COLLEGE OF ORGANIZATION, ECONOMICS AND MANAGEMENT
PROGRAMME: BSc Accounting TRAINING COURSE NAME: Supervision Information Systems (BBA 230) STUDENT NUMBER: AFIN 10205
STUDENT BRAND: Gary Sinyangwe ASSIGNMENT: Two (1)
LECTURER: Mr. Holly Sinkala DUE DATE: 22 April 2014
UNILUS 2014 Introduction
On this time and age, we have witnessed the breakthrough of electronic resources as the utmost important development of the modern day time communication program. Technologies including cellular phones, residence computers, the internet and websites have added another aspect to the approach we live our lives today. This presentation seeks to cope with and examine the adverse and positive aspects in view of the development of computers and telecommunications techniques as follows: First of all, it raises understanding with regard to the new age of offences, termed as internet crimes. The paper centers, in particular, for the difference involving the two prevalent types of cyber crimes, cyber battle and cyber terrorism. Subsequently, the daily news examines the limitations and effects of having graduates through e-learning. Thirdly not only that, the daily news discusses upon whether pc practitioners ought to be required to have got a practicing license as it is with other experts such as doctors, lawyers and teachers.
1 . (a) Difference Between Cyber Conflict and Internet Terrorism
The outcome of both equally cyber war and internet terrorism is definitely the same, to damage important infrastructures and computer systems. The major difference being cyber war is released by government authorities whereas cyber terrorism is definitely launched by individuals or maybe a group of people. Cyber conflict, often required for conjunction with traditional military attacks, is usually an prepared attack by simply one region against one other nation's info and conversation systems with an purpose of gaining a benefit over the foe by disrupting their capacity to fight back. Internet war problems often focuses on an opponents systems just like command and control devices, intelligence collection and division, information finalizing and circulation, tactical communication, troop and weapons placement and so on. For instance, when the United states invaded Iraq, they disrupted the country's communication and defence devices, crippling their ability to get and remove US aircrafts. On the other hand, cyber terrorism is definitely when people or terrorist groups make use of computers, laptop networks as well as the internet against persons or perhaps property to intimidate or perhaps coerce federal government, civilians, world in order to reach political, faith based or ideological agenda. The things that are targeted are engine power systems, mobile phone systems, vehicles systems, water or essential oil pipelines, financial institutions and so on. ([online] Available at: community. mis. forehead. edu/mis2901001вЂ¦[Accessed 5 Apr 2014]) Cyber terrorism takes many forms. Significant popular is usually to threaten a huge bank. The terrorist hacks into the bank's system after which leave an encrypted message for senior directors strenuous for a amount of money. If the traditional bank does not interact personally, the terrorist threatens to work with anything from logic bombs to electromagnetic pulses and high-emission guns to damage the bank's files. Most banks prefer to pay the bucks than have public understand how vulnerable they may be for anxiety about loss of business. ([online] Offered by: csciwww.etsu.edu/../cases.htm [Accessed six April 2014]) A single practical example is in which banks in Zambia taking an estimated US$4 million to cybercrime through Automated...