantages of WBT from a studentââ¬â¢s point of view as well as advantages of WBT from the collegeââ¬â¢s point of view. It further requires identifying shipway that analyse from a website is better than studying from written text as well as discuss in heads the companionable and economical benefits and limitations of E-technology in Zambia.\r\nSystems learning Life motor motorcycle\r\nThe second part of this presentation discusses a linier Systems Development Life Cycle (SDLC) which is a technique used to assist developers in effect develop information systems. ââ¬ËGaining competitive advantage and improve information delivery will urge an organization to restructure its activities. The information system has to be true to suite the business scenario and objectives. It needs to be cautiously planned and activities well thought of.ââ¬â¢ (Ndhlovu, 2009). Thus, in an effort to answer the question at hand a description of the stages snarly in a SDLC apply annotated diagram shall be discussed. In addition, the discussion shall also include a description of techniques which can be used to investigate the actual system of an organization identifying the advantages and disadvantages of each and also give an alternative to SDLC for developing systems.\r\nHaving said that, details of the mentioned topics in question is as follows. a) Web-Based Training\r\nAdvantages and Disadvantages of WBT: Studentââ¬â¢s even out of sensible horizon Advantages\r\nUtilisation of the World Wide Web is a current and extensive source of information and comparatively easy to use. Some of the advantages from a studentââ¬â¢s point of view include the following. in that respect is unbounded source of information on the internet as compared to textbooks and class lectures as it provides a variety and property of learning materials. Encountering a new experience of sourcing information on the web increases a motivation to learn among students. For example, the web allows browsing from one link to many other on a finicky(prenominal) subject or topic Access to meaningful resources foster critical thinking skills and allows the student to see new ship canal of interpreting and evaluating information. For instance, gathering view points and knowledge from variant internet sites cause students to debate previously held determine and ideas which they may have had misconceptions. Gain of competence with technology by learning to navigate and use the web successfully, apply computer skills, use of conferencing tools such as e-mail and listservs. Integration of technology with content-related work provided a more meaningful interaction with the subject matter.\r\nFor example, students reflected on the lack of relevance in acquiring computer skills in isolation noting that when combined with content, those covers become a tool to improve learning in their field of honor of study. Technological aspects of course assignments encourage cooperative communion rather than isolation. For example, e-mail and listservs are used on a regular basis providing a valuable resource for encourage and collaborationism among classmates for help in completing assignments, support with proficient frustration and to share acquired skills or content resources. In addition, e-mail communication with instructors gives a student individual attention that is not apparent in a traditional coursework setup. E-mail utilization has many assets that personal classroom contact lacks. For example, student need not wait for class time in order to get or clarify a typography of information. The student who would normally shy away and not ask a question in class or participate in a class discussion are more comfortable use e-mail as a medium of communication and thus is not left out on the much needed information. For the student, online course allows them to integrate work, family and school more efficiently as it eliminates travel time to and from class for commuters.\r\nDisadvantages\r\nThe positive aspects of WBT are countered with some frustrations that are experienced by some students. These include the following. Student lack of computer skills, internet server being down, difficulty in accessing computer, use of obsolete computers and lack of technical and instructional support are some of the frustrations that a student may encounter. Required assignments are time consuming as mastering computer application tools and learning to navigate the web efficiently take up most of the time.\r\nAdvantages of WBT: Collegeââ¬â¢s Point of View\r\nHigher education is evolving, consumer needs are shifting, and competition for students is increasing. Consequently, institutions moldiness be driven to some extent by the needs and demands of the consumer . To satisfy the alone(predicate) needs of growing human activitys of nontraditional students and to call graduate degrees more attractive and feasible, the availability of online courses and outperform learning opportunities is essential. Most of the faculties consider technology applications in university courses as the wave of the future citing their main source for wanting its continuity as mainly being the benefits they believe their students receive. Moreover, in this time and era, a faculty member who does not use technology is oftentimes considered out of date and out of touch with skills that are needed for the coming millennium. Faculty respondents consistently set convenience and improved learning as advantages for students enrolled in Web-based instruction. Other advantages identified by faculty are as follows. Students gain knowledge on how to use numerous technology-based applications such as e-mail, PowerPoint, listservs, graphics programs, and HTML, many of wh ich are considered essential skills for todayââ¬â¢s workforce. Students also gain comfort with the medium, anxiety levels are reduced, and they are more willing to explore the probable of technology applications.\r\nStudents tend to become independent learners, are more motivated to explore related topics on their own, and develop critical thinking skills. The quality of faultless assignments is often better than in the traditional classroom because students have more time for reflection and better access to resources. More information can be include in a course with the potential for students to reach out on the information received by providing link up to related sites. Many students will click on a link more readily than seeing a print resource identified in a bibliography. Students learning how to access the extensive resources available on the WWW, online databases, and other technology-based resources. Student convenience. For example, online classes provide students w ith 24-hour access, eliminate the need to travel or find parking, and eliminate programming conflicts with jobs or family. These advantages may particularly benefit graduate students and nontraditional students. Connecting students with technology allows the student to become part of a global community. Information and ideas can be exchanged with other students and experts throughout the world ripening e-mail and listserv discussions. Collaboration and communication among students are fostered, as well as communication between instructor and student.\r\nOnline Studying Vs. pen Text Studying\r\nAmong the several ways that studying from a website is better than studying from written text three distinct ways include the following. Text books become outdated almost immediately after publication and cannot be updated until the bordering publication which may take several years down the line. Information on the website can be updated daily and printing errors are corrected immediate ly. Written text is limited to the information on the page whereas educational websites can link to an infinite number of other educational sites to give supplemental detail in as much as doable on a particular subject or topic. Textbooks are limited to the points of view of their germs whereas the website allows multiple view points, which is essential for critical thinking especially if the author is too vague about a particular topic. ([online] Available at: English.varsavskyfoundation.org/education [Accessed 7 March 2014])\r\nb) Social and Economical Benefits and Limitations of E-technology in Zambia Zambia is one of a number of countries in the Southern African constituent that have sought to include e-technology in its study phylogenesis plans. E-technology is believed to tally to improving development outcomes in two main ways: E-technology-based knowledge and products contribute directly to wealth creation. The use of e-technology contributes indirectly to interior(a ) development through its impact in social and economic sectors such as agriculture, health and education, and by empowering individuals to take advantage of new opportunities. For example, AfriConnect, in federation with the Zambian Ministry of Education, have been piloting a regard aimed at bringing web-based e-learning to schools in different part of the country. The objective is to move from the traditional chalk-and-talk pedagogy to enquiry-based learning, era at the same time bringing the choice of lifelong learning to people who have already left school. Individuals also benefit from the availability and use of e-technology in a number of ways. For example, by subbing phone calls for travel, which saves time and money, and by using e-technology to obtain information on prices, for their own produce and for purchases.\r\nIn these various ways, e-technology can have a meaning(a) impact on a countryââ¬â¢s ability to achieve the Millennium Development Goals (MDGs). There are, however, also constraints on the potential impact of e-technology in many developing countries. These constraints include inadequate technical infrastructure, limited human skills to use available networks and services, the relatively high cost of communications equipment, and poor constitution and regulatory environments. These factors reduce the scope for countries and communities to realise the potential of e-technology for development.\r\nQuestion 2 Solution\r\n(a) Model of the Systems Development Life Cycle highlighting the maintenance PhaseThe systems development life cycle (SDLC) is a conceptual clay sculpture used in project management that describes the stages voluminous in an information system development project, from an initial feasibility study through maintenance of the absolute application. In general, an SDLC methodology follows the following step:\r\n1. supply power point\r\nThe existing system is evaluated. Deficiencies are identified. This can be done by interviewing users of the system and consulting with support personnel.\r\n2. Analysis Stage\r\nThe new system requirements are defined. In particular, the deficiencies in the existing system moldinessiness be addressed with particularised proposals for improvement.\r\n3. Design Stage\r\nThe proposed system is designed. Plans are laid out concerning the animal(prenominal) construction, hardware, operating systems, programming, communications, and security issues. The new system is developed. The new components and programs must be obtained and installed. Users of the system must be trained in its use, and all aspects of performance must be tested. If necessary, adjustments must be made at this stage.\r\n4. Implementation Stage\r\nThe system is put into use. This can be done in various ways. The new system can be phased in, according to application or location, and the old system gradually replaced. In some cases, it may be more cost-efficient to shut down the old system and pass the new system all at once.\r\n5. nutrition Stage\r\nOnce the new system is up and running for a while, it should be exhaustively evaluated. forethought must be unbroken up stringently at all times. Users of the system should be kept up-to-date concerning the latest modifications and procedures.\r\n(b)\r\nThe systems development life cycle (SDLC), also referred to as the application development life-cycle, is a term used in systems engineering, information systems and package engineering to describe a process for planning, creating, testing, and deploying an information system.[1] The systems development life-cycle concept applies to a range of hardware and software configurations, as a system can be composed of hardware only, software only, or a combination of both.[2] The falls typeing is a sequential design process, often used in software development processes, in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of Concepti on, Initiation, Analysis, Design, Construction, Testing, Production/Implementation, and charge.\r\nWhat is systems development life cycle (SDLC)?\r\n(SDLC is also an abbreviation for Synchronous Data Link Control.) The systems development life cycle (SDLC) is a conceptual work used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application. Various SDLC methodologies have been developed to guide the processes involved, including the waterfall model (which was the original SDLC method); rapid application development (RAD); joint application development (JAD); the fountain model; the spiral model; build and fix; and synchronize-and-stabilize. Frequently, several models are combined into some sort of crossbred methodology. Documentation is crucial regardless of the type of model chosen or devised for any application, and is usually done in parallel with the development process. Some methods work better for specific types of projects, but in the net analysis, the most important factor for the success of a project may be how closely the particular plan was followed.\r\nIn general, an SDLC methodology follows the following steps: 6. The existing system is evaluated. Deficiencies are identified. This can be done by interviewing users of the system and consulting with support personnel. 7. The new system requirements are defined. In particular, the deficiencies in the existing system must be addressed with specific proposals for improvement. 8. The proposed system is designed. Plans are laid out concerning the physical construction, hardware, operating systems, programming, communications, and security issues. 9. The new system is developed. The new components and programs must be obtained and installed. Users of the system must be trained in its use, and all aspects of performance must be tested. If necessary, adjustments must be made at this stage. 10. The system is put into use. This can be done in various ways. The new system can phased in, according to application or location, and the old system gradually replaced. In some cases, it may be more cost-effective to shut down the old system and implement the new system all at once. 11. Once the new system is up and running for a while, it should be exhaustively evaluated. Maintenance must be kept up rigorously at all times. Users of the system should be kept up-to-date concerning the latest modifications and procedures.\r\n'
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment