Network Security | ICT Assignment

Added on -2020-02-19

| 15 pages| 3406 words| 139 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 4 of 15 pages

Running head: INFORMATION AND COMMUNICATION TECHNOLOGYINFORMATION AND COMMUNICATION TECHNOLOGYName of the StudentName of the UniversityAuthor Note
INFORMATION AND COMMUNICATION TECHNOLOGY1Table of ContentsIntroduction...........................................................................................................................2Network security...................................................................................................................3Information and network applications and its use.................................................................3Success or failure...................................................................................................................4Expansion with the implementation......................................................................................5Recommendation with the organisation................................................................................6Advantage or disadvantage....................................................................................................7Risk management..................................................................................................................8Conclusion.............................................................................................................................9Recommendation.................................................................................................................10References...........................................................................................................................11
INFORMATION AND COMMUNICATION TECHNOLOGY2Introduction The organisation in the case study is a small software development company which issituated in Melbourne. The organisation was established less than 5years ago. The mainworking concept of the organisation is that it develops and customizes application in thespecialization field of network security area and information. The client of the organisation ismainly situated in major cities of Australia and medium to small organisation. At the presenttime, the organisation undertakes project in order to develop applications mainly in house orto customize off the shelf software in agreement with the prospective of larger vendors. Thedifferent implementation of the technology has emerged with the concept of securing theinformation and network security. This factor can be estimated to be a very important factordue to the direct involvement of the security issue. On the other hand the improved securityfeature would incurs addition of more cost when related to small organisations who do notinvolve in big budget (Perlman, Kaufman and Speciner 2016). The overall scope of theorganisation is limited to development of application. The company now is trying to expandits exposure into different fields in the time tenure of next five years. This expansions ismainly in the field within information and communication technology (ICT). One of thefuture options that is liable of implementation is that diversifying the business in providingongoing information and security services which are related to network to service which has apresence online. These aspects would directly provide security of the organisations with itsecurity of the client database and websites related to it.The report puts direct emphasis on the concept of information and network security.An analysis is provided on the information. Bringing into account the problem’s related to theimplementation of the issue and the rectification dealing with the issues.
INFORMATION AND COMMUNICATION TECHNOLOGY3Network securityNetwork security refers to any activity which is mainly designed to provide protectionin the field of integrity and usability. It can be termed as a distributed function. There aremany application which may utilize the management of security that may include emails,electronic commerce, detection of intrusion and access control application. The securitymanagement aspect faces the same problem as other distributed functions face. It can be statethat security management would require human presence with regards to every securitydevice and evaluation which is done manually of all the significant events (Perlman,Kaufman and Speciner 2016).Information and network applications and its useThere are mainly two types of network application software’s that are highly used.The category are pure network applications and standalone network application.Pure network applicationsThese applications are mainly used in network areas, using the concept of pure networkapplication on a single computer does not make much of a sense. The main motive behind theconcept is that it helps in transfer data and achieve communication within a network. Theseapplications mainly have a different, separate and a distinct interface of the user.1.Email programThe concept of emails helps the user to write a message and communicate with each other.The message are usually written in the local node and the send across to someone on thenetwork access area. It can be considered as the fastest and most reliable source ofcommunication from one computer to another computer. Few example of electronic mailprogram (Client) can be:

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this