The legislative branch enacts legislation

Assignment Help Software Engineering
Reference no: EM131462636

Article

Our job as IT security professionals is to ensure an ethical approach to the safety and integrity of the data. We have been given laws to guide us on the path of ethics.

Laws were crafted to provide an entity the ability to prosecute those that hack them. A problem with the laws is that it also covers the illegal activities of those entities that are being hacked. When the entities go beyond their original scope of intent, their intentions are for selfish gain.

The entities must be put back in check, which is why groups like Anonymous have risen. On Anonymous' website it states, "We always fight for people rights. We want every citizens of the world is equal. We harm anyone at any time who doing wrong things" (anonymoushackers.net, 2017)

The idea of keeping powers in check reminds me of how our nation's founding fathers setup the three branches of government. The three branches are, "The legislative Branch enacts legislation" (usa.gov), while "The executive branch carries out and enforces laws" (usa.gov) and "The judicial branch interprets the meaning of laws" (usa.gov).

They are designed to keep each other in check and prevent one from becoming more power than the other. The integrity of the three controlling government bodies is only as good as the integrity of the members. This can be said of any government of the world. Anonymous is a self-appointed group for unofficial checks and balances for the governments of the world.

I do have reservations about the information Anonymous is presenting to the world, which is the integrity of that evidence. Is it being modified to make it more juicy and enticing? Can power corrupt? The 1st Baron Acton seemed to think so when he said, "Power tends to corrupt, and absolute power corrupts absolutely" (Britannica, 2012).

This does not mean anyone in power is corrupt, it just means that there is a greater chance with the more power they have. God himself has his own system of ethical checks and balances.

Jesus says in Luke 8:17, "For there is nothing hidden that will not be disclosed, and nothing concealed that will not be known or brought out into the open" (NIV, 2011).

References A. Walter James, (May 07, 2012) John Emerich Edward Dalberg Acton, 1st Baron Acton,

Retrieved from https://www.britannica.com USA.Gov, (April 3, 2017),

Retrieved from https://www.usa.gov Anonymous, (2017)

Retrieved from https://www.anonymoushackers.net

Verified Expert

IT security professionals need to maintain the integrity of data. Integrity of data is sheltered when the guarantee of accurateness and dependability of information and system is delivered.

Reference no: EM131462636

Questions Cloud

Problem regarding the conventional treatment : Identify any complementary therapies that might be appropriate or used with conventional treatment.
Implementation of strategic goals : How does an active board of directors affect the implementation of strategic goals
Discuss about the financial costs : The Research Paper you will first submit an abstract of the main points of what you will be covering in your paper.
How can producer justify competing with its own middlemen : Many producers sell to consumers both directly and through middlemen. How can such a producer justify competing with its own middlemen?
The legislative branch enacts legislation : Our job as IT security professionals is to ensure an ethical approach to the safety and integrity of the data. We have been given laws to guide us on the path of ethics.
Most common sexually transmitted diseases : Compare 5 of the most common sexually transmitted diseases (STDs). Include causative agent, signs and symptoms and treatment.
Discuss specific changes in supply and demand : Discuss specific changes in supply and demand within the markets and/or industries you chose to analyze. Examine prior government policies and legislation.
What are the major components of strategic management : What are the major components of strategic management, and why is each component needed for success
Hydroponic production a worthwhile endeavor : Is hydroponic production a worthwhile endeavor for a new grower? Please be thorough with your reasoning and include references.

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd