ICT Report: Analysis of Network Security and Information Applications

Verified

Added on  2020/02/19

|15
|3406
|139
Report
AI Summary
This report analyzes the information and communication technology (ICT) landscape for a software development company specializing in network security and information applications. It explores network security concepts, including its role in protecting data integrity and usability, and examines various network applications like email programs and file transfer protocols. The report assesses the success and failure of these applications, considering their impact on communication, marketing, and telecommuting. It provides recommendations for the organization, emphasizing clear communication, understanding technology requirements, and staying updated with innovations. Furthermore, the report discusses the advantages and disadvantages of ICT implementation, including enhanced communication and flexibility versus potential dependencies and security difficulties. Risk management strategies are outlined, focusing on risk assessment, analysis, and evaluation to mitigate threats. The report concludes with recommendations and references to support the analysis, offering insights into managing ICT within the organization.
Document Page
Running head: INFORMATION AND COMMUNICATION TECHNOLOGY
INFORMATION AND COMMUNICATION TECHNOLOGY
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INFORMATION AND COMMUNICATION TECHNOLOGY
Table of Contents
Introduction...........................................................................................................................2
Network security...................................................................................................................3
Information and network applications and its use.................................................................3
Success or failure...................................................................................................................4
Expansion with the implementation......................................................................................5
Recommendation with the organisation................................................................................6
Advantage or disadvantage....................................................................................................7
Risk management..................................................................................................................8
Conclusion.............................................................................................................................9
Recommendation.................................................................................................................10
References...........................................................................................................................11
Document Page
2INFORMATION AND COMMUNICATION TECHNOLOGY
Introduction
The organisation in the case study is a small software development company which is
situated in Melbourne. The organisation was established less than 5years ago. The main
working concept of the organisation is that it develops and customizes application in the
specialization field of network security area and information. The client of the organisation is
mainly situated in major cities of Australia and medium to small organisation. At the present
time, the organisation undertakes project in order to develop applications mainly in house or
to customize off the shelf software in agreement with the prospective of larger vendors. The
different implementation of the technology has emerged with the concept of securing the
information and network security. This factor can be estimated to be a very important factor
due to the direct involvement of the security issue. On the other hand the improved security
feature would incurs addition of more cost when related to small organisations who do not
involve in big budget (Perlman, Kaufman and Speciner 2016). The overall scope of the
organisation is limited to development of application. The company now is trying to expand
its exposure into different fields in the time tenure of next five years. This expansions is
mainly in the field within information and communication technology (ICT). One of the
future options that is liable of implementation is that diversifying the business in providing
ongoing information and security services which are related to network to service which has a
presence online. These aspects would directly provide security of the organisations with it
security of the client database and websites related to it.
The report puts direct emphasis on the concept of information and network security.
An analysis is provided on the information. Bringing into account the problem’s related to the
implementation of the issue and the rectification dealing with the issues.
Document Page
3INFORMATION AND COMMUNICATION TECHNOLOGY
Network security
Network security refers to any activity which is mainly designed to provide protection
in the field of integrity and usability. It can be termed as a distributed function. There are
many application which may utilize the management of security that may include emails,
electronic commerce, detection of intrusion and access control application. The security
management aspect faces the same problem as other distributed functions face. It can be state
that security management would require human presence with regards to every security
device and evaluation which is done manually of all the significant events (Perlman,
Kaufman and Speciner 2016).
Information and network applications and its use
There are mainly two types of network application software’s that are highly used.
The category are pure network applications and standalone network application.
Pure network applications
These applications are mainly used in network areas, using the concept of pure network
application on a single computer does not make much of a sense. The main motive behind the
concept is that it helps in transfer data and achieve communication within a network. These
applications mainly have a different, separate and a distinct interface of the user.
1. Email program
The concept of emails helps the user to write a message and communicate with each other.
The message are usually written in the local node and the send across to someone on the
network access area. It can be considered as the fastest and most reliable source of
communication from one computer to another computer. Few example of electronic mail
program (Client) can be:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4INFORMATION AND COMMUNICATION TECHNOLOGY
Outlook express
Fox mail
Pegasus mail
Opera
Poca mail
2. File transfer protocol ( FTP)
The main functionality of the protocol is the transfer of files from one computer to
another for example from a client to server. There are mainly two processes involved in the
protocol of file transfer
Downloading: this can be stated as a process of obtaining files from the server to a
workstation or can be termed as a client. The most common example is when a user
download a program or a music from the server
Uploading: this process can be stated as a process of obtaining files from the workstation
to the server. An example of such a process is when a user attach a document file and
upload it to the server, the most common example is uploading files or a photo to
Facebook (Perlman, Kaufman and Speciner 2016).
Standalone applications
These applications runs on the stand alone computer (computer which are not
connected to any other). In order to improve their activity and expand their activity they are
mainly build to run on network environment for example word processors, data base
management system, project management etc. they perform their desired function even when
the computer is offline.
Document Page
5INFORMATION AND COMMUNICATION TECHNOLOGY
Success or failure
The concepts of the application can be justified with the term success as they have brought
the computer communicating aspect into a whole new era.
Expansion with the implementation
The implementation of the above stated technology would defiantly improve the overall
presentation of the business in the five years plan of advancement. The following points gives
a overview of the concept
1. Communication
The overall aspects of the internet technology have been considered very much crucial for
all business bodies. These concepts can be termed as a life line in order to stay in touch
weather in road and responding to the customer with the customer’s query which should be
conducted in a timely manner. Emails, social networking and text messaging are few of the
field in the communication era that keeps the business running all the time
2. Marketing
The approach of reaching the business to new as well as existing customers had been very
much hectic before the innovation of these technologies. Information marketing can range
from a simple form of website to a search engine advertising; to online sales product. Email
marketing is considered as one of the most effective and low cost related method in order to
reach a large group of people in a small amount of time. Mobile marketing is a relatively new
frontier that reaches the people through the aspect of text messaging (Beberlein et al. 2016).
3. Telecommunicating
Many organisation can expend their approach to proper scenario of business by enforcing
telecommuting and flex time benefits. The different personals who are related to the business
Document Page
6INFORMATION AND COMMUNICATION TECHNOLOGY
stay in contact from anywhere around the world. This can be achieved from the approach of
emails, collaboration tools which are available over the internet and mobile computing
devices.
Recommendation with the organisation
Recommendation 1: communication should be clear about the human resource aspects that
is needed in order to deal with the customers. The human resource body is mainly who
incorporates different aspect of the technology and their proper working and can also be
related to the staff who use the information technology tools in order to achieve benefit from
the technology
Recommendation 2: development of the work and the technology do not always involve
same quantity of requirement (Nevo, Nevo and Pinsonneault 2016). It can be considered as a
very fundamental aspect that to take into account the fundamentals of all the requirement
related to the information technology.
Recommendation 3: when it comes with the concept of implementing a specie technology
for a specific context it should not be taken into consideration how easy the technology is.
The security management aspect faces the same problem as other distributed functions face.
It can be state that security management would require human presence with regards to every
security device and evaluation which is done manually of all the significant events (Perlman,
Kaufman and Speciner 2016). Technology capacity, user interface, familiarity aspect
regarding tools and the systems have a major impact on the use of the tools with the
technology.
Recommendation 4: the information technology changes very rapidly with every
innovation. It has to take into account that the latest invention in a technology should be
known so that lagging behind the technology is not done (German 2017).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INFORMATION AND COMMUNICATION TECHNOLOGY
Recommendation 5: One of the future options that is liable of implementation is that
diversifying the business in providing ongoing information and security services which are
related to network to service which has a presence online. These aspects would directly
provide security of the organisations with it security of the client database and websites
related to it.
Advantage or disadvantage
In every sphere of technology with the predefined advantage that can be achieved from
the implementation some disadvantage aspects also comes into play. Few advantage of the
implementations are:
1. Enhancing of communication and availability with the information
The networking concept epically when allowed to access the internet completely, allow
the means of communication that would be merely not possible if the development was not
made (Trantopoulos et al . 2016). Instant message aspect can allow the users to talk with each
other and create a means of medium where they can transfer files in an efficient and secured
manner
2. Highly Flexible
The technology is termed as flexible because it gives the user an opportunity to explore
everything around the world which are according to the user essential, such as software
without affecting the overall working of the functionality concerned in the aspect (Brown
2016). On the other hand the people have the access to all the information they need to have
knowledge about and need to share (Beberlein et al. 2016).
Disadvantage
1. Independence lack
Document Page
8INFORMATION AND COMMUNICATION TECHNOLOGY
The process or the task that are done are on the computer, this states that the user relies
more on the computer work rather than exerting their own effort on the task which is at their
own hand (Nevo, Nevo and Pinsonneault 2016). On the other hand the user will be fully
dependent on the main server, it means that if the system somehow breaks done the entire
system would be useless (Reddy et al. 2016).
2. Lack of robustness
As stated above if the serer breaks down the entire system would be useless, also if the
bridging device or the central linking server fails the entire system would come to a standstill
situation and no operation can be conducted through it. There might be many illegal activities
that can occur which has to be taken care of and the user should be aware of it.
3. Security difficulties
As the number of user who are using the computer network in order to get the files and
share the files over the internet is enormous, a certain user’s security aspect would always be
at a risk factor which is very much crucial. Ones the data of an individual is in the hand of
any other than the intended recipient it can possess a security threat (Meurant 2016).
Risk management
The risk management mainly attempts to identify, control threat and access the threat
objectives that can play a dominating role in the sphere of computer internet. Due to the
factor of the details related to the user is very much crucial from the point of view of the
customer as well as the service providers (Meurant 2016). The security aspects must take into
consideration about all the steps that can be initiated in order to maintain the data. Three
process can be involved in a risk management procurement:
Document Page
9INFORMATION AND COMMUNICATION TECHNOLOGY
1. Risk assessment and analysis
This can be considered as the first step in the risk management process. It mainly deals
with accessing the risk that can generated from any scenario. It can impact the daily day to
day activity concerned in the organisation. Affective assessment of the different aspects can
considerably decrease the overall impact that the risk can create in the organisation.
2. Risk evaluation
After the analysis of the risk the risk evaluation factor is taken into account. A risk
evaluation technique estimates the risk against criteria that the organisation which have been
already unestablished in the above process (Ooi, K.B. and G.W.H 2016).
3. Risk treatment and response
The last step involved in the risk management is the risk treatment and the response
which has to be in that context. Risk treatment is mainly the implementation of the
procedures and the policies that will directly help minimizing the risk and avoid them. Risk
treatment also can extend to the transfer of the risk and the financing of the risk (Beberlein et
al. 2016).
It is very much important to take into consideration that the risk assessment or the risk
management is a continuous process. It should not be that ones the risk is identified and the
rectification process is being enforced and the effect of the risk is minimized, the risk
assessment or the risk management is omitted. A risk management policies of each and every
organisation should be redefined in order to access the risk which are liable in the near future
and necessary actions should be implemented so that the effect of the risk is minimized in the
process (Meurant 2016).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10INFORMATION AND COMMUNICATION TECHNOLOGY
Conclusion
Understanding of the emerging technology is a very important concept when dealing
with the concepts regarding to the implementation. The result of the above report states that
how different technological aspects can be used in the field of organisation, taking into
account the advantages and the disadvantage that are in the concerned implementation.
Recommendation is provided with the intention for providing a basic scenario which would
directly affect the overall business prospective and it would sustain in the near future. One of
the future options that is liable of implementation is that diversifying the business in
providing ongoing information and security services which are related to network to service
which has a presence online. These aspects would directly provide security of the
organisations with it security of the client database and websites related to it.
Recommendation
Recommendation 1: communication should be clear about the human resource aspects that
is needed in order to deal with the customers. The human resource body is mainly who
incorporates different aspect of the technology and their proper working and can also be
related to the staff who use the information technology tools in order to achieve benefit from
the technology
Recommendation 2: development of the work and the technology do not always involve
same quantity of requirement. It can be considered as a very fundamental aspect that to take
into account the fundamentals of all the requirement related to the information technology.
Recommendation 3: when it comes with the concept of implementing a specific
technology for a specific context it should not be taken into consideration how easy the
technology is. Technology capacity, user interface, familiarity aspect regarding tools and the
systems have a major impact on the use of the tools with the technology.
Document Page
11INFORMATION AND COMMUNICATION TECHNOLOGY
Recommendation 4: the information technology changes very rapidly with every
innovation. It has to take into account that the latest invention in a technology should be
known so that lagging behind the technology is not done (German 2017).
Recommendation 5: One of the future options that is liable of implementation is that
diversifying the business in providing ongoing information and security services which are
related to network to service which has a presence online. These aspects would directly
provide security of the organisations with it security of the client database and websites
related to it.
Document Page
12INFORMATION AND COMMUNICATION TECHNOLOGY
References
Beberlein, L.T., Dias, G., Levitt, K.N., Mukherjee, B. and Wood, J., 2017. Network
attacks and an Ethernet-based network security monitor.
Bica, I., Naccache, D. and Simion, E., 2016. Innovative Security Solutions for Information
Technology and Communications.
Brown, R.S., 2016. Protocol for the Isolation and Rapid Characterization of Foreign
Debris in Pharmaceutical Products Using Light and Electron Microscopy. Microscopy and
Microanalysis, 22(S3), pp.1088-1089.
Çiftçi, N.P. and Delialioğlu, Ö., 2016. Supporting students’ knowledge and skills in
information technology security through a security portal. Information Development, 32(5),
pp.1417-1427.
Diatmika, I.W.B., Irianto, G. and Baridwan, Z., 2016. Determinants of Behavior Intention
Of Accounting Information Systems Based Information Technology Acceptance. Imperial
Journal of Interdisciplinary Research, 2(8).
Dworkin, M.J., 2016. Recommendation for block cipher modes of operation: The CMAC
mode for authentication. Special Publication (NIST SP)-800-38B.
German, P., 2017. Organisations have latched on to the need to secure SIP trunking
solutions by implementing a Session Border Controller (SBC). The problem is that the vast
majority of SBCs are considered not just one-off investments but also one-off deployments.
Yet from denial of service attacks to toll fraud, SIP trunking is not only inherently vulnerable,
that vulnerability continues to change and escalate. Few... Network Security, 2017(1), pp.14-
16.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13INFORMATION AND COMMUNICATION TECHNOLOGY
Hemphill, T.A. and Longstreet, P., 2016. Financial data breaches in the US retail
economy: Restoring confidence in information technology security standards. Technology in
Society, 44, pp.30-38.
Lloyd, I., 2017. Information technology law. Oxford University Press.
Lloyd, I., 2017. Information technology law. Oxford University Press.
Lundberg, E., 2017. How to compete effectively with self-service technologies: The
impact of technology readiness and the technology acceptance model on self-scanning.
Meurant, G., 2016. KERMIT: a file transfer protocol. Elsevier.
Nevo, S., Nevo, D. and Pinsonneault, A., 2016. A Temporally Situated Self-Agency
Theory of Information Technology Reinvention. Mis Quarterly, 40(1).
Ooi, K.B. and Tan, G.W.H., 2016. Mobile technology acceptance model: An investigation
using mobile users to explore smartphone credit card. Expert Systems with Applications, 59,
pp.33-46.
Orlikowski, W.J., Walsham, G., Jones, M.R. and DeGross, J. eds., 2016. Information
technology and changes in organizational work. Springer.
Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private
communication in a public world. Pearson Education India.
Reddy, N., Patrick, R. and Sridharan, D.K., Qualcomm Incorporated, 2016. Systems and
methods for improved trivial file transfer protocol. U.S. Patent Application 15/167,789.
Teo, T., 2016. Modelling Facebook usage among university students in Thailand: the role
of emotional attachment in an extended technology acceptance model. Interactive Learning
Environments, 24(4), pp.745-757.
Document Page
14INFORMATION AND COMMUNICATION TECHNOLOGY
Trantopoulos, K., von Krogh, G., Wallin, M.W. and Woerter, M., 2017. External
Knowledge and Information Technology: Implications for Process Innovation Performance.
MIS Quarterly, 41(1), pp.287-300.
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]