logo

Network Security Expansion Strategies

   

Added on  2020-03-28

13 Pages2957 Words425 Views
 | 
 | 
 | 
Running head: PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION TECHNOLOGYProfessional skills for information and communication technologyNameInstitutionCourseDate
Network Security Expansion Strategies_1

PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION TECHNOLOGY Executive summary Victoria Research and Technology Company has the plans for expansion within the next5 years. This report is based on research done to determine the possibility of the expansion. Theresearch entails details on network security since the company is aiming at providing networksecurity at a larger scale. The report involves the various issues experienced by differentorganizations regarding network security such as hacking, viruses, and malware. The reportcomprises of the importance of having network security for any organization that has an onlinepresence. Such organization needs network security to protect client data, to protect againstunauthorized access and to avoid loss of data. The advantages and disadvantages of networksecurity are also highlighted in the report. The types of information network security applicationssuch as email and antimalware software, email security and wireless security are also explainedin the report. The report also explains the risks that are involved in network security. Finally,recommendations have been highlighted that would be of use if taken under consideration.2
Network Security Expansion Strategies_2

PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION TECHNOLOGYTable of ContentsPROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION TECHNOLOGY41.o introduction4-5 1.1 key terms5-61.2 importance of information security 61.3 types of information security applications6-71.4 off-the-shelf vs. product in-house7-8 1.5 advantages and disadvantages of network security....................................8 1.5.1 Advantages ...................................................................8-9 1.5.2 Disadvantages................................................................9-101.6 ethical consideration......................................................................10-111.7 conclusion..............................................................................11-12 1.8 recommendations........................................................................121.9 references ..................................................................................133
Network Security Expansion Strategies_3

PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION TECHNOLOGY1.0 IntroductionThe Information and communication technology entails all technologies that are used to enabletelecommunications, social media, networking, and other online platforms that have madebusinesses easier. The internet is the most recent and common platform for communication andother important business transactions across the world. Since the discovery of the internet andthe advancement of what the internet can do, people have embraced the technology, thanks to theinformation and technology personnel across the globe.In the recent years, cybercrimes are on the rise and the demand for security softwaredemand has also risen, some companies and organizations have been complaining about theirsystems being hacked, and confidential information has been publicized, and even they havebeen used against them. Among those affected by cybercrime are small businesses such aspharmaceuticals, hospitality, and online gambling. At the Victoria research and technologycompany, we are looking to explore new businesses that can benefit from our securityapplications. But there are some of the executive members are concerned that not all the potentialclients are engaging in socially acceptable ethical businesses. While others are more concernedwith the economic aspect and do not concentrate much on the social and the environmentalaspectIndividuals or organizations can improve their security by restricting who can and whocannot access their information an application security, antivirus and antimalware software,email security, wireless security among others [ CITATION all17 \l 1033 ]. This will protect themfrom them from being victims of cybercrimes hence improving their privacy. Firewalls are usedto put barriers restricting an outsider from accessing ones confidential information. Victoria4
Network Security Expansion Strategies_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents