Ask a question from expert

Ask now

Report on Information and Security Applications

22 Pages5519 Words114 Views
   

Added on  2020-02-24

Report on Information and Security Applications

   Added on 2020-02-24

BookmarkShareRelated Documents
Running head: CASE STUDYAssessment 3-reportCase StudyName of the StudentName of the UniversityAuthor Note
Report on Information and Security Applications_1
1CASE STUDYExecutive SummaryThe purpose of this report is to examine the possibilities for the expansion of the business. Thefollowing report provides the discussion regarding the information and the security applicationsthat are there in the market at present and its uses. The report also focuses on the security and thetechnological aspects of the advantages and the risks involved. The respective Company is asmall software organization that was established less than five years ago. The softwareorganization is based in Melbourne. The company deals with the development and thecustomization of the applications that specialize in the information and the network security area.The Company at present and compiling the recent scenario is exploring option to expand itsbusiness opportunities in the next five years to its other branches within the information and thecommunication technology.
Report on Information and Security Applications_2
2CASE STUDYTable of ContentsIntroduction......................................................................................................................................3Discussion........................................................................................................................................4Information Security and Network Security................................................................................4Information/Network Security Applications...............................................................................4Authentication Applications (Kerberos)..................................................................................4Web Security Standards...........................................................................................................5IP Security Application............................................................................................................5Expansion Opportunities of the Company...................................................................................6To expand the business a few strategies have to be followed:................................................7Off shelf software and in-house products....................................................................................7Reasons for Success.....................................................................................................................8Probable reasons for Failure........................................................................................................9Conclusion.......................................................................................................................................9Recommendations..........................................................................................................................10References......................................................................................................................................12Annotated Bibliography.................................................................................................................15
Report on Information and Security Applications_3
3CASE STUDYIntroductionThe respective Company is a small software organization that was established less thanfive years ago. The software organization is based in Melbourne. The company deals with thedevelopment and the customization of the applications that specialize in the information and thenetwork security area. The major clients of the company are based in the major cities ofAustralia, which range from small to medium sized organizations. This organization at present isundertaking projects that are developing applications in-house or the customization of the off-shell software. These are done with agreement with the large vendors. The business scope of theorganization at present is limited to the development of the applications. The Company at presentand compiling the recent scenario is exploring option to expand its business opportunities in thenext five years to its other branches within the information and the communication technology.The Company also plans to expand its business to all parts of Australia and if possible overseasalso. The future options of this organization are to diversify the business to provide the ongoinginformation and the network security services to the various businesses, which have a presenceon the online platform. This will require management of the online security of thoseorganizations, websites and the database of the clients. The report is an investigation of thepossibility of the expansion of the business. The following report provides the discussionregarding the information and the security applications that are there in the market at present andits uses. The report also focuses on the security and the technological aspects of the advantagesand the risks involved.
Report on Information and Security Applications_4
4CASE STUDYDiscussionInformation Security and Network SecurityThe information security refers to the number of the strategies that are used to managethe different processes, the tools and the policies, which are important for the prevention,detection, documentation, and to counter the threats to the digital and the non-digitalinformation. It is also called as the ‘infosec’. Infosec has the responsibility to establish thebusiness process to protect the assets of information despite the information being in the mode offormatting or transition or is at rest in the storage or being processed Panda, Abraham & Patra,2012). The network security on the other hand refers to any action that is designed for theprotection of the usability and integrity of the network and the data. The network security iseffective and manages the access to the network. The duty of the network security is to target thethreats and stops them from spreading to the network of an individual. The network security is acombination of the various layers of the defenses in the network. Each layer has its policies andcontrols (Stallings & Tahiliani, 2014).Information/Network Security ApplicationsAuthentication Applications (Kerberos)The Kerberos is an authentication protocol that is designed for the internet protocol andthe transmission control protocol. This service acts on the concerned network acts as trustedintermediary. This application allows the clients to access to other different clients and serviceson the respective network. This application keeps a database of the various clients and theirprotected keys. The services require the authentication of the clients by registration of thepassword keys with this application. There is the creation of the shared password session that is
Report on Information and Security Applications_5
5CASE STUDYprovided to the client and the server for the encryption of the messages. For the purpose of theencryption the Kerberos uses DES that is the data encryption standard. The customer or the clienthas make a request for the ticket granting service from the application and then this applicationsends the ticket to the respective client that has the encryption of the client password key. Thegeneration of the authenticators by the client is done by sharing the password keys. If thecredentials provided by the client are approved, then the server grants access to the service(Mahajan & Sachdeva, 2013). There is a possibility to replace all the client Kerberos softwarewith a version, which records the passwords. Web Security StandardsThese use the SSL (Secure Socket Layer) protocol for providing a reliable and secureservice on the Transmission Control Protocol. The web security threats are located at the serveror the customer and include passive and active attacks. The passive attacks comprises of theaccess to the network traffic between the browser and the server and accessing the restrictedinformation. The active attacks comprise of the impersonation as another user and alteration ofthe messages and the information on a website. There are security parameters to define theassociation between the browser and the server. There is provision of the confidentiality by usingthe symmetric encryption and message integrity. The message integrity is determined by theshared password key, which is used in the form of the ‘message authentication code’. During thealert, there is through a simple warning and if the alert is fatal then there is termination of theconnection. The alert messages are sent using the codes (Kumar, Ashok & Subramanian, 2012).IP Security ApplicationThis application is an agenda of the open standards that ensure private and securecommunications over the internet protocol networks using the cryptographic protection services.
Report on Information and Security Applications_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Business Research on Network and Information Security
|15
|3340
|86

Professional Skills Development COIT20249
|14
|4077
|36

Network Security | ICT Assignment
|15
|3406
|139

Information/Network Security Expansion Plan for the Organization
|13
|3374
|249

Professional Skills in Information Technology 11 Professional Skills in Information Technology Name Affiliate Institution
|12
|4203
|461

Information and Network Security: Assignment
|13
|3472
|59