logo

Information Security and Network Technology Assignment

16 Pages3815 Words329 Views
   

Added on  2019-11-19

Information Security and Network Technology Assignment

   Added on 2019-11-19

ShareRelated Documents
Running head: INFORMATION SECURITY AND NETWORK TECHNOLOGYInformation Security and network technologyName of the studentName of the UniversityUnit codeNumber of the AssessmentDue date of the assessmentActual word countStudent number and email idCampus lecturer and Unit CoordinatorAuthor Note
Information Security and Network Technology Assignment_1
1INFORMATION SECURITY AND NETWORK TECHNOLOGYExecutive summaryThe following report discusses about the various information and network security technologiesavailable in the whole world. The chosen country is Australia. The presence of enhancedtechnologies helps facilitate the efficiency of the business involved and a research was conductedto help analyze these technologies and their risks. Findings indicate that these technologies havea certain risk involved. Thus, it is recommended for the concerned organization to analyze theirneed and implement the risk mitigation processes before adoption.
Information Security and Network Technology Assignment_2
2INFORMATION SECURITY AND NETWORK TECHNOLOGYTable of Contents1. Introduction:................................................................................................................................32. Discussion:...................................................................................................................................42.1 Definitions:............................................................................................................................42.1.1 Requirements:.................................................................................................................42.1.2 Overview:.......................................................................................................................52.1.3 Information security applications:..................................................................................52.2 Applications of these services:..............................................................................................82.2.1 Hardware authentication:................................................................................................82.2.2 Big data:..........................................................................................................................92.2.3 Cloud computing:...........................................................................................................92.2.4 Disadvantages:..............................................................................................................103. Conclusion:................................................................................................................................104. Recommendations:....................................................................................................................115. References:................................................................................................................................13
Information Security and Network Technology Assignment_3
3INFORMATION SECURITY AND NETWORK TECHNOLOGY1. Introduction:A common method of enhancing the business processes is to identify the needs and applybetter technologies to help facilitate the enhancement in efficiency of the business involved. Theaim of this report is to find out about the effectiveness of the information and network securityand to find out the risks and threats involved in the application of these technologies. The reportalso discusses the various social or legal concerns with the acceptance of these technologies intothe business. The information and network security not only refers to the attacks by the differentviruses or malware but also includes the promotion of general awareness among the employeesof an organization to ensure the survival of the system. The term information security, network,and computer security are often used in the same way but their differences lie in the methodsused to conduct the processes. This report includes an analysis of the different technologiespresent in the information and network technologies. The basic technologies to be discussed arethe big data, cloud computing and the hardware authentication methods. All these methods willbe clearly depicted along with their implications in the system concerned. The organization thatneeds to actualize these administrations is 5 years of age. It is mainly concerned with theconduction of business applications in the region of data and system security perspectives. Thebusiness customers are essentially arranged in Australia and incorporate small to largeorganizations. The organization takes project to develop small applications or modify thecommercial systems available from other vendors. Moreover, the organization expects to worktogether in different areas of ICT too and in this way tries to actualize alternate branches ininformation and network securities. This will facilitate better business operations and will helpthem to recognize the various aspects of the business in terms of the information and the networksecurity.
Information Security and Network Technology Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security in Cloud Computing
|9
|1943
|57

Cyber Security – Challenges and Solutions
|13
|3663
|313

Security Threats in Cloud Computing and Preventive Measures
|16
|3755
|361

Privacy and Security Issues with Big Data: Challenges and Solutions
|17
|7279
|285

Cybersecurity: BYOD Risk Assessment, Certificate-based Authentication, Anti-phishing Guideline
|10
|2414
|209

Information Technology and Risk Assessment Report
|10
|2137
|431