Review article - reconnaissance

Assignment Help Software Engineering
Reference no: EM132272778

Need to review this article with references in APA format.

Reconnaissance From my experience in the past it has always appeared as if every encounter or interaction with doing a job or dealing with anyone, there was an area in which I could play in the gray area on my decisions or actions.

The world looks takes ethics and creates a gray area that allows someone to justify their actions. According to Merriam-Webster dictionary, ethics are a set of moral principles that govern a person's behavior or an activity, or it is a consciousness of moral importance.

However, from the Biblical worldview God teaches us throughout His scriptures about ethics and we find that His definition of ethics is absolute. For example, Leviticus 19:18 ESV, "You shall not oppress your neighbor or rob him. The wages of a hired servant shall not remain with you all night until the morning" or Leviticus 19:11 ESV, "You shall not steal; you shall not deal falsely; you shall not lie to one another." God gave us the Decalogue (Ten Commandments) which are the foundation of all our ethics. According to God's words, gathering information on a target without written consent is a sin, thus making it unethical.

That makes you a thief. If consent was not given to perform any type of scanning and it was done anyway, this is not honoring God or representative of His character. It is also important to note that scanning without permission could violate the Computer Fraud and Abuse Act (as amended 1994 and 1996) (Computer Fraud and Abuse Act (CFAA), 2018).

If someone is port scanning to find a device on the network, they could be breaking the ISP's Acceptable Use Policy (AUP) and the administrator does not know what that person's intent is (Legal Isues, n.d.). There may be gray areas in the definition of what is ethical or not when gathering information without consent, but God clearly spells out what is morally right and wrong.

If the question, "Should I do be doing this" ever cross the mind about an action or behavior then whatever it is that is being done is probably wrong. God has given every person a conscience. When the word conscience is broken down, con means with and science means knowledge. Whenever you're leading with your conscience it means that the decision is being made with knowledge.

Every action has a consequence, good or bad. If the state find that someone has acted unethically in accessing another person's computer and gathered information could face penalties up to 10 years in prison.

According to Romans 14:22, each one of us must give an account to what we have done and 2 Corinthians 5:10, God will judge each one of us according to our works, good or evil.

So, it is imperative that we walk in righteousness daily so that we may stay within the law and most importantly, remain in the grace of God. Apart from God, we are just empty shells left to our own devices and we are guaranteed to fail.

References Computer Fraud and Abuse Act (CFAA). (2018). Retrieved from National Association of Criminal Defense Lawyers: Legal Isues. (n.d.). Retrieved from Nmap.

Verified Expert

The assignment needed us to review the article on ethics.The article tells us about how gid treats ethics and the definition of ethics is absolute.We have done the reflection in 300 words along with 2 references.

Reference no: EM132272778

Questions Cloud

Were these ideas entitled to protection under the law : Explain the difference between an implied-in-law (quasi contract) and an implied-in-fact contract. What type of contract was at issue in this case?
What is the purpose of system calls : What is the purpose of system calls, and how do system calls relate to the OS and to the concept of dual-mode (kernel-mode and user-mode) operation?
The prevention of sexual harassment and discrimination : A policy related to the prevention of sexual harassment and discrimination including specific action items that will be required of employees and management.
External clock frequency supplied to the microprocessor : State any other assumptions you make and explain. Hint: Determine the number of bytes that can be transferred per bus cycle.
Review article - reconnaissance : Need to review this article with references in APA format - Reconnaissance - ach one of us must give an account to what we have done and 2 Corinthians 5:10
Describing the particular scenario-event within a game : Each personal essay should include a short summary describing the particular scenario/event within a game you'd like to respond to, and a reflection.
Programming and defensive programming using raptor : Input a number entered by the user and display positive if it is greater than zero,negative if less than zero and zero if it is equal to zero.
Explain the role and function of the agency : Identify at least two significant regulations enforced by each agency relevant to Solar Co.'s business (totaling eight regulations).
Discuss at least five major changes the internet : Do you think the internet services in the U.S. has had major changes in the last decade? Why or why not?

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd