Monday, December 16, 2019

Information and Communication Technology Free Essays

Spending on information and communications technology in 2005 Information and communications technology or information and communication technology,[1] usually called ICT, is often used as an extended synonym for information technology (IT) but is usually a more general term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), intelligent building management systems and audio-visual systems in modern information technology. ICT consists of all technical means used to handle information and aid communication, including computer and network hardware, communication middleware as well as necessary software. In other words, ICT consists of IT as well as telephony, broadcast media, all types of audio and video processing and transmission and network based control and monitoring functions. We will write a custom essay sample on Information and Communication Technology or any similar topic only for you Order Now The expression was first used in 1997[3] in a report by Dennis Stevenson to the UK government[4] and promoted by the new National Curriculum documents for the UK in 2000. ICT is often used in the context of â€Å"ICT roadmap† to indicate the path that an organization will take with their ICT needs. [5][6] The term ICT is now also used to refer to the merging (convergence) of audio-visual and telephone networks with computer networks through a single cabling or link system. There are large economic incentives (huge cost savings due to elimination of the telephone network) to merge the audio-visual, building management and telephone network with the computer network system using a single unified system of cabling, signal distribution and management. See VOIP and Intelligent Infrastructure Management (IIM). This in turn has spurred the growth of organizations with the term ICT in their names to indicate their specialization in the process of merging the different network systems. How to cite Information and Communication Technology, Essay examples Information and Communication Technology Free Essays One of the biggest problems faced by the Information and Communication Technology (ICT) industry is the threat of hackers and their destructive operations. Many individuals, businesses and government organizations have lost billions of dollars to the activities of hackers. Hackers have different strategies of operating which keeps changing with the emergence of new technologies. We will write a custom essay sample on Information and Communication Technology or any similar topic only for you Order Now Some hackers dispatch viruses to attack organization servers and personal systems. Such attacks, if successful, could result in the complete collapse of operations and activities of the targeted organizations and individuals. Other hackers cultivate expertise in forcing unauthorized access into systems. They find their way into sensitive information such as personal bank accounts and corporate financial statements strategic plans. These hackers then either destroy the information or use it for unlawful gains at the cost of the rightful owners. These nefarious activities of hackers have assumed such as menacing proportions that they have led to the growth of an entire industry dedicated to the protection of systems, networks and data from the threat of hackers. The field of network, systems and data security is interesting as the challenge is to anticipate every move of the hackers and putting up adequate defenses against them. It involves reading into the perverted and sometimes brilliant minds of individuals who are the criminals of the new digital era. The topic is of concern to everyone who has digital data stored on the World Wide Web or the Internet in one way or the other. Gamertsfelder., L., 2002, E-commerce: The Implications for the Law, e-Security. Available [Online] http://svc003.bne101v.server-web.com/Upload/PublicationUploads/publication106.pdf. (January 27, 2008) Gamertsfelder’s thesis statement for this article states that development of network security awareness in an organization works as an effective tool for combating risks against hacker activities. He argues that all organizations need to be familiar with the consequences of the weaknesses of the security environment in which they operate. This brings about a sense of security consciousness, and a better understanding of how to manage and safeguard networks against hacker attacks. It also leads to better appreciation of the problems faced by the network administrator. The article assesses the understanding of hackers’ activities both from the insider’s and outsider’s views. Several scenarios depicting the operations of real-life organizations are used to show how awareness of data security risk can aid an organization in strengthening its security shield. Different types of hacker attacks against data, both from the internal and external perspective, are elaborately used by Gamertsfelder to illustrate his argument about advantages of awareness of security lapses. This article is important as it shows how organizations can take stock of the lapses and breaches in their data security in devising ways to fight hackers. McGuire, B., L., Roser, S., N., 2001, What Your business Should Know About Internet Security Akauntan Nasional, April edition, Available [Online] http://domino.mia.org.my/mia/miaWeb.nsf/0/cedaa19385281c1b48256b830029c70b/$FILE/05Apr01(tech).pdf. (February 27, 2008) McGuire Roser’s thesis states that a company with a high level of information on how to make use of its internet security stands a lesser risk of website attack than an organization with lesser information. The article shows how organizations can utilize their websites effectively to curtail the activities of hackers. It also shows how companies who operate websites can identify possible threats and take adequate safeguards to effectively secure their sites. McGuire Roser gives step-by-step recommendations on how a company can secure its websites against attack. The article is concise and expresses its points in clear and applicable terms. The article contains significant material for those organizations that seek effective ways of securing their websites and internet operations information from hackers. Wong, S., 2003, The Evolution of wireless Security in 802.11 networks: WEP, WPA and 802.11 Standards, SANS Institute, Available [Online] http://cnscenter.future.co.kr/resource/hot-topic/wlan/1109.pdf. (February 27, 2008) In the article Wong argues that the constant evolution of wireless security has ultimately led to the solution of providing security to network connections in the form of the 802.11i wireless security standards. The article takes a product-based approach in showing the efficacy and solution provided by wireless security to network connections. Wong discusses the insecurity associated with Wired Equivalent Privacy (WEP) which is an interim solution, and how WiFi Protected Access (WAP) provides a lasting solution through the 802.11i standards. The paper shows that an organization can configure its network to provide customized solutions for its network’s privacy and security. The paper presents a wide range of ICT tools and technologies. It requires a person coached in   and ICT operations and with a vast repertoire of ICT terminologies to fully understand and appreciate the significance of the paper. It is a significant work on solutions for network security. Scheraga, D., 2005, Hackers: Keep Out Chain Store Age, Volume 81, Issue 10, October, pp. 51 The main contention of Scheraga’s article is that the more a retailer relies on ICT for its daily operations, the more exposed its data is to theft. The article provides solution-based steps for securing the data of retailers. It also examines the way retailers can manage the challenges in securing data from internal stakeholders to the organization. The role of the US government legislation on providing insurance to retailers against the activities of hackers activities is emphasized by the article. Scheraga further presents strategic tactics that could be utilized by retailers in ensuring data integrity and minimizing loss and curbing liability. Steps on how to design questions in implementing this strategy are listed in the article. The article is concise and has a restricted scope in that it renders solutions only to retail operators in IT. The content of the paper is solution-based, and offers significant step-by-step guide for small operators on how to ensure data security. How to cite Information and Communication Technology, Papers

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.