logo

Professional Skills in Information Technology 11 Professional Skills in Information Technology Name Affiliate Institution

12 Pages4203 Words461 Views
   

Added on  2019-11-19

About This Document

The company is recommended to ensure that proper policies, guidelines and measures are put in place and ensure that every employee adheres to them at all times. Executive summary 2 Introduction 4 Information and Network Security 4 Components of Information Security 5 Importance of Information and Network security 6 Solutions to Information Security Threats 7 Information and Network Security Controls 8 Network Security Applications 9 Conclusion 9 Recommendation 10 References 11 Table 1: Summary of Types of Controls 9 Introduction Security has become a top most concern in the information and communication technology, societal development

Professional Skills in Information Technology 11 Professional Skills in Information Technology Name Affiliate Institution

   Added on 2019-11-19

ShareRelated Documents
Running head: Professional Skills in Information Technology1Professional Skills in Information TechnologyNameAffiliate Institution
Professional Skills in Information Technology 11 Professional Skills in Information Technology Name Affiliate Institution_1
Running head: Professional Skills in Information Technology2Executive summaryThe safety and protection of the company’s information and network should be the top priority.Information and data shared and transferred over the internet or via a network is very vulnerableto attackers. Data can be tapped or information can be hacked into if proper information andnetwork security are not put in place. Threats to information are increasing every day and includehacking, tapping, denial of service attacks, viruses that destroys data, mobile malware, phishingamong others. Therefore, it is the responsibility of not only the information security team but theentire company’s employees to ensure that there are no loop holes to violation of data integrity.The company should make sure that preventive, detective, corrective, deterrent and recoverycontrols are properly structured and implemented.Confidentiality, integrity and availability of information is a key goal or objective that should bemet at all times. The company will be holding large amount of private data for example in thegambling website and such personal information should always be kept confidential and no thirdparty is accessing this information without authorization.The company is recommended to ensure that proper policies, guidelines and measures are put inplace and ensure that every employee adheres to them at all times. The company should alsoinstall firewalls, up-to-date powerful antiviruses, install intrusion prevention and detectionmechanism, and perform regular data and information backups to ensure that in case of any dataloss they can quickly recover. Also disaster recovery techniques should be put in place.
Professional Skills in Information Technology 11 Professional Skills in Information Technology Name Affiliate Institution_2
Running head: Professional Skills in Information Technology3Table of ContentsExecutive summary.........................................................................................................................2Introduction......................................................................................................................................4Information and Network Security..................................................................................................4Components of Information Security..............................................................................................5Importance of Information and Network security...........................................................................5Threats to Information and Network Security.................................................................................6Solutions to Information Security Threats.......................................................................................7Information and Network Security Controls...................................................................................8Network Security Applications........................................................................................................9Conclusion.......................................................................................................................................9Recommendation...........................................................................................................................10References......................................................................................................................................11Table 1: Summary of Types of Controls......................................................................................................9
Professional Skills in Information Technology 11 Professional Skills in Information Technology Name Affiliate Institution_3
Running head: Professional Skills in Information Technology4IntroductionSecurity has become a top most concern in the information and communication technology,societal development and economic environments recently. Data and information transfer isbeing done through information systems and networks now which was impossible a few yearsago. Information systems and networks have been expanding expeditiously coupled withincreasing number of network users and transaction values has led to rise in concerns about theirsecurity. When a business is planning to expand its operations information security is one keyprerequisite that has to be critically considered. This study is about an organization in Melbourne Australia that deals with development andcustomization of network and information security applications and software. Its customers arefrom the major cities of Australia and ranges from small to medium sized firms. Currently, itmajors in projects to develop in-house software or liaises with bigger companies to offer custom-off-the-shelf applications. The company currently wants to expand and identify other options toventure in other than application development in the next five years to other parts of Australiaand the rest of the world. The company is considering diversifying its operations into offering information and networksecurity to online business that require maintaining online security for such firms includingcustomer database and websites. This report is focused on assessing information and network security software and applicationscurrently I the market. It also focuses on identifying the success and failure factors in differentindustries.The objective of this report includes; investigation of the possibility of expansion, identificationand assessment of information and network security used across the world, recommendation onhow these software and application can be used to expand the company, and analysis of risksassociated with the recommendation.Information and Network SecurityInformation security refers to guarding information systems from unauthorized access,modification, use, destruction or disclosure of data within these systems. On the other hand,network security refers to any activity structured to guard and protect the integrity and usabilityof network data and information. (Cole, 2013).People using technology should have a wide knowledge about the critical aspects and importantstandards and how to implement specific procedures in order to stay secured of threats andattacks. Over the years’ information theft, manipulation and destruction has been on the rise forindividual gain or greed. Exchange of digital information across the globe is happening everysecond for example when one swipes a credit card a lot of information is distributed liketransaction details are sent to their mail addresses, and other several things happen. It is the duty
Professional Skills in Information Technology 11 Professional Skills in Information Technology Name Affiliate Institution_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Professional Skills for Information and Communication
|18
|4309
|40

Information Technology | Question and Answer
|6
|1038
|15

Cyber Security: Dealing with Cyber Attacks and Emerging Technologies in Oil and Gas Industry
|11
|1615
|387

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27

Information Technology Security Issues
|3
|555
|185

Assignment on Cyber Defense in Web Based Attacks
|7
|1418
|22