An Overview About Information And Communication Technologies

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Furthermore, these technologies have matured developing into a range of dedicated niche domains such networking, mobile communications, wireless communications, satellite broadcasting and so on. However, alongside benefits and opportunities a broad range of issues and drawbacks have limited to some extent full extraction of benefits from ICT use. One of the main issues with ICT today is security. In the last twenty years the flourishing of a myriad of electronic attacks, malware, vulnerabilities and intrusions in the domain of information and communication technologies this is mainly due to the availability of attacking tools, automation and action at distance. It is worth mentioning also that ICT security issues are not encountered only in the cyber space.

From a research a total of 51 Malaysian government websites were attacked ahead of the deadline set by the Internet vigilante group Anonymous, according to the Malaysian Communications and Multimedia Commision. While the hacking attempts on the MCMC website, www.skmm.gov.my, were mostly unsuccessful, at least 41 of the affected government websites were reported to have suffered from interruption and access loss at varying degrees.

Kaspersky Lab's Director, Global Research and Analysis Team, Costin G. Raiu, expected that the attack will consist of a DDoS flood designed to make the server unreachable. It�s important to have an anti-DDoS plan be it from increasing the Internet bandwidth to purchasing a specific anti-DDoS service plan.A highly sophisticated targeted attack will always succeed this is why there should be mitigation steps but also disaster recovery procedures like backups, server replacement relocation and redundancy

One can even hack a website using SQL injection. SQL stands for Structured Query Language, and it is the language used by most website databases. SQL Injection is a technique used by hackers to add their own SQL to one�s site SQL to gain access to confidential information or to change or delete the data that keeps your website running. This is just one form of SQL Injection attack that allows a hacker to log in as an administrator even if the hacker doesn't know the password.

There are many things that one should keep in mind to prevent websites from being hacked. Keep the website scripts up to date; running old versions of software may lead to vulnerabilities which will cause the website to be insecure. All data input on a website such as contact forms or data based driven pages must be sanitized to prevent SQL injection attacks. There are commands to �sanitize data� that basically ensures that the data that is there is the data that is suppose to be there.

Secure hosting and ftp passwords. Passwords should be at least 10 digits long and contain random numbers, capitals and non-capital letters. If hackers are able to crack the password, they will be able to change things and put viruses on the site. Limit who has access to hosting, Site admin & ftp. It is best to only limit access to the admin, however if necessary, allow only one or two other people access.

Limit the number of CMS add-ons or plug-ins that install. Only install plug-ins that are absolutely needed because every plug-in has its vulnerabilities. Be cautious when installing third-party programs and scripts. Read through the code and look for unusual signs like third-party URLs and special characters. Check the access logs regularly and watch for abnormal traffic on the site. If people are paying a visit the website, they are most likely there to hack. For instance.

For people who put email addresses on their site, make sure to store the email in a proper format. This is an easy way to avoid spam emails sent from spammers. Find website security software that does more than just scan for viruses. Use one that can lock the site down and defend against hacker attacks.

Question 2

E-government implementation may meet initial citizen resistance, require development expenses, and present certain implementation issues. Domestic and international impacts of e-government implementation are substantial. International impacts include cultural and social adaptation issues, transborder data flow issues, and the potential for the development of a global digital divide.

An implementation framework is designed to guide and manage the execution of the E-Government strategy. This framework is an adaptation of Accenture�s Business Integration Framework and can be broken down into four main components:

� Programme Management

� Technology

� Process

� People

Each E-government project has its own version of the framework, where elements within the four components may differ according to the individual agency�s business or technical needs.

Programme Management

The programme management component is critical in ensuring that the development of the E-Government flagship as a whole is coordinated, timely and meets its objectives. A Programme Management group in MAMPU provides management, guidance and advisory services to project teams as well as ensures the application of common standards and guidelines across all projects. Such common standards and guidelines include systems design and testing, graphical user interface, business process reengineering, transition planning, security, benefit capture and many more.

Each application or project within E-Government is headed by a lead agency, which wears the Project Manager�s hat and has its own Project Management Team. While the ownership of the project lies with the lead agencies, as custodian of the E-Government flagship, MAMPU assist by providing consultancy and project management services.

In business today organizations deal with multiple projects simultaneously with shared or overlapping possessions, often in diverse geographical locations. Today's traditional project management methodologies and techniques do not know the certainty of organizational structures and workplace priorities, nor do they influence the potential benefits that ensue from multi-skilled and multi-location teams. Programme management is a technique that lets organizations to run various, related projects concurrently to get significant benefits from them as a group.

Technology

The Technology component addresses the implementation of new emerging technologies in the government environment: finding the right technology that supports the new processes, as well as providing information and tools that support the users. The elements in this component are important enough to warrant further.

It can also demote to the collection of such tools, including machinery, modifications, schedule and procedures.

Technologies significantly influence human as well as other animal species' ability to control and become accustomed to their natural environments.

The term can either be functional normally or to explicit areas: examples include construction technology, medical technology, and information technology.

The human variety use of technology began with the conversion of natural resources into simple tools. The pre-historical detection of the capability to control fire amplified the available sources of food and the discovery of the wheel helped humans in travelling in and controlling their environment. Recent technological developments, including the printing press, the telephone, and the Internet, have pointed physical barriers to communication and allowed humans to interact generously on a global scale. However, not all technology has been used for peaceful purposes; the development of weapons of ever-increasing destructive power has progressed throughout history, from clubs to nuclear weapons.

Technology has affected society and its surroundings in a number of ways. In many societies, technology has helped develop more advanced economies and has allowed the rise of a leisure class. Many technological processes produce unwanted by-products, known as pollution, and deplete natural resources, to the detriment of the Earth and its environment. Various implementations of technology influence the values of a society and new technology often raises new ethical questions. Examples include the rise of the notion of efficiency in terms of human productivity, a term originally applied only to machines, and the challenge of traditional norms.

Philosophical debates have arisen over the present and future use of technology in society, with disagreements over whether technology improves the human condition or worsens it. Neo-Luddism, anarchon-primitivism, and similar movements criticise the pervasiveness of technology in the modern world, opining that it harms the environment and alienates people; proponents of ideologies such as trans humanism and techno-progressivism view continued technological progress as beneficial to society and the human condition. Indeed, until recently, it was believed that the development of technology was restricted only to human beings, but recent scientific studies indicate that other primates and certain dolphin communities have developed simple tools and learned to pass their knowledge to other generations.

Process

The Process component looks for opportunities where government processes can be improved, reengineered or redesigned, taking away the traditional functional boundaries. Processes are the operating business standards and procedures needed to meet the business objectives of the programme. Collectively, these elements will guide and bring the organization to its desired state.

In business process definition, frameworks and reference models help support process analysis, design, and modeling activities. Starting with a process framework or reference model accelerates these activities by giving professionals a basis on which to build. At best-practice organizations, the adopted framework is generally well reviewed and supported by a consulting firm, standards body, or industry association such as APQC (the PCF), Supply Chain Council (the SCOR� model), or the Telecommunications Forum (eTOM). The cost of not using a process framework is the time it would take the process definition team to develop their own process model and obtain consensus from the various stakeholders about the processes included within it.

People

The final component is People, often thought to be the most important. This component encapsulates all the people-related elements that will ensure the succeed in embracing and sustaining E-Government. Such initiatives include clearly communicating goals and objectives of E-Government and the respective pilot projects, early and often, as well as demonstrating their benefits. Two variables, Change and Human Resources, have the biggest impact on human performance.

This framework may be used to support and guide our thinking in relation to workforce management and strategic workforce planning; recruitment, promotion and mobility; induction and orientation; performance management; learning and development; and individual career planning.

The framework is not intended to be inflexible or prescriptive; rather it should be used as a resource to guide and inform our people strategies. For those roles that have additional people capability requirements, this framework will need to be read in conjunction with those specific technical documents or qualifications relevant to the function or work area.

In particular, the framework:

� provides a checklist of important issues and sketches out the way these link to each other;

� draws attention to core influences and processes; and

� emphasizes the multiple interactions between the various factors which affect livelihoods.

The framework is centered on people. It does not work in a linear manner and does not try to present a model of reality. Its aim is to help stakeholders with different perspectives to engage in structured and coherent debate about the many factors that affect livelihoods, their relative importance and the way in which they interact. This, in turn, should help in the identification of appropriate entry points for support of livelihoods.

Conclusion

On question 1 we discuss about the ICT security issues and concerns nowadays on private sector and also government sector. We also has came through some website that has been hacked in our country, follow the steps that mentioned above to prevent one�s website from getting hacked.

On question 2 we discuss the elements within the four components. It is also may differ according to the individuals agency�s business or technical needs. The function of the components has been list and explained.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now