Security Fundamentals: A Study Guide

Verified

Added on  2020/04/07

|13
|3434
|45
AI Summary
This solved assignment focuses on core security fundamentals. It examines various aspects like cryptographic principles and network security practices. The provided texts explore topics such as malware analysis, visualization systems for network security, and the impact of ICT on future foresight processes. Students will gain insights into threats, vulnerabilities, and management approaches in different domains, including global seagrass bioregions and smart metering infrastructures.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NETWORK AND INFORMATION SECURITY TECHNOLOGIES
Network and Information Security Technologies
Name of the Student
Name of the University
Author’s note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
Executive Summary
The objective of this report is to give an overview of the methods by which the Australian
organization can expand its business through the application of ICT. This report discusses about
three information and network security applications called Kaspersky Internet Security, Norton
Security and Bitdefender Total Security that can be used for the purpose of expanding the
business as well as automating the business processes. The importance of these applications is
discussed along with their limitations. This report also points out the various security risks as
well as threats of the organization and the need for adopting these applications. This report also
gives four recommendations like adopting encryption strategies, implementing firewalls, regular
backups and use of vendor application for the purpose of expanding and growing the business in
Australia as well as around the globe.
Document Page
2
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
Table of Contents
Introduction..........................................................................................................................3
Information and Network Security......................................................................................3
Information and Network Security Applications in the Current Market.............................4
Expansion of the Organization............................................................................................7
Conclusion...........................................................................................................................8
Recommendations................................................................................................................9
References..........................................................................................................................11
Document Page
3
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
Introduction
In this era of modern technology, ICT is gaining importance with time. The solutions that
are provided by ICT help the organizations to create value (Keller & Heiko, 2014). It has become
very crucial for the businesses to integrate and incorporate ICT in its business plan in order to
achieve success (Day et al., 2012). ICT promotes a good process for managing information.
Several IT projects have failed because the businesses have not been able to incorporate ICT in
its processes and have treated ICT to be separate from business (Vaishnavi & Kuechler, 2015).
There are numerous securities threats associated with ICT. The case study provided here talks
about a small Australian software development firm that wants to expand its business. This
report provides details about the ICT security needs and the security applications that would help
the organization to expand.
This report talks about the network and information security in ICT. This report describes
three such network or information security applications that are currently being used in the
market. It also talks about the success as well as the failure factors of the network or information
security applications. This report gives a brief overview of how these applications will help the
organization to expand. It will point out the advantages and limitations of the applications. This
report also provides recommendations from the entire discussion.
Information and Network Security
The concept of information and network security deals with the protection of information
against any type of unauthorized tampering and access (Shiravi, Shiravi & Ghorbani, 2012).
Every organization is aware of the security and data threats and gives it the topmost priority

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
while implementing any business process. Information security also deals with protecting the
system as well as network from any type of malware and virus attacks. The attacker generally
tries to exploit the weaknesses that exist in the system or network (Skopik et al., 2012). A system
or network can have technological, policy as well as configuration weakness (Luiijf, 2012).
Strong security policies and standards can be implemented in order to overcome or mitigate such
security threats.
Information and Network Security Applications in the Current Market
ICT security threats are increasing at a fast pace. Every organization uses security
applications that can be firewalls, antivirus as well as a system that detects intrusion (Grech et
al., 2012). If the organization uses appropriate technologies and applications then it will help the
organization to protect their sensitive information from any type of attack and data loss. Updated
versions of the security applications will help the organization to develop and grow at a fast
pace. It will also help to improve its operational efficiency along with customer satisfaction.
Sensitive information can be encrypted so that it does not get hacked or misused by the attackers
(Stallings & Tahiliani, 2014).There will not be any type of digital assaults by adopting and
incorporating security applications that are appropriate for the organization. The organization can
also use internet protocols and internet policies in order to protect itself from any security or data
risks and threats.
Kaspersky Internet Security can be used by the software development company in
Australia. This protects the computer from any types of known as well as new threats, phishing
attacks, network attacks as well as spam (Gudkova et al., 2013). Several functions as well as
protection components form a part of this application. The protection component is able to
Document Page
5
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
handle any threats. These components are known for providing real-time solutions and
protection. File Anti-Virus is known for preventing any type of virus attacks that takes place in
the files of the computer. It scans all the files that are saved, launched or opened on the system.
Only disinfected and non infected files can be further accessed. The Mail Anti-Virus is
responsible for scanning any type mails that are being sent or received in the computer system.
The IM clients are protected by the IM Anti-Virus. The webcam can also be protected with the
component of Webcam access. Firewall helps to protect the internal network from any external
intrusion. Network monitoring is done by the network monitor. Anti-Spam scans all the email
messages that are received. It also does the function of preventing phishing activity by checking
the URLs. The installation package size is less. All these factors are responsible for the success
of this security application. Some of the challenging factors of this security application are that it
is said to reduce the performance of the computer and it cannot detect any malicious website at a
fast rate. The system speed reduces and also the firewall compatibility also needs improvement
(Verlinde & Verlinde, 2013). But the overall advantages overshadow the disadvantages of this
application and therefore the given organization can implement and incorporate this application.
Bitdefender Total Security is another application that can be used by the organizations in
order to protect the computer system against all types of malware like viruses, Trojans, spyware
as well as internet threats like phishing, spam and hacking attacks (Pavel, 2013). It performs the
functions of on access scanning in order to prevent any type of entry of the malware threats. It
also performs on demand scanning where it detects and removes any malware residing in the
computer system. It provides a real time protection to the network as well as the system.
Bitdefender can also scan the files in the system. Bitdefender can automatically scan the emails
as well as the HTTP traffic in order to protect the computer from downloading infected
Document Page
6
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
documents from the internet. It also improves the responsiveness of the system by scanning new
and modified files. There are functionalities like tracking of the keyboard. There is a component
called keylogger that tracks and records whatever is typed on the keyboard. It also has a
scanning feature that helps it to scan the system during the time of startup. It also has the ability
to scan cookies as well as the memory. There are certain disadvantages of this application as
well, like the process of scanning archives is extremely slow and uses huge amount of resources.
The web traffic scanning process is also a slow process and the system performance is
deteriorated.
Norton Security applications can also be used for the purpose protecting the computer
networks and systems from the advanced threats of this generation. It gives superior security
features along with fast performance (Min et al., 2014). It helps in safeguarding the identity and
protecting sensitive data. Its main advantage over any other application is that it helps the
computer to run at a high speed and perform well. It has the ability to protect computers as well
as other devices from any kinds of security threats (Ciampa, 2012). This application allows the
organization to select which data is to be protected along the with the security level. It also gives
the user the right to select the Internet access level. It gives an automatic generated message or
warning if sensitive information is being sent without any encryption. All the internet
connections are also monitored by this application. Norton Anti-Virus prevents any type of
malware attack like virus, Trojan horses as well as worms. Norton Firewall alerts the system if
there is any kind of intrusion and prevents any types of external attacks (Suh et al., 2014). It also
blocks any type of advertisements on the web. These factors are called the success factors of the
application. There are certain features that are responsible for its failure like it consumes a huge
memory of the system in which it is installed. It is extremely difficult to uninstall the application.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
It cannot be completely removed from the system. The benefits that this application provides are
much more as compared to the limitations. Therefore, the given organization can adopt this
Norton security application.
Expansion of the Organization
The above mentioned applications can be used for the purpose of expanding the business
in the upcoming five years and form many branches within ICT. The information and
communication technology is prone to several types of risks that can harm the operations of the
organization. Some of the risks are as follows:
Malicious Software: It is a type of software that is designed to harm or damage the
computer system (Sikorski & Honig, 2012). Some examples of malwares are viruses, Trojan
horses as well as worms. This type of attack falls under the category of deliberate threats.
Spyware: These programs get installed in the system without letting the users know about
it. They keep a watch on the activities of the system and access the information (Kahate, 2013).
These programs then send the sensitive data to the attacker.
Vulnerabilities: These are faults in the system that can be exploited by the attackers. The
attackers exploit the system in order to damage, steal and block information that is confidential
to the organization.
The above mentioned risks need to be prevented and mitigated so that the organization
does not face any difficulty in developing and expanding its business. The information or
network security applications are no longer an option. The emergence of the security threats has
made the use of security applications as a necessity for all the organizations.
Document Page
8
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
Adopting these applications will provide several benefits to the organizations. The
sensitive information will be safe and secured. The attackers will not be able to hack into the
system or the network and capture the sensitive information of the system. Implementing strong
security policies will help the organization to become well reputed in the industry as well as it
will help to create a global image around the world. The organization will achieve its present
goals of expanding if they adopt security applications (Cardona, Kretschmer & Strobel, 2013).
The organization should not focus on the developing in house security applications. They should
concentrate on purchasing vendor applications. This will help to reduce their cost. The
maintenance of the applications will not be a headache for the organization. The organization
will not need to spend money and time behind the maintenance process (Kotelnikov, 2014). They
can invest their time and money in other operations that will help them to increase the
productivity and generate revenue. The third party vendor will take the responsibility of the
maintenance. The organization would incur huge expense it they had to build their own
applications. The vendors have expertise knowledge and they will solve any type of issue that is
faced by the organization. The disadvantage of buying the applications from the vendors is that
the organization will not have much control over the applications. The organization will become
dependent on the vendors. There can be clash between the organization and the vendors. The
advantages overshadow the disadvantages and therefore the organization must purchase the
information or security applications from the vendors.
Conclusion
It can be concluded from this report that it is extremely essential for the organization to
implement and use information and network security applications. The emergence of information
and communication technology has led to the rise in the level of the security threats. This report
Document Page
9
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
has explained about three such important and useful security applications that can be used by the
organization for the purpose of expanding. The three applications that have been discussed in
this report are Norton Security, Bitdefender Total Security and Kaspersky Internet Security.
Norton Security is known for giving superior security features along with fast performance. It
helps in safeguarding the identity and protecting sensitive data. Bitdefender Total Security is
another application that can be used by the organizations in order to protect the computer system
against all types of malware like viruses, Trojans, spyware as well as internet threats like
phishing, spam and hacking attacks. Kaspersky Internet Security protects the computer from any
types of known as well as new threats, phishing attacks, network attacks as well as spam. It
contains a protection component that is able to handle all types of threats. This report also
explained about the advantages and disadvantages of using these applications. Strong security
policies will help the organization to prevent and mitigate the security risks and threats.
Recommendations
Use of vendor applications: The organization must purchase information and security
applications from the vendors. This will help the company to save the maintenance cost. There
will not be any wastage of time due to maintenance. The vendors will take care of the
maintenance of the applications. The organization will be able to concentrate in other areas and
improve its efficiency as well as productivity. The vendors will have expertise knowledge about
the applications and will give correct advice to the organization regarding any type of problem.
The vendors will also look after the regular updates of the applications.
Backup plan: The organization must have a proper backup strategy for being on the safe
side. The organization must engage in regular backup programs. This will help the firm to retain

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
useful and important information. The backup data must be stored in a different storage location
so that there is no issue regarding loss of information.
Firewall Security: Firewall is considered to be a device that is known for blocking
certain types of traffic over the network. It acts like a barrier or wall between the private and the
public network. The private network is the trusted network and the external or public network is
considered to be the non trusted network. The organization can implement firewall so that there
is no external intrusion into the private or internal network. Firewall implementation can be
either software or hardware. This provides security to the organizations. The firewall has certain
sets of conditions in it. If the conditions are met then the firewall allows the external traffic to
enter the internal network. If the conditions are not met then the firewall will stop the entry of the
external traffic. The organization mentioned in the case study must implement firewalls in order
to expand and grow its business.
Encryption: In the process of encryption, plain texts are converted in the form of cipher
texts. The organization must focus on encrypting the sensitive data so that there is no data breach
or loss in the future. This will help the organization to save and protect the sensitive information
from the unauthorized users.
Document Page
11
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
References
Cardona, M., Kretschmer, T., & Strobel, T. (2013). ICT and productivity: conclusions from the
empirical literature. Information Economics and Policy, 25(3), 109-125.
Ciampa, M. (2012). Security+ guide to network security fundamentals. Cengage Learning.
Day, A., Paquet, S., Scott, N., & Hambley, L. (2012). Perceived information and
communication technology (ICT) demands on employee outcomes: The moderating
effect of organizational ICT support. Journal of Occupational Health
Psychology, 17(4), 473.
Grech, A., Chartrand-Miller, K., Erftemeijer, P., Fonseca, M., McKenzie, L., Rasheed, M., ... &
Coles, R. (2012). A comparison of threats, vulnerabilities and management approaches
in global seagrass bioregions. Environmental Research Letters, 7(2), 024006.
Gudkova, D., Kulikova, T., Kalimanova, K., & Bronnikova, D. (2013). Kaspersky security
bulletin. Spam Evolution.
Kahate, A. (2013). Cryptography and network security. Tata McGraw-Hill Education.
Keller, J., & Heiko, A. (2014). The influence of information and communication technology
(ICT) on future foresight processes—Results from a Delphi survey. Technological
Forecasting and Social Change, 85, 81-92.
Kotelnikov, V. (2014). Small and medium enterprises and ICT.
Luiijf, E. (2012). Understanding cyber threats and vulnerabilities. In Critical Infrastructure
Protection (pp. 52-67). Springer Berlin Heidelberg.
Document Page
12
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
Min, B., Varadharajan, V., Tupakula, U., & Hitchens, M. (2014). Antivirus security: naked
during updates. Software: Practice and Experience, 44(10), 1201-1222.
Pavel, C. (2013). Bitdefender®, the award-winning provider of innovative antivirus
solutions. Romanian Distribution Committee Magazine, 4(1), 20-24.
Shiravi, H., Shiravi, A., & Ghorbani, A. A. (2012). A survey of visualization systems for
network security. IEEE Transactions on visualization and computer graphics, 18(8),
1313-1329.
Sikorski, M., & Honig, A. (2012). Practical malware analysis: the hands-on guide to
dissecting malicious software. no starch press.
Skopik, F., Ma, Z., Bleier, T., & Grüneis, H. (2012). A survey on threats and vulnerabilities in
smart metering infrastructures. International Journal of Smart Grid and Clean
Energy, 1(1), 22-28.
Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: principles and
practice (Vol. 6). London: Pearson.
Suh, M., Park, S. H., Lee, B., & Yang, S. (2014, February). Building firewall over the software-
defined network controller. In Advanced Communication Technology (ICACT), 2014
16th International Conference on (pp. 744-748). IEEE.
Vaishnavi, V. K., & Kuechler, W. (2015). Design science research methods and patterns:
innovating information and communication technology. Crc Press.
Verlinde, E., & Verlinde, H. (2013). Passing through the firewall. arXiv preprint
arXiv:1306.0515.
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]