logo

Information Technology Assignment (Doc)

13 Pages4505 Words345 Views
   

Added on  2020-07-22

Information Technology Assignment (Doc)

   Added on 2020-07-22

ShareRelated Documents
REPORT
Information Technology Assignment (Doc)_1
EXECUTIVE SUMMARY Information technology is the combination of 3 basic elements that includes decisionsupport, computational data processing and business software. Information and communicationtechnology is considered as the activities that are used in maintaining broadcast media,telecommunication, exchange of information, intelligent building management system,transmission system audio-visual communication processing and some activities that are basedon control and monitoring of network (Kahate, 2013). ICT is a small business consultancyrelated with network and software. The firm is working for last five years, in respect of providingbest security and technology services to their customers. The company put its affords to exploretheir business in various branches and want to capture a wide area of Australia or worldwide.There are so many options available for firm to explore their business and increase profit. Majorscope for company is to produce more effective applications for securing data and network. Network is an essential term which used to establishes an effective connectivity amongvarious servers. Large number of people are using various different type of networks for theirwork in order to finding effective result and findings. There are so many hackers and virus areavailable which has directly impacted on the overall network and can easily hack the data andinformation which are go through form the network. Hackers are the most disturbing elements of the society who hack important data andinformation which are having value for an individual. Through this they can harm and blackmale people in terms of money. So network security agencies put their best efforts to providehigh range of security to their network, so that no one can hack their data and information.Organisations faces various issues related with network and this may cause bad impact onorganisational work. Investigator faces so many issue regarding collecting data and information.It is not easy to gather proper information about network security form a single source because itis very tedious topic of networking (Livingstone, (2012)). For collecting proper data andinformation researcher use various different source and networks. For this present report it hasbeen founded that company needs to adopt various tools and techniques for resolving the issueswhich are arises form the network threats. Company provide various laws and legislations inorder to provide high quality services to their potential customers.
Information Technology Assignment (Doc)_2
Table of ContentsEXECUTIVE SUMMARY ............................................................................................................2INTRODUCTION ..........................................................................................................................1SECTION: NETWORK SECURITY ...........................................................................................2CONCLUSION ...............................................................................................................................7RECOMMENDATION .................................................................................................................8REFERENCES ...............................................................................................................................9
Information Technology Assignment (Doc)_3
INTRODUCTION Network security is described as a process which taking software and physical obstructivemeasures to provide protecting criteria to the underlying network infrastructure from theunlicensed misuse, access, malfunctions, destructions, modifications or improper discloser(Castellucci & et. al., 2013). It helps in developing a safe and secure platform better accessing ofcomputer networks and network accessible resources. An organisation hires well educated peoplein their firm who are having a significant knowledge about computer and software technology andhe or she is responsible for all activities in firm related with network and software. In anorganisation network security is handled by network administrator. Network security isconsidered as some set of activities that used to protect the integrity and accessibility ofinformation, data and network. In this software as well as hardware are involved. Organisations arefocused towards developing an effective network security environment for protecting networkfrom threats and unauthorised accesses. In today’s scenario every business organisation run theiractivities through internet and technology for providing best and suitable services to customers andclients. Some important activities are conducted by firm for protecting data and information. Withthe use of smart technology people can share and transfer personal and sensitive information. ICTis a small business organisation that is based in Melbourne. The firm was established before 5years ago. It mainly focuses on providing best and high range internet and security system to theircustomers for protecting data and information from unauthorised elements that may impact theoverall condition of firm (Bhuasiri and et. al., (2012)). They mostly give services to small andmedium size organisations in respect of earn profit. Now a day they are focuses on maximisingprofit and growth of company. There is huge requirement of technology in organisation becausethe overall work is based on computers and internet. These are helpful in making human life moreeasy and comfortable. 1
Information Technology Assignment (Doc)_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Crime and Digital Forensic : Report
|15
|3299
|123

Cyber Security Threat Management | Assignment
|9
|2180
|85

Information Security Course 2022
|9
|2098
|37

Cyber Security & Ethical Hacking : Report
|9
|2386
|80

Cyber Security Assignment | Business Research Assignment
|9
|3490
|73

Hacktivism and Hacking
|8
|2043
|355