Network Security Applications and Recommendations: ICT Report

Verified

Added on  2020/03/23

|14
|3550
|364
Report
AI Summary
This report provides an in-depth analysis of Information and Communication Technology (ICT) network security, focusing on an Australia-based small business organization seeking expansion. It begins with an executive summary highlighting the growing importance of network security in the digital era, emphasizing the need for data protection and privacy. The report then delves into various network security applications, including access control, antivirus and antimalware software, application security, behavioral analytics, email security, firewalls, intrusion prevention systems, network segmentation, and virtual private networks (VPNs). It discusses the advantages and disadvantages of each application, offering recommendations for the company's business growth, such as implementing access control, firewalls, and VPN services. The report also addresses ethical, social, and legal considerations, emphasizing data protection, client affordability, and technical advancements. It concludes by highlighting the importance of mitigating risks and monitoring network traffic to prevent exploitations and attacks, crucial for the company's expansion within Australia and overseas. The report underscores the necessity of aligning network security solutions with business requirements and legislative considerations.
Document Page
Running head: INFORMATION AND COMMUNICATION TECHNOLOGY
Information and Communication Technology
Name of the student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INFORMATION AND COMMUNICATION TECHNOLOGY
Executive Summary
The digitalization era and the advent of Internet have made significant changes in business all
over the world. However with the increase in the use of Internet the need for network security
and data protection has also been increased. This assignment highlights the case study of an
Australia based small business organisation that is looking forward towards expansion of their
business with the development of network security services and application for various clients all
over Australia as well as overseas. The various network security applications that are available
along with the advantages and disadvantages of each have been described in this assignment.
Recommendations have been made for the company in order to ensure that the business growth
in full success.
Document Page
2INFORMATION AND COMMUNICATION TECHNOLOGY
Table of Contents
Introduction......................................................................................................................................3
Body.................................................................................................................................................4
Conclusion.......................................................................................................................................9
Recommendations..........................................................................................................................10
References......................................................................................................................................11
Document Page
3INFORMATION AND COMMUNICATION TECHNOLOGY
Introduction
The advent of Internet has brought in a revolution in the working of any business
organization. The digitalization of the business has brought in innovation and made the business
even more convenient. However, along with the extensive use of the Internet technology, various
risks in the use of the ICT have been witnesses. The need for security and protection of the
information has become essential. In order to ensure the successful use of the Internet and ICT,
the confidentiality and privacy protection of the collected information needs to be ensured. This
assignment highlights the need for network security in a Melbourne based small business
organization. As given in the case study, the business organization operates in development and
customization of various Internet based application. The business organization also operates in
information and network security. The company has clients from the major cities of Australia
and provides a range of services to small and large companies of Australia. However, the
company now wishes to explore other options for the expansion of the business, to all parts of
Australia, as well as overseas. One of the future options that the company might consider
providing is the information and network security (Beberlein et al., 2017). The company might
consider venturing into managing online databases and websites of the clients. Moreover, as
mentioned in the case study, the potential clients might range from gambling organizations to
small pharmaceutical companies or hospitality industry. This report explores the various network
and security applications that are prevalent in the present business scenario (Perlman, Kaufman
& Speciner, 2016). The advantages and disadvantages of the various applications have been
discussed, along with the recommendations for the company that could be used successfully for
the expansion of the business.
Body
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4INFORMATION AND COMMUNICATION TECHNOLOGY
Network security refers to the applications that are designed in order to protect the
integrity and usability of the Internet network and the information that is stored and used. The
network security ensures confidentiality and privacy of the information, along with restricting
access of unauthorised users (Asati et al., 2014). Effective network security ensures that various
kinds of internal as well as external threats are prevented from entering the system, as well as
spreading all over the network (Pierson & DeHaan, 2015). A variety of network security are
available. These are as follows:
1. Access control: One of the very basic network securities that are available includes the access
control. Controlling the access of all the users and ensuring that only authorised people use the
network has a key role to play in the business organizations (Dumas & Bennett, 2015). This will
ensure that only authorised personnel have valid login ids and passwords, in order to access
information (Perlman, Kaufman & Speciner, 2016). This process is known as the Network
Access Control (NAC).
2. Antivirus and antimalware software: One of the major threats that computer networks face
is the attack of the Malwares or malicious software that attacks the computers, and gain access to
the confidential information (Williams et al., 2014). This software often deletes and tampers
data, thus, causing harm to the confidentiality of the business organization. Anti-virus protects
the computer network from the attack of malware and virus.
3. Application security: Business organizations use various kinds of application software, in
order to conduct their business successfully (Beberlein et al., 2017). Whether the company itself
builds the software or it buys it from any vendor, it is important that the application is secure.
The Applications that are used by any business organization includes hardware, software and
Document Page
5INFORMATION AND COMMUNICATION TECHNOLOGY
other network elements (Li et al., 2016). Thus, the vulnerabilities of these applications have to be
made secured, such that the vulnerabilities cannot be exploited.
4. Behavioural analytics: This kind of security is used in order to detect abnormal behaviour in
the network traffic (Perlman, Kaufman & Speciner, 2016). For example, if an intruder is trying
to crack the login id and password, several failed login will be detected, thus abnormal behaviour
and traffic is detected (Dangovas & Kuliesius, 2014). The security team is able to track these
indicators and detect abnormal system behaviour.
5. Email security: Emails are a major gateway through which security breaches and threats take
place. Hackers and attackers often use personal information and social engineering, in order to
send various exploits through emails (Asati et al., 2014). The attachments in an email often
contain malicious links and as soon as the user clicks, they are directed to phishing sites. These
websites resemble the real websites and hence the users are often deceived (Vaishnavi &
Kuechler, 2015).
6. Firewalls: A firewall is a virtual barrier between a trusted internal network and un-trusted
external network. The firewall uses a set of protocols that blocks the external traffic. Firewall
could be both software and hardware (Hashim, 2015). Firewalls ensure that malicious external
traffic do not cause harm to the internal flow of information, within the trusted network
(Beberlein et al., 2017).
7. Intrusion prevention system: An intrusion prevention system is a network traffic scanner
that actively blocks the attackers (Dangovas & Kuliesius, 2014). They track the various activities
of the network traffic and blocks, in case they find unusual activities (Mullick et al., 2014). This
Document Page
6INFORMATION AND COMMUNICATION TECHNOLOGY
helps in the prevention of the intrusion and thus protects the network systems, thus ensuring
safety.
8. Network segmentation: Network segmentation software puts the network traffic into
different categories, thus enforcing security policies. The traffic classifications are done on the
basis of endpoint identifies. A person, under this system can gain access rights in the network
based one location, role and designation, thus ensuring privacy (Hashim, 2015).
9. Virtual private network: The virtual private network encrypts the connection from an
endpoint of a network, thus creating a virtual private network, over the Internet. A remote access
VPN uses IPSec or Secure Socket Layers, in order to authenticate the communication that takes
place between network and the communication devices (Bloom et al., 2014).
In order to ensure that the company is able to expand its business, the company might
venture into providing access control, virtual private network and include firewall services. The
advantages of providing access control include prevention of unauthorised access in the database
as well as in the network systems (Beberlein et al., 2017). However, one of the major
disadvantages of using the access control network security is that each employee who are eligible
for gaining the access, has to give login ids and passwords. In case of any emergency, without
the approval of the admin, no employee can access the databases and information (Mullick et al.,
2014). Thus, the company has to ensure that the access control security systems are successfully
implemented.
The company could develop the firewall and expand its business successfully. The
advantages of using a firewall include the prevention of unwanted traffic from entering the
secured network, thus protecting the client’s system from various attacks. However, there are
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INFORMATION AND COMMUNICATION TECHNOLOGY
certain disadvantages as well (Asati et al., 2014). The disadvantages include the restriction of the
legitimate users. The firewalls are designed to restrict unauthorised information; however, the
strict protocols of firewall might prevent the legitimate users as well. However, the company
should ensure that the vulnerabilities of the firewall are handled with care (Hashim, 2015). If the
employees use backdoors heavily, due to the strict protocols used by the firewall, then the
vulnerabilities of the backdoor could be exploited as well. Thus, the company needs to ensure
that the vulnerabilities of firewall are not exploited (Williams et al., 2014).
The Virtual Private Network services could also be provided by the business
organization. The VPN ensures that an encrypted channel of communication is carried out over
the Internet, through a privatised channel (Perlman, Kaufman & Speciner, 2016). A private
network of communication is carried out virtually, thus ensuring secure communication, even
within the public Internet. Thus, the virtual private network ensures that a private network is
created in the public network preventing intruders to eavesdrop into the conversation or
exchange of information that is taking place in the private network. This is effective in ensuring
confidentiality and data protection along with providing network security to the business
organisations.
It is essential that the ethical, social and legal considerations be given adequate
importance, in order to ensure sustainable and feasible business. The ethical considerations that
the business needs to abide by include the data protection and maintenance of privacy. The
developers of the software might know the vulnerabilities of the network security. However, the
employees need to refrain from exploiting the vulnerabilities (Asati et al., 2014). The backdoor
systems should not be exploited by the business organization (Perlman, Kaufman & Speciner,
2016). Moreover, since the company mentioned in the case study are service providers of
Document Page
8INFORMATION AND COMMUNICATION TECHNOLOGY
network security, hence the confidential information of the clients is readily available (Bloom et
al., 2014). However, in order to abide by the ethical considerations, the data protection and
confidentiality should be maintained (Beberlein et al., 2017). Moreover, the social considerations
are also important to be considered by the business organization. The social conditions include
the tech shrewdness of the clients along with their affordability (Lafuente, 2015). If the network
securities are provided to the clients at a very high cost, that is unaffordable by them, then it
becomes ineffective. Another social consideration that needs to be taken care is the extent of
technical advancements in the network security (Perlman, Kaufman & Speciner, 2016). The
company needs to ensure that the network security solutions that are provided to the customers
and clients matches with the technical advancements of the clients (Shokhor & Shigapov, 2013).
If the client company is not technically advanced as that of the application, hence the social
conditions, need to be considered and implemented effectively (Stallings & Tahiliani, 2014). The
legislative considerations have to be ensured by the business organization. The legislation of the
Australia has to be abided by the company, before they develop applications for the clients. The
legislation of any country has certain codes of conduct to ensure the privacy and protection of the
network of the business organizations (Pucer, Trobec & Zvanut, 2014). It is important that the IT
codes of practice be followed, while the network securities are designed.
As mentioned in the case study, in the next few years, the business organization wishes to
expand its business all over Australia as well as overseas (Bloom et al., 2014). Thus, it is
important that the network security applications that are designed are appropriate for the business
requirements of Australia (Perlman, Kaufman & Speciner, 2016). It is important that the risks
that are faced by the business organization need to be mitigated. While implementation of the
network security applications for the clients, various issues and implementation risks could arise
Document Page
9INFORMATION AND COMMUNICATION TECHNOLOGY
(Lafuente, 2015). The network security applications need to be designed, such that the
vulnerabilities are not exploited. Moreover, it is essential that the network traffic over the
Internet is monitored and unusual activities are carried out successfully. Lack of monitoring will
result in increase in the chances of exploitations and attacks. Thus, the company needs to ensure
that the various vulnerabilities of VPN, access control and firewalls are taken care by the
company (Perlman, Kaufman & Speciner, 2016). Moreover since these applications will be
developed by the company, hence it is likely that the exploitation of the vulnerabilities will be
known to the company. However in order to ensure that the company continues their business
ethically, the vulnerabilities should not be exploited (Perlman, Kaufman & Speciner, 2016).
Moreover the confidential information of the client that might be accessible to the company
should not be exploited or misused.
Conclusion
The advent of the Internet, has introduced a new era for the business organizations. With
the increase in the use of Internet, network security issues and risks arise. However, it is
important that the risks are mitigated. The various risks include the lack of the technical
awareness of the clients regarding the installed network securities. Moreover, lack of monitoring
of the activities that take place on the network needs to be ensured. The company could expand
their business by providing VPN network, access control as well as firewall services. The
development and deploy of these services are effective and will ensure that their business
witnesses considerable expansion all over Australia, as well as overseas. The access control
security system has a key role to play, since it helps in restricting the access of unauthorised
users to access the confidential information. Moreover, the unauthorised access could be easily
tracked in order to detect unusual activities in the network. Moreover, the use of the VPN is
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10INFORMATION AND COMMUNICATION TECHNOLOGY
important, such that a virtual private network could ensure secure communication in the open
network. This assignment highlights a business of Melbourne that aspires to grow and expand
successfully all over Australia as well as overseas. With the increase in the use of the Internet,
the importance of network security has increased and thus, in order to ensure that the business
organizations are able to work without their privacy being compromised. Since with the increase
in the use of Internet in business, the need for network security and protection has also increased,
hence, expansion of the company in this sector is likely to be profitable.
Recommendations
In order to ensure that the company, as given in the case study reaches the heights of
success in the next few years, it is important that few recommendations be suggested. The
company needs to expand their products in the domain of network security, such that it can
expand its business in various parts of Australia and overseas. Moreover, it is also recommended
that the technical feasibility and financial feasibility of the company be judged, before new
ventures are made (Perlman, Kaufman & Speciner, 2016). The vulnerabilities of the network
security applications needs to be successfully taken care and fixes, such that the vulnerabilities
are not exploited anymore (Pucer, Trobec & Zvanut, 2014). The requirements of the clients have
to be met successfully with the installation of the network security applications (Lafuente, 2015).
It is also recommended that the after sales services needs to be given efficiently, such that the
clients are satisfied with the kind of services being provided to them (Perlman, Kaufman &
Speciner, 2016). The time-to-time up gradation of the system has to be done, so that the clients
are able to upgrade their securities as well. Thus, the company, with the expansion in the
business in the virtual private network, as well as access control and installation of the firewall,
will be able to succeed in their business.
Document Page
11INFORMATION AND COMMUNICATION TECHNOLOGY
References
Asati, R., Khalid, M., Cherukuri, S., Durazzo, K. A., & Murthy, S. (2014). U.S. Patent No.
8,650,618. Washington, DC: U.S. Patent and Trademark Office.
Beberlein, L. T., Dias, G., Levitt, K. N., Mukherjee, B., & Wood, J. (2017). Network attacks and
an Ethernet-based network security monitor.
Bloom, N., Garicano, L., Sadun, R., & Van Reenen, J. (2014). The distinct effects of information
technology and communication technology on firm organization. Management
Science, 60(12), 2859-2885.
Dangovas, V., & Kuliesius, F. (2014). SDN-driven authentication and access control system.
In The International Conference on Digital Information, Networking, and Wireless
Communications (DINWC) (p. 20). Society of Digital Information and Wireless
Communication.
Dumas, P. C., & Bennett, T. (2015). U.S. Patent No. 9,057,210. Washington, DC: U.S. Patent
and Trademark Office.
Hashim, J. (2015). Information communication technology (ICT) adoption among SME owners
in Malaysia. International Journal of Business and Information, 2(2).
Lafuente, G. (2015). The big data security challenge. Network security, 2015(1), 12-14.
Li, Q., Ma, J., Li, R., Liu, X., Xiong, J., & Chen, D. (2016). Secure, efficient and revocable
multi-authority access control system in cloud storage. Computers & Security, 59, 45-59.
Document Page
12INFORMATION AND COMMUNICATION TECHNOLOGY
Mullick, A., Venkatraman, C., Nanjundaswamy, S., He, J., & Soni, A. (2014). U.S. Patent No.
8,904,475. Washington, DC: U.S. Patent and Trademark Office.
Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private communication in a
public world. Pearson Education India.
Pierson, G., & DeHaan, J. (2015). U.S. Patent No. 9,203,837. Washington, DC: U.S. Patent and
Trademark Office.
Pucer, P., Trobec, I., & Žvanut, B. (2014). An information communication technology based
approach for the acquisition of critical thinking skills. Nurse education today, 34(6), 964-
970.
Shokhor, S., & Shigapov, A. (2013). U.S. Patent No. 8,560,709. Washington, DC: U.S. Patent
and Trademark Office.
Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: principles and
practice (Vol. 6). London: Pearson.
Vaishnavi, V. K., & Kuechler, W. (2015). Design science research methods and patterns:
innovating information and communication technology. Crc Press.
Williams, B. O., Lohner, M. K., Harmon, K., & Bower, J. (2014). U.S. Patent Application No.
14/558,536.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13INFORMATION AND COMMUNICATION TECHNOLOGY
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]