Review article - reconnaissance

Assignment Help Software Engineering
Reference no: EM132272778

Need to review this article with references in APA format.

Reconnaissance From my experience in the past it has always appeared as if every encounter or interaction with doing a job or dealing with anyone, there was an area in which I could play in the gray area on my decisions or actions.

The world looks takes ethics and creates a gray area that allows someone to justify their actions. According to Merriam-Webster dictionary, ethics are a set of moral principles that govern a person's behavior or an activity, or it is a consciousness of moral importance.

However, from the Biblical worldview God teaches us throughout His scriptures about ethics and we find that His definition of ethics is absolute. For example, Leviticus 19:18 ESV, "You shall not oppress your neighbor or rob him. The wages of a hired servant shall not remain with you all night until the morning" or Leviticus 19:11 ESV, "You shall not steal; you shall not deal falsely; you shall not lie to one another." God gave us the Decalogue (Ten Commandments) which are the foundation of all our ethics. According to God's words, gathering information on a target without written consent is a sin, thus making it unethical.

That makes you a thief. If consent was not given to perform any type of scanning and it was done anyway, this is not honoring God or representative of His character. It is also important to note that scanning without permission could violate the Computer Fraud and Abuse Act (as amended 1994 and 1996) (Computer Fraud and Abuse Act (CFAA), 2018).

If someone is port scanning to find a device on the network, they could be breaking the ISP's Acceptable Use Policy (AUP) and the administrator does not know what that person's intent is (Legal Isues, n.d.). There may be gray areas in the definition of what is ethical or not when gathering information without consent, but God clearly spells out what is morally right and wrong.

If the question, "Should I do be doing this" ever cross the mind about an action or behavior then whatever it is that is being done is probably wrong. God has given every person a conscience. When the word conscience is broken down, con means with and science means knowledge. Whenever you're leading with your conscience it means that the decision is being made with knowledge.

Every action has a consequence, good or bad. If the state find that someone has acted unethically in accessing another person's computer and gathered information could face penalties up to 10 years in prison.

According to Romans 14:22, each one of us must give an account to what we have done and 2 Corinthians 5:10, God will judge each one of us according to our works, good or evil.

So, it is imperative that we walk in righteousness daily so that we may stay within the law and most importantly, remain in the grace of God. Apart from God, we are just empty shells left to our own devices and we are guaranteed to fail.

References Computer Fraud and Abuse Act (CFAA). (2018). Retrieved from National Association of Criminal Defense Lawyers: Legal Isues. (n.d.). Retrieved from Nmap.

Verified Expert

The assignment needed us to review the article on ethics.The article tells us about how gid treats ethics and the definition of ethics is absolute.We have done the reflection in 300 words along with 2 references.

Reference no: EM132272778

Questions Cloud

Were these ideas entitled to protection under the law : Explain the difference between an implied-in-law (quasi contract) and an implied-in-fact contract. What type of contract was at issue in this case?
What is the purpose of system calls : What is the purpose of system calls, and how do system calls relate to the OS and to the concept of dual-mode (kernel-mode and user-mode) operation?
The prevention of sexual harassment and discrimination : A policy related to the prevention of sexual harassment and discrimination including specific action items that will be required of employees and management.
External clock frequency supplied to the microprocessor : State any other assumptions you make and explain. Hint: Determine the number of bytes that can be transferred per bus cycle.
Review article - reconnaissance : Need to review this article with references in APA format - Reconnaissance - ach one of us must give an account to what we have done and 2 Corinthians 5:10
Describing the particular scenario-event within a game : Each personal essay should include a short summary describing the particular scenario/event within a game you'd like to respond to, and a reflection.
Programming and defensive programming using raptor : Input a number entered by the user and display positive if it is greater than zero,negative if less than zero and zero if it is equal to zero.
Explain the role and function of the agency : Identify at least two significant regulations enforced by each agency relevant to Solar Co.'s business (totaling eight regulations).
Discuss at least five major changes the internet : Do you think the internet services in the U.S. has had major changes in the last decade? Why or why not?

Reviews

Write a Review

Software Engineering Questions & Answers

  Writing and executing an insert statement

Make yourself a student by writing and executing an INSERT statement to insert a row into the STUDENT table with information about you.

  As part of the auditing team in capacity of a digital

as part of the auditing team in capacity of a digital forensics expert your task is to prepare a report explaining the

  Explain deployment of a product are the first steps

The design, development, and deployment of a product are the first steps toward a finished product ready for distribution in the marketplace. The next step is the evaluation of the user experience in order to gather data on the usability of the pr..

  Deisgn flowchart-hierarchy chart and pseudocode for program

Deisgn a flowchart, hierarchy chart, and pseudocode for program to solve following problem: A student borrows $3,000 at the interest rate of 2 percent per month on unpaid balance.

  Draw a flowchart to determine fare

Write an algorithm to find the bus fare based on distance travelled as per the following rates:a. Rs.5.00 for first 2 kms.

  Software management

SOFT337 – Software Management, Demonstrate the  ability to investigate, gather appropriate sources, analyse, evaluate key challenges and discuss future trends within the chosen area of your choice .

  Review that focus on access control

write article review papers in current APA format that focus on security engineering - chapter 4 Access Control from textbook: Textbook: Security Engineering

  Design 10 test cases

Design ten test cases and describe the purpose of each of them. The cause is one to two sentences.

  Develop a python script to pre-process the file

You are to develop a Python script to pre-process the file so that: SSN must be 9 digits; not other character such as - or .

  What is the test case template ieee standard 829

What is the Test Case Template IEEE standard 829? Briefly describe its components. Discuss why it is important that this standard be used for the testing.

  How can experiment and case studies be conducted more easily

How can experiments and case studies be conducted more easily in an industrial setting answering key questions relevant to a specific organization?

  Create a project transition plan

When a project is ready to be deployed, a transition plan can help the transfer of ownership from the project team to the customer or organization that requested the project.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd