Essay Summary of Information and Communication Technology

One of the biggest problems faced by the Information and Communication Technology (ICT) industry is the threat of hackers and their destructive operations. Many individuals, businesses and government organizations have lost billions of dollars to the activities of hackers.

Hackers have different strategies of operating which keeps changing with the emergence of new technologies. Some hackers dispatch viruses to attack organization servers and personal systems. Such attacks, if successful, could result in the complete collapse of operations and activities of the targeted organizations and individuals.

Other hackers cultivate expertise in forcing unauthorized access into systems. They find their way into sensitive information such as personal bank accounts and corporate financial statements strategic plans. These hackers then either destroy the information or use it for unlawful gains at the cost of the rightful owners.

These nefarious activities of hackers have assumed such as menacing proportions that they have led to the growth of an entire industry dedicated to the protection of systems, networks and data from the threat of hackers.

The field of network, systems and data security is interesting as the challenge is to anticipate every move of the hackers and putting up adequate defenses against them. It involves reading into the perverted and sometimes brilliant minds of individuals who are the criminals of the new digital era. The topic is of concern to everyone who has digital data stored on the World Wide Web or the Internet in one way or the other.

Gamertsfelder., L., 2002, E-commerce: The Implications for the Law, e-Security. Available [Online] http://svc003.bne101v.server-web.com/Upload/PublicationUploads/publication106.pdf. (January 27, 2008)

Gamertsfelder’s thesis statement for this article states that development of network security awareness in an organization works as an effective tool for combating risks against hacker activities.

He argues that all organizations need to be familiar with the consequences of the weaknesses of the security environment in which they operate. This brings about a sense of security consciousness, and a better understanding of how to manage and safeguard networks against hacker attacks. It also leads to better appreciation of the problems faced by the network administrator.

The article assesses the understanding of hackers’ activities both from the insider’s and outsider’s views. Several scenarios depicting the operations of real-life organizations are used to show how awareness of data security risk can aid an organization in strengthening its security shield. Different types of hacker attacks against data, both from the internal and external perspective, are elaborately used by Gamertsfelder to illustrate his argument about advantages of awareness of security lapses.

This article is important as it shows how organizations can take stock of the lapses and breaches in their data security in devising ways to fight hackers.

McGuire, B., L., & Roser, S., N., 2001, What Your business Should Know About Internet Security Akauntan Nasional, April edition, Available [Online] http://domino.mia.org.my/mia/miaWeb.nsf/0/cedaa19385281c1b48256b830029c70b/$FILE/05Apr01(tech).pdf. (February 27, 2008)

McGuire & Roser’s thesis states that a company with a high level of information on how to make use of its internet security stands a lesser risk of website attack than an organization with lesser information.

The article shows how organizations can utilize their websites effectively to curtail the activities of hackers. It also shows how companies who operate websites can identify possible threats and take adequate safeguards to effectively secure their sites. McGuire & Roser gives step-by-step recommendations on how a company can secure its websites against attack.

The article is concise and expresses its points in clear and applicable terms. The article contains significant material for those organizations that seek effective ways of securing their websites and internet operations information from hackers.

Wong, S., 2003, The Evolution of wireless Security in 802.11 networks: WEP, WPA and 802.11 Standards, SANS Institute, Available [Online] http://cnscenter.future.co.kr/resource/hot-topic/wlan/1109.pdf. (February 27, 2008)

In the article Wong argues that the constant evolution of wireless security has ultimately led to the solution of providing security to network connections in the form of the 802.11i wireless security standards.

The article takes a product-based approach in showing the efficacy and solution provided by wireless security to network connections. Wong discusses the insecurity associated with Wired Equivalent Privacy (WEP) which is an interim solution, and how WiFi Protected Access (WAP) provides a lasting solution through the 802.11i standards. The paper shows that an organization can configure its network to provide customized solutions for its network’s privacy and security.

The paper presents a wide range of ICT tools and technologies. It requires a person coached in  and ICT operations and with a vast repertoire of ICT terminologies to fully understand and appreciate the significance of the paper. It is a significant work on solutions for network security.

Scheraga, D., 2005, Hackers: Keep Out Chain Store Age, Volume 81, Issue 10, October, pp. 51

The main contention of Scheraga’s article is that the more a retailer relies on ICT for its daily operations, the more exposed its data is to theft.

The article provides solution-based steps for securing the data of retailers. It also examines the way retailers can manage the challenges in securing data from internal stakeholders to the organization.

The role of the US government legislation on providing insurance to retailers against the activities of hackers activities is emphasized by the article. Scheraga further presents strategic tactics that could be utilized by retailers in ensuring data integrity and minimizing loss and curbing liability. Steps on how to design questions in implementing this strategy are listed in the article.

The article is concise and has a restricted scope in that it renders solutions only to retail operators in IT. The content of the paper is solution-based, and offers significant step-by-step guide for small operators on how to ensure data security.

Writing Quality

Grammar mistakes

F (57%)

Synonyms

A (91%)

Redundant words

D (66%)

Readability

F (30%)

Total mark

D

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyStudyWriters
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Business and administrative studies
looks good thank you
Customer 452773, March 3rd, 2023
FIN571
excellent
Customer 452773, March 15th, 2024
Business and administrative studies
Thanks
Customer 452773, March 3rd, 2023
History
Looks great and appreciate the help.
Customer 452675, April 26th, 2021
FIN571
excellent work
Customer 452773, March 1st, 2024
Human Resources Management (HRM)
excellent job
Customer 452773, June 25th, 2023
Managerial Accounting & Legal Aspects of Business ACC/543
excellent work
Customer 452773, February 7th, 2024
Human Resources Management (HRM)
excellent, great job
Customer 452773, June 19th, 2023
Business and administrative studies
excellent job
Customer 452773, March 12th, 2023
Management
Thank you!!! I received my order in record timing.
Customer 452551, February 9th, 2021
Data 564
excellent work
Customer 452773, April 11th, 2024
Management
Love this writer!!! Great work
Customer 452597, April 5th, 2021
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp