logo

Professional Skills for Information and Communication

18 Pages4309 Words40 Views
   

Added on  2020-04-01

Professional Skills for Information and Communication

   Added on 2020-04-01

ShareRelated Documents
Running head: PROFESSIONAL SKILLS FOR INFORMATION & COMMUNICATION Unit code and nameAssessment numberProfessional Skills for Information and Communication TechnologyAssessment due dateWord count (actual)--------------------------------------------------------------------------------------------------Student nameStudent numberE-mail addressCampus lecturer/tutorUnit Coordinator
Professional Skills for Information and Communication_1
1PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION TECHNOLOGYExecutive Summary The business report focuses on the issues of network security that enables an organization toprotect all the crucial data of the company. In this report, some suggestions of three networksecurity applications are highlighted that provide an opportunity for business growth.Confidentiality, integrity and availability are three building components of network security. Inrecent times, all the business incorporates computer technology and many businesses opted foronline business that requires an IT support. In such cases, the importance of network security canbe witnesses. Such technology that is used in recent times are Cloud Access Security Brokers,Endpoint detection and response (EDR), Indicators of Compromise (IOC) and Intelligence-driven security operations centers (ISOCs). In this report the three applications that are selectedfor implementing in the business are Authentication Application (Kerberos), Web SecurityStandards (SSL/TLS)- Citrix NetScaler Solution and Wire Shark. All these applications providesecurity to the web services so that all the details can be secured from any breaches of data.
Professional Skills for Information and Communication_2
2PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION TECHNOLOGYTable of Contents1.0 Introduction................................................................................................................................32.0 Discussion..................................................................................................................................52.1 Concept of information or network security..........................................................................52.2 Three information/network security applications currently in the market and their uses.....62.2.1 Authentication Application (Kerberos)..........................................................................62.2.2 Web Security Standards (SSL/TLS)- Citrix NetScaler Solution....................................72.2.3 Wire Shark......................................................................................................................82.3 Success/failure factors...........................................................................................................92.3.1 Authentication Application (Kerberos)..........................................................................92.3.2 Web Security Standards (SSL/TLS)- Citrix NetScaler Solution....................................92.3.3 WireShark.....................................................................................................................102.4 Proposal how these applications can expand organization in the next five years...............102.5 Whether the organization should focus on customizing off-the-shelf applications ordevelop products in-house to provide the ongoing security maintenance services to clientorganizations..............................................................................................................................113.0 Conclusion...............................................................................................................................144.0 Recommendation.....................................................................................................................145.0 Reference List..........................................................................................................................15
Professional Skills for Information and Communication_3
3PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION TECHNOLOGY1.0 IntroductionData and information are important for any business and it represent confidential detailsregarding the company. In Australia, the communication and energy sector are leads in havingthe most compromised systems; while, in terms of DDoS activity, the communication sectorsand financial sectors are the highest (Australian Cyber Security Centre 2017). However, all thesectors in Australia are suffered from network security attacks and mining and resource sectorssuffered from highest number of spam and malicious e-mails (Australian Cyber Security Centre.,2017).Image 1: Sectors with compromised systems in Australia (Source: Australian Cyber Security Centre, 2017)Moreover, the network security also illustrates the problem of cybercrime andprocurement fraud that is also growing tremendously in Australia according to the PwC’s 2016Global Economic Crime Survey (Perlman et al., 2016).
Professional Skills for Information and Communication_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ENGR9742 - Standards, Ethics & Compliance
|14
|3407
|130

Information Assets
|20
|3704
|91

Review of Fraud in the Banking Industry in Australia
|12
|3708
|15