logo

Assignment Network and Information Security Technologies

13 Pages3434 Words45 Views
   

Added on  2020-04-07

Assignment Network and Information Security Technologies

   Added on 2020-04-07

ShareRelated Documents
Running head: NETWORK AND INFORMATION SECURITY TECHNOLOGIES
Network and Information Security Technologies
Name of the Student
Name of the University
Author’s note
Assignment Network and Information Security Technologies_1
1
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
Executive Summary
The objective of this report is to give an overview of the methods by which the Australian
organization can expand its business through the application of ICT. This report discusses about
three information and network security applications called Kaspersky Internet Security, Norton
Security and Bitdefender Total Security that can be used for the purpose of expanding the
business as well as automating the business processes. The importance of these applications is
discussed along with their limitations. This report also points out the various security risks as
well as threats of the organization and the need for adopting these applications. This report also
gives four recommendations like adopting encryption strategies, implementing firewalls, regular
backups and use of vendor application for the purpose of expanding and growing the business in
Australia as well as around the globe.
Assignment Network and Information Security Technologies_2
2
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
Table of Contents
Introduction..........................................................................................................................3
Information and Network Security......................................................................................3
Information and Network Security Applications in the Current Market.............................4
Expansion of the Organization............................................................................................7
Conclusion...........................................................................................................................8
Recommendations................................................................................................................9
References..........................................................................................................................11
Assignment Network and Information Security Technologies_3
3
NETWORK AND INFORMATION SECURITY TECHNOLOGIES
Introduction
In this era of modern technology, ICT is gaining importance with time. The solutions that
are provided by ICT help the organizations to create value (Keller & Heiko, 2014). It has become
very crucial for the businesses to integrate and incorporate ICT in its business plan in order to
achieve success (Day et al., 2012). ICT promotes a good process for managing information.
Several IT projects have failed because the businesses have not been able to incorporate ICT in
its processes and have treated ICT to be separate from business (Vaishnavi & Kuechler, 2015).
There are numerous securities threats associated with ICT. The case study provided here talks
about a small Australian software development firm that wants to expand its business. This
report provides details about the ICT security needs and the security applications that would help
the organization to expand.
This report talks about the network and information security in ICT. This report describes
three such network or information security applications that are currently being used in the
market. It also talks about the success as well as the failure factors of the network or information
security applications. This report gives a brief overview of how these applications will help the
organization to expand. It will point out the advantages and limitations of the applications. This
report also provides recommendations from the entire discussion.
Information and Network Security
The concept of information and network security deals with the protection of information
against any type of unauthorized tampering and access (Shiravi, Shiravi & Ghorbani, 2012).
Every organization is aware of the security and data threats and gives it the topmost priority
Assignment Network and Information Security Technologies_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network and Information Security Technologies Assignment
|16
|3679
|43

Recent Trends in Malware Name of the Student Name of the University
|13
|2780
|336

Report on Recent and Current Trends in Malware
|13
|2836
|266

Professional skills development (Report)
|12
|3770
|112

COIT20249 - Network Security
|16
|4389
|177

Internet of Things (IoT) and ICT Assignment
|10
|1778
|230