logo

Security and Forensics (Aconex Limited)

   

Added on  2021-04-24

13 Pages2756 Words37 Views
 | 
 | 
 | 
Running head:SECURITY AND FORENSICSSecurity and Forensics(Aconex Limited)Name of the student:Name of the university:Author Note
Security and Forensics (Aconex Limited)_1

1 SECURITY AND FORENSICSExecutive SummaryAconex Ltd is popular provider of mobile and web-based collaboration at Australia. In PatentWorksLtd at New Zealand, security of IT infrastructure and cyber crime has turned out to be a risingconcern. The following study compares the companies of two different nations and analyzes theaspects of security and forensics to expand the business to Australia. The motive is well illustratedwith an IT road-map diagram provided in the study.
Security and Forensics (Aconex Limited)_2

2 SECURITY AND FORENSICSTable of Contents1. Introduction:......................................................................................................................................32. Analysis of operational security risks for PatentWorks Ltd to expand to Australia:........................32.1. Steps regarding operational security:..........................................................................................32.2. Best practices for operational security:.......................................................................................53. Conducting Business Continuity and Disaster Recovery Plan for PatentWorks Ltd:.......................63.1. Business Continuity Plan:...........................................................................................................63.2. Development of Disaster Recovery Plan:...................................................................................74. Covering legal issues pertaining to IT resources and privacy when operating in New Zealand andAustralia:................................................................................................................................................85. IT road map diagram foe PatentWorks Ltd placing proper IT assets:.............................................106. Conclusion:......................................................................................................................................107. References:......................................................................................................................................12
Security and Forensics (Aconex Limited)_3

3 SECURITY AND FORENSICS1. Introduction:Computer forensics refers to the application of analysis and investigation techniques forgathering and preserving evidences from specific computing devices which is suitable to present thecourt of law (Wang, Uehara & Sasaki, 2015). On the other hand, cyber crime has been rising acrossthe world and security of IT infrastructure has been under huge threat. Aconex Limited is a public and popular company in Australia that provides mobile and web-based collaboration technologies for process management and project information ("Aconex:Construction Management Software", 2018). To understand the security and forensic issues Aconexis chosen whose organizational setup is provided and whose security infrastructure is been reviewedin the study. This motive of the literature is to analyze the security and forensic features forPatentWorks Ltd, New Zealand to expand to Australia, taking Aconex as an example. The following report includes the assessment of operational security risks for PatentWorksLtd. Then, business continuity and disaster recovery plan is demonstrated. Next, various legal issuespertaining to IT resources and privacy is discussed in this study. Lastly, a IT road map diagram isillustrated for the suggested solution with placement of IT resources. 2. Analysis of operational security risks for PatentWorks Ltd to expand toAustralia: 2.1. Steps regarding operational security: StepsDiscussionIdentification of sensitivedata This includes product research, intellectual property, customerinformation, employee information and financial statements of thepresent business. Identification of possiblethreats For every category that is thought to be sensitive, the business mustidentify the kind of threats that are present (Androulidakis, 2016).However, they can wary of third parties to steal their data. Hence
Security and Forensics (Aconex Limited)_4

End of preview

Want to access all the pages? Upload your documents or become a member.