Information Security and Network Technology Assignment

Added on - Nov 2019

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 4 of 16 pages
Running head: INFORMATION SECURITY AND NETWORK TECHNOLOGYInformation Security and network technologyName of the studentName of the UniversityUnit codeNumber of the AssessmentDue date of the assessmentActual word countStudent number and email idCampus lecturer and Unit CoordinatorAuthor Note
1INFORMATION SECURITY AND NETWORK TECHNOLOGYExecutive summaryThe following report discusses about the various information and network security technologiesavailable in the whole world. The chosen country is Australia. The presence of enhancedtechnologies helps facilitate the efficiency of the business involved and a research was conductedto help analyze these technologies and their risks. Findings indicate that these technologies havea certain risk involved. Thus, it is recommended for the concerned organization to analyze theirneed and implement the risk mitigation processes before adoption.
2INFORMATION SECURITY AND NETWORK TECHNOLOGYTable of Contents1. Introduction:................................................................................................................................32. Discussion:...................................................................................................................................42.1 Definitions:............................................................................................................................42.1.1 Requirements:.................................................................................................................42.1.2 Overview:.......................................................................................................................52.1.3 Information security applications:..................................................................................52.2 Applications of these services:..............................................................................................82.2.1 Hardware authentication:................................................................................................82.2.2 Big data:..........................................................................................................................92.2.3 Cloud computing:...........................................................................................................92.2.4 Disadvantages:..............................................................................................................103. Conclusion:................................................................................................................................104. Recommendations:....................................................................................................................115. References:................................................................................................................................13
3INFORMATION SECURITY AND NETWORK TECHNOLOGY1. Introduction:A common method of enhancing the business processes is to identify the needs and applybetter technologies to help facilitate the enhancement in efficiency of the business involved. Theaim of this report is to find out about the effectiveness of the information and network securityand to find out the risks and threats involved in the application of these technologies. The reportalso discusses the various social or legal concerns with the acceptance of these technologies intothe business. The information and network security not only refers to the attacks by the differentviruses or malware but also includes the promotion of general awareness among the employeesof an organization to ensure the survival of the system. The term information security, network,and computer security are often used in the same way but their differences lie in the methodsused to conduct the processes. This report includes an analysis of the different technologiespresent in the information and network technologies. The basic technologies to be discussed arethe big data, cloud computing and the hardware authentication methods. All these methods willbe clearly depicted along with their implications in the system concerned. The organization thatneeds to actualize these administrations is 5 years of age. It is mainly concerned with theconduction of business applications in the region of data and system security perspectives. Thebusiness customers are essentially arranged in Australia and incorporate small to largeorganizations. The organization takes project to develop small applications or modify thecommercial systems available from other vendors. Moreover, the organization expects to worktogether in different areas of ICT too and in this way tries to actualize alternate branches ininformation and network securities. This will facilitate better business operations and will helpthem to recognize the various aspects of the business in terms of the information and the networksecurity.
Desklib Logo
You are reading a preview
Upload your documents to download or

Become a Desklib member to get access