What Is Information Communication Technology

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Assignment question

ICT security issues and concerns are becoming more prevalent and increasingly complex as the pace of technology implementation continues to accelerate. How this phenomenon has affected the public sector and the private sector in our country. Discuss.

Each e-government project has it’s own version of the framework, where elements within the four components may differ according to the individuals agency’s business or technical needs. List and explain the function of the components.

1.0 Introduction

This century everything is request faster, effective, orderly, even more resources. So the government is developing the technology become high quality, in order to provide online services well for citizen, therefore who has an effective to settle some problems through internet online which related government. Citizen who can settle categories as fees, register the form, make payments. Not only government also has to provide jobs interview, multimedia, knowledge bank, events, new slitter, and magazine therefore these online search for more understand of government.

1,1 Information Communication Technology

ICT which is included the mobile, computer, internet, intranet or devices can communication each others from different places. ICT which very concern regarding the security of data, therefore ICT must build well on the infrastructure.

ICT which can communication to others country, so this may cause the illegal users to hack the servers in whatever time of other users online then theft the data using particular technical

1.2 E-government.

E-government is for serve customer of citizen and that is only through online. E government able to do many things for related with the government.

2.0 what is Information Communication Technology

In the public sector and private sector of ICT (information and communication technology) has many ways to causes the security issues to be damaged. And these public sectors or private sector are too wide therefore any peoples who are possibility to access the government or personal pages and then to damage the security for theft data. The people who damage the security must have learnt the computer literacy and technical, so who will use nowadays prevalent hacking, phishing, scam, theft, worm and etc……

In factor of affected the private sector and public sector, I’ll going explain each of the factors which logically to damages private and public sector security.

2.1 Phishing

This is technical of a scam to cheat users without any attention on the website and Phishing normally is carried out by e-mail directly messages with user. Wherever private sector or public sector during online of email, the Phisher will make quite similar information the users data, such as usernames, website, password and credit card detail to masquerading and attempt to inform user who have problem of data and then ask user to take further to change password, username, even credit card number, once the user changes the data, the Phisher are ready to theft the data during the user typing.

Phishing also had through the advertisement to lure user to click in, same as user click in the malware will automatic theft the user data. Phishing when affected the users information it may lost worthy things and gives user many troubles.

So user should be attention on the link whether is correct of the official link, sometime the link will only different a capital, such as (www.facebook.com) it will changes to (www.facebook.us) the distinguish only the ".com" and ".us", or threat the user who may blocked by a company if who didn’t changes the information immediately, therefore user will lack of awareness and look out then fall into illegal person’s trap.

This picture is an example of phishing by e-mail.

(Annoying 2008)

2.2 Hacking

If a person always engaging related hacking activity, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.

Hack is carrying out to modify data, from the system of original creator without permit. So in the private sector and public sector hacking is quite popular in nowadays. Hacking normally in the computer security field but also had some more other form to hack for an example phone hacking and machine hack.

In nowadays hack also has software downloaded from internet. Hacker consistence applies Trojan Horse put into link, and send to user waiting who click it, then Trojan Horse will tracked the IP Address to break down the user security to get data.

Virus, Exploit, Worm also usually apply by hacker to affect into user’s computer.

About the "virus" is a term of computer machine code instructions inserted into the computer's memory to implementation, virus also able to replication or copies itself into computer programs and other files. Virus it infected into the program that was depend the hacker’s intent, and the virus can be only pure affected user computer inconvenience otherwise to cause serious trouble to the user.

Exploit is software to execute of bug, vulnerability and glitch break into the computer system, components or devices are plugging the computer without aware and unanticipated. Thus this software able to control user’s computer.

Worms is the pure viruses to send copies through a network connection. A bomb lies quietly in the computer memory so out of date or action.

(© 2013 Computer Hope Legal Disclaimer - Privacy Statement ) and (Copyright © 2004–2013 The Rockefeller University)

2.3 Sniffing

Sniffing is a program for hacker to theft the data during the user send through the network. Network data transmit that are included IP address, the data during sent, and the location of the receiver, therefore hacker able to use sniffer program to intercept those data and capture it. When captured the data the hacker are able to access the system or network.

Usually hacker would like to sniff the system which unencrypted password or even usernames. In the private sector or public sector sniffer program is threat of them.

2.4 Spoofing

"Spoof" refers to fraud, to trick or deceive. Therefore, in the IT world, cheating is the deception of a computer system or other computer users. Spoofing usually hide their identity or impersonating masquerading another user identity on the Internet.

Spoofing can be taken in few of different ways on the Internet. One common method is via E-mail. Email cheating involving e-mail from a false e-mail address to send messages to other users or forged. Fortunately, most of the e-mail server security features to prevent unauthorized users from sending mail. However, sender often from their own SMTP, which makes them able to use a false e-mail, addresses to send or spam. Thus, it can receive an e-mail address of the person by who send, but that is not the real address.

Another way is to through deception of IP spoofing on the Internet. This relates to the masking of the IP address of a particular computer system. To hide or disguise your computer's IP address, which is the other system is difficult to determine from the computer to send data. Cheating IP makes difficult to track the transmission source, it is often used in the attacks to denial-of-service server heavy. This may cause the server to crash legitimate demands, unresponsive. Fortunately, has developed a software security system can identify attacks denial of service, and to prevent its transmission.

( Wendy Boswell -2007)

2.5 Pharming

Pharming is another way hackers attempt to manipulate users on the Internet. Although phishing attempts to capture personal information by getting users to visit a fake website, pharming that is redirects users to fake websites without them even knowing it.

Although the normal website using the domain name to an address, the exact location is determined by the IP address. When a user types a domain name into the address field and hits or her web browser input, translates domain names into IP addresses via DNS server. Web browser then connects to the server on this IP address and load data website. After a user visits a particular website, DNS entry for the site that is often stored on a user's computer in the DNS cache. In this way, the computer does not need to keep accessing the DNS server when the user visits the site.

One of the ways that Pharming occurs is through e-mail virus "poison" the DNS cache local users. It does this by changing the DNS entry, or host files. For example, instead of having the IP address 17.254.3.183 continue to www.apple.com, it can direct to other websites which are determined by hackers. Pharmers also can poison entire DNS server, which means that any user who uses a compromised DNS server will be redirected to the wrong website. Fortunately, most of the DNS servers have security features to protect them from such attacks. However, they are not necessarily immune, as hackers continue to find ways to gain access to them.

(June 2007 -Posted by: Margaret Rouse)

2.6 Human error

Problems many times it will happening on human, because who will affected by many things therefore who mistake from the sentiment, healthy, knowledge etc……

In the private and public sector have security issue, the peoples who on duty who is take the big reasonability, because this may who awareness during duty.

So In the private and public sector the data protection are quite important for them, therefore peoples should upgraded themselves to prevent the data reveal out through the systems or company or organization should training employees to be full computer literacy.

2.7 Hardware failure

The hardware failure that is popular affected in private sector and public sector, it will causes the data failure and the hard disk crashed without data properly save. At the below that is nowadays prevalent hardware failure to affected the private and public sector.

Memory Errors: memory error that not popular, but this may happens in the sectors, that happen will cause the data corrupted in the hard disk and couldn’t load the data

System Timing Problems: the access with the memory process doest match at the time, this because the hard disk transfer data too fast therefore this may cause the data loss.

Resource Conflicts: Conflicts resulting from peripherals that attempt to utilize the same interrupt requests, DMA channels or input/output addresses, data may be caused to be corrupted.

Power Loss: The power supply suddenly loss when people using devices to doing their task and cause the data, system, program etc to be lost

(  Charles M. Kozierok 1997-2004 )

3.0 What is Integrated Framework?

In the development Enterprise and application integration framework allows the integration data, thus maximizing enhances the agency's ability to protect the constituents to help increase Operational efficiency. Integration framework can easily share Standardization of information, and automatically generate Notice, and eliminate redundant data entry. Imagine how much time and money will be saved Justice Professionals in the whole process automatically Access to accurate and timely information, the key When dealing with a personal decision. Integration Framework can help achieve these goals along the judicial process. This may lead to the use the automated call for of information services, officials in the investigation the arrest report. It can also make law enforcement. The electronic staff will submit the case to prosecutors learning, and then allow prosecutors to submit electronic court. The same system can also be easily Sheriff of the Court to pass data to assist Remand of the accused, and notification prison.

(Motorola, Inc © 2001)

4.0 What is E-Government ?

The explosive entry of technology into every aspect of life has changed how people live, how they work, how companies do business and how governments serve their people. For the first time since the creation of the modern welfare state, there is now a real opportunity to ‘reinvent’ government. With the help of the big IT vendors, governments are realizing that by applying the same principles and technologies that are fuelling the e-business revolution, they can achieve a similar transformation. the result the emergence of e- Government.

Simply stated, e-government is the use of technology to enhance the access to and delivery of government services to benefit citizens, business partners and employees. It had the power to create a new mode of public service where all public organization delivers a modernized, integrated and seamless service for their citizens. The relationship is no longer just a one way "us versus them" proposition rather, it is about building a partnership between governments and citizens.

Even though most of the excitement centers upon the internet, governments must be aware that e government affected every aspect of how an organization delivers service to the public. It is not just technology; it is not just business process; it is not just human resource. It is all these areas combined. At the centre of it all is the customer.

( RACHEL SILCOCK - 2000)

4.1 People

Part of the goal, focused on the recruitment and retention of qualified. The staff can operate security framework to support and provide goals. For this reason, companies need to invest in training and education activities practitioners to provide the knowledge and expertise needed to design and implement the security requirements of large systems. Today, there are many courses up to university main focus in all aspects of software security, including secure wireless and wired data networking, computer security, encryption, security, database systems, software engineering, security of e-commerce, enterprise safety, operating system and network etc.

In addition, in the field of privacy laws, regulations and standards of knowledge a safety of security is also very important, because the majority of authorities’ regulations directly affect the way software is created, testing and maintenance. For example, ISO / IEC 27000 a series describing the proposed standard definition of information security management system should how to implement, run, monitor, review, and maintain. Another example is the payment card industry data security standards ‡, which is being developed by the major credit card companies such as Visa, MasterCard, American Express and contains guidelines for how to store and process your credit card information.

(Muhd Rosydi Muhammad 2008 )

4.2 Process

Operational framework focused component processes required by business processes. Business process can be defined as a set of activities, directly or indirectly, to provide value to customers. The need to consider the main process can be divided into two categories: process development, and assessment improvement process. From a development perspective, business processes need to be defined how software development should be carried out to ensure that the final product meets safety requirements. This process needs to be solved, such as how to define security requirements, how to design a secure software, how to test for safety.

Evaluate and improve the view, the process should be put in place to determine areas of improvement, which in turn is necessary to determine the valuation measure based. Examples of this process include the identification of safety issues in the early potential of the project life cycle, the development of more effective models for regression testing, etc.

(Muhd Rosydi Muhammad 2008)

4.3 Technology

Security of technology framework and components that can be used by software engineers to design the safety system software. Security software has evolved over the years to become disciplined. There are different algorithms based on the need to protect the application and the required level of security. Technology is also more and more, address security throughout the software development lifecycle. Our goal is early in the software life cycle, not only the safety requirements in the implementation process. Examples of this technology include cases of child abuse and the concept of threat modeling. UML use case-based and abuse cases, including design simulation system attacks case, and design techniques to prevent this attack.

Threat modeling is another method of security analysis software system for assessment and records relating to security risks at the design stage. Popular reason this technology is designed to help security threat models use system design. Ranking based on the severity of the threat and mitigation technologies to deal with this threat.

(Muhd Rosydi Muhammad- 2008)

4.4 Programmed Manager

As a structural logic model project manager need to think through a strategy plan to help explain procedures and program logic model regard management resources, activities and outcomes based on the development of a more clearly management. Logical model used for data collection and evaluation plans, can help detect and monitor the operation of the system, in order to better manage the results. It can be used as the basis for the budget and work plan.

Finally, communication is a powerful communication tool. It can be displayed in the view of stakeholders procedures (activities), it is to achieve (outcomes), emphasizing the relationship between the two.

( Syed. Raza Abbas Shah April 2011)

5.0 Conclusion

The security of the in the ICT should be increase awareness by all user, although the it may not happen on some uses but unfortunately illegal person to aimed at who then it may the big news for warning to other who prevent that is the best way don’t hurt then just afraid

E-government project that is very cautious to execute and build a strong structure in fundament, and the project must for the country benefit.

I can realize the security of the data protection is quite important Question 1 I can know various technical to theft data, and the e government has to focus on the 4 components Process, People, Technology and Program manager.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now