logo

Cloud Computing Security Analysis

   

Added on  2020-02-24

14 Pages4077 Words36 Views
 | 
 | 
 | 
Running head: PROFESSIONAL SKILLS DEVELOPMENTProfessional Skills DevelopmentCOIT20249Assessment DetailsAssessment item 3—ReportStudent’s name:Name of the university:Author’s note:
Cloud Computing Security Analysis_1

1PROFESSIONAL SKILLS DEVELOPMENTExecutive SummaryThis report sheds light on information technology and network security issues in recent time andhow software application can solve these issues. The purpose of the report is to focus onSoftware Spike organisation’s expansion in the business in next five years to branches withinICT in all over the Australia and overseas also. The organisation aims to diversify the business inproviding network and information security services for clients. The issues of the organisationare funding, business model, legal considerations and ethical issues in software basedorganisations. The focus of the report is to explore the possibility of expansion in software field.Network security is important factor for the organisation that is doing the business in onlineplatform. The potential clients of the organisations are small and medium sized organisations incities in Australia. The organisation is trying to focus on online gambling, hospitality andpharmaceutical organisations. The company is focusing on CSR and triple bottom linetechniques as these aspects are important in business life cycle. Both primary and secondarysources of information have been used in order to compile the report. It is observed that software development industry is in developing and it is booming in last fewyears. In global aspect, Asia Pacific section is booming in software developing. If SoftwareSpike develops in business of software, they may reach the pinnacle, however, in Australia, agreat number of major players are also there. However, the organisation can face the issue offunding, developing software with existing employees. In this sense, the organisation needs todevelop classy team with skilled developers; they need to earn funding through joint venturesand follow software development life cycle model.
Cloud Computing Security Analysis_2

2PROFESSIONAL SKILLS DEVELOPMENTTable of Contents1. Introduction..................................................................................................................................32. Concept of network security in business.....................................................................................43. Network security application.......................................................................................................53.1 Mimecast................................................................................................................................53.2 Forcepoint..............................................................................................................................53.3 Imperva..................................................................................................................................64. Expanding business in network security application...................................................................65. Advantages and disadvantages of software development...........................................................76. Ethical, legal and social considerations in business....................................................................87. Conclusion...................................................................................................................................98. Recommendations........................................................................................................................9Reference List................................................................................................................................11Appendix........................................................................................................................................13
Cloud Computing Security Analysis_3

3PROFESSIONAL SKILLS DEVELOPMENT1. Introduction In recent time, most of the business organisations are using the internet to provide servicefor customers. In addition, in order to make a commercial transaction, the organisations aretaking help of internet. However, there have been various instances of theft of data and malwareattacks are seen. Publishing confidential details are observed on the internet. In this regard,network security is now very serious issue for most of the organisations that are using internetapplication. In addition, the aim of the report is to explore options for business organisationnamed Software Spike to expand in the next five years in the branches of network security toAustralian premises and also on the global scenario. This report will shed light on theopportunities and issues in network security business of that organisation. This report willhighlight the solutions of the issues in ICT business and propose practical solutions to overcomethe risks identified. Moreover, in first part of the report, concept of network security in businesswill be described with importance of it. In the following part, three network security applicationswill be narrated with organizational; examples. Additionally, this information of the report hasbeen taken from primary and secondary sources from various books, journals, websites and casestudies of various network security applications with interviewing some experts in this field. Overview of organisationSoftware Spike was established in the year 2013 in Melbourne and the founder of theorganisation was Luke Clarke. Currently, the organisation has 85 employees who are skilled insoftware development. The organisation undertakes various projects to develop multipleapplications customise off-the shelf services and in-house services. Software Spike has clientsfrom all the major cities in Australia. The major clients of the organisations are small to mediumsized organisations. The organisation is specialised in developing and customising networksecurity area. The organisation is trying to diversify business project in information and networksecurity to the organisations with online presence. Software Spike wants to help otherorganisations in managing online database and security.
Cloud Computing Security Analysis_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents