IT Infrastructure Management Report: Real Estate Sector and ICT Impact

Verified

Added on  2020/02/18

|19
|4429
|30
Report
AI Summary
This report provides a comprehensive analysis of IT infrastructure management within the real estate sector, focusing on the impact of Information and Communication Technology (ICT). The report begins with an introduction to the subject, specifically examining the realestate.com.au platform. Part A delves into the internal and external analysis of the sector, employing a SWOT (Strengths, Weaknesses, Opportunities, Threats) analysis to evaluate the benefits, risks, and opportunities presented by ICT, particularly through Building Information Modelling (BIM). The analysis includes strengths such as time and cost savings, and weaknesses like the lack of collaboration among different occupations and high initial software costs. Opportunities include staying connected with BIM international leaders and learning new skills, while threats include the potential disruption of traditional working procedures. Part B concentrates on cybersecurity, compliance, and business continuity, addressing cybercrimes, IS vulnerabilities, fraud prevention, information assurance, network security, internal control, and business continuity. It explores topics such as malware attacks, social engineering, advanced persistent threats, and hacktivist motivations. The report also discusses vulnerabilities related to passwords, internal threats, and risks associated with cloud computing and social networking. The Defense-in-depth model is also mentioned as a multi-layered initiative by InfoSec. The conclusion summarizes the key findings and the references are provided at the end.
Document Page
Running head: IT INFRASTRUCTURE MANAGEMENT PG
IT Infrastructure Management PG
Name of the Student
Name of the University
Author’s note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1IT INFRASTRUCTURE MANAGEMENT PG
Table of Contents
Introduction................................................................................................................................2
Part A.........................................................................................................................................2
Internal Analysis....................................................................................................................2
Strengths.............................................................................................................................2
Weakness............................................................................................................................3
External Analysis...................................................................................................................3
Opportunities......................................................................................................................3
Threats................................................................................................................................3
SWOT Template....................................................................................................................4
Part B..........................................................................................................................................7
Cyber Security, Compliance, and Business Continuity.............................................................7
1. Up Close Look at Cybercrimes, Criminals, and Motivations............................................7
2. IS Vulnerabilities and Threats............................................................................................8
3. Defending Against Fraud.................................................................................................10
4. Information Assurance and Risk Management................................................................11
5. Network Security.............................................................................................................12
6. Internal Control and Compliance.....................................................................................12
Worldwide anti-fraud regulation......................................................................................13
7. Business Continuity and Auditing...................................................................................13
Task C......................................................................................................................................15
Conclusion................................................................................................................................16
References................................................................................................................................17
Document Page
2IT INFRASTRUCTURE MANAGEMENT PG
Introduction
Real estate in Australia is increasing day by day. Now, with the advent of ICT the real
estate can be largely benefitted. The realestate.com.au will be focused in this report. SWOT
analysis of the impact of ICT on the retail estate sector will be discussed in the report to find
the opportunities and the benefits as well as the risks associated within. The cybersecurity,
compliance and the business continuity has been discussed in the report as well.
Part A
The realestate.com.au has been focused in this report. Real Estate market works
almost similar to any other market and numerous management activities are involved and if
these processes are deployed significant profit can be gained. The ICT is a new initiative
which is going to change the real estate in mere future. With the advent of Big Data, the
business activities related to construction, design can be further furnished. The advanced IoT
sensors can be used further to collect and analyses data and can also be used to enhance
security. Building Information Modelling (BIM) can be utilised to monitor the lifecycle of a
construction building. BIM involves the complete monitoring from designing and
manufacturing, later the optimisation and examination of building manufacturing
components.
Internal Analysis
Strengths
BIM can save time and money for a particular project, so that time can be utilized into
undertaking other tasks. BIM provides the 3D design of the proposed project thus the model
can be better understood and for this reason, it can assist in the further construction of the
project (Laudon & Traver, 2013). BIM diminishes the errors incurred within the project
pretty early thus avoid the threats associated at the time of construction. BIM is utilised
Document Page
3IT INFRASTRUCTURE MANAGEMENT PG
widely in the construction industry ranging from mining, construction to facility
management.
Weakness
BIM does not cooperate among other occupations. It does not focus on providing
information rather it only focus on building. Various sectors of a company must work
collaboratively to effectively implement the BIM model (Laudon & Laudon, 2016). Though
BIM gives cost-effective solutions, initially a huge amount of money is required to
implement the software.
External Analysis
Opportunities
BIM assists and provides opportunities to stay connected with the BIM international
leaders in terms of education. BIM prescribes the whole construction model prior to the
construction starts (Anderson, 2014). BIM assists in learning new skills and methodologies in
the respective field.
Threats
BIM can heavily influence the traditional working procedure of the construction and
manufacturing industry sector and can even overtake the traditional industry as well (Khan et
al., 2014). The BIM construction companies are comparatively lesser in number; thus the
suppliers are quite less.
BIM short-term benefits
BIM details the construction process and also with that the required 3D model that
can ease the construction industry (Anderson, 2014). For this reason, the real estate sector
must adopt this technology, this can help them to build designs prior to construction
moreover it saves time.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4IT INFRASTRUCTURE MANAGEMENT PG
BIM midterm benefits
BIM can help them to diminish the waste of time and money, it will help them to find
out the risks and threats prior and also help them to mitigate those risks prior to construction.
BIM helps to monitor the construction lifecycle all throughout so it will generally help to
reduce the errors incurred (Laudon & Laudon, 2016). Thus BIM can increase overall
productivity in real estate sector.
BIM long-term benefits
Though a huge capital investment is required initially, in the long run, BIM will help
the real estate sector to conduct business activities in quick times and in a profitable way.
BIM' s 3D model technology will help to conduct each and every project in an effective
manner (Laudon & Traver, 2013). Thus the real estate sector can earn huge revenues with the
help of BIM software.
SWOT Template
SWOT Template
Organisation: realestate.com.au Date: 19/09/2017
Building Information Modelling (BIM) can be utilised to monitor the lifecycle of a
construction building. BIM involves the complete monitoring from designing and
manufacturing, later the optimisation and examination of building manufacturing
components.
Strengths
i. BIM can save time and money for a
particular project, so that time can be utilized
Weakness
i. BIM does not cooperate among other
Document Page
5IT INFRASTRUCTURE MANAGEMENT PG
into undertaking other tasks.
ii. BIM provides the 3D design of the
proposed project thus the model can be better
understood and for this reason, it can assist in
the further construction of the project.
iii. BIM diminishes the errors incurred within
the project pretty early thus avoid the threats
associated at the time of construction.
iv. BIM is utilised widely in the construction
industry ranging from mining, construction to
facility management.
occupations.
ii. It does not focus on providing information
rather it only focus on building.
iii. Various sectors of a company must work
collaboratively to effectively implement the
BIM model.
iv. Though BIM gives cost-effective
solutions, initially a huge amount of money is
required to implement the software.
Opportunities
i. BIM assists and provides opportunities to
stay connected with the BIM international
leaders in terms of education.
ii. BIM prescribes the whole construction
model prior to the construction starts.
iii. BIM assists in learning new skills and
methodologies in the respective field.
Threats
i. BIM can heavily influence the traditional
working procedure of the construction and
manufacturing industry sector and can even
overtake the traditional industry as well.
ii. The BIM construction companies are
comparatively lesser in number; thus the
suppliers are quite less.
BIM short-term benefits
Document Page
6IT INFRASTRUCTURE MANAGEMENT PG
BIM details the construction process and also with that the required 3D model that can ease
the construction industry. For this reason, the real estate sector must adopt this technology,
this can help them to build designs prior to construction moreover it saves time
BIM midterm benefits
BIM can help them to diminish the waste of time and money, it will help them to find out the
risks and threats prior and also help them to mitigate those risks prior to construction. BIM
helps to monitor the construction lifecycle all throughout so it will generally help to reduce
the errors incurred. Thus BIM can increase overall productivity in real estate sector.
BIM long-term benefits
Though a huge capital investment is required initially, in the long run, BIM will help the real
estate sector to conduct business activities in quick times and in a profitable way. BIM' s 3D
model technology will help to conduct each and every project in an effective manner. Thus
the real estate sector can earn huge revenues with the help of BIM software.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7IT INFRASTRUCTURE MANAGEMENT PG
Part B
The chosen topic for the Part B section of this report is Cyber Security, Compliance,
and Business Continuity.
Cyber Security, Compliance, and Business Continuity
1. Up Close Look at Cybercrimes, Criminals, and Motivations
Cybersecurity threats are emerging day by day due to the following vulnerabilities-
the malware attack, the lost disks and the threatening DDoS attacks which involve the
unauthorized system access. The other kinds of threats that are emerging right now are
persistent threats, social web media for social engineering. Social engineering consists of two
two procedures-
i. Pretexting- this method involves playing some sorts of tricks to convince
individuals by the hackers to acquire secret information from the individuals (Morano, Tajani
& Locurcio, 2015).
ii. Baiting- offer incentive to individuals and the individuals falls into the trap of the
greed and perform actions which are not secured.
Advanced persistent threat attacks (APT)
APT involves attack of intruders over an insecure network over years and gain
unauthorised access to steal the important data. APT can be a threat to the national defence
system and also the national finance system (Levy, Yu & Prizzia, 2016). They do not cause
any damage to the system as the intruders do not want to reveal their presence.
Hacktivists’ Motivations and Dangerous Pranks
Document Page
8IT INFRASTRUCTURE MANAGEMENT PG
They generally target the national or government website and resources and make it
vulnerable thus they steal all vital information. This is because of the insecure network
system and the weak security architecture (Furfaro, Gallo & Saccà, 2016). All these gave
them the opportunities to get into the loopholes and steal information for their benefits.
Hacktivist Attacks and Victims
The intruders generally carried out their attacks by the in the form of data breaches,
data leaks, data theft, threats and privacy invasions. For instance, they attacked Sony in the
year 2011 and their system and the database got compromised and the sensitive information
of the customers got leaked (Dhillon, 2015). The Sony PlayStation Network, Sony Online
Entertainment got hacked and in this way, they lose market share, customer base and at the
end lose reputation.
Thus it is absolutely necessary to secure the website and web resources. The web data
and web resources must be made accessible all the time having restriction access,
implementation of rules and regulations with respect to proper use of hardware and software
solutions must be capable to detect and handle any issues or any kind of security breaches
(McCollum, 2016). The system and the database must be made compliant to recover back
from any kind of disasters and disruptions occur within the network.
2. IS Vulnerabilities and Threats
The vulnerabilities and threats of the system and the database are the malware attacks.
He malware attacks involve the virus attacks, Trojan attack, spyware and any kind of
unwanted programs. These can cause disruptions in any enterprises and the business
operations suffer due to those data breaches and unauthorised access (Carter & Zheng, 2015).
The vulnerabilities and the threats generally affect the confidentiality, integrity and the
availability of resources.
Document Page
9IT INFRASTRUCTURE MANAGEMENT PG
Confidentiality refers to the authorized access of individuals and thus ensures
protection and privacy of data, only the legitimate users can gain access to the system.
Integrity refers that the assets should not be modified or altered by any means of
unauthorized access to the system and the database.
Availability refers to the portion of assets which can be accessed and modified at the
time of need and those can be modified or altered by authorized users only (Ojeka, Ben-Caleb
& Ekpe, 2017).
Passwords: The passwords can protect one's system and the database from
unauthorised access. The password must be strong enough so that the intruders cannot
discover that.
Internal threats: The internal threats involve the insiders or the employees of the
organisation. This kind of malicious activity generally carried out by the employees and the
intruders and to assure protection from all these kinds of security attacks firewalls, intrusion
detection system must be applied (Gordon & Gordon, 2016).
Cloud Computing and Social Networking Risks: Cloud Computing is vulnerable if
the security framework used is not secure enough if the hardware, software and the
applications are not properly updated time to time. Again, the sharing of personal files, data,
images and videos via social media and the social networking sites can lead to the violation
of privacy. The intruders can use the media for the benefits, can modify the personal data and
in this way, one's reputation can be at risks.
Defense-in-depth model: The Defense-in-depth model is a multi-layered initiative
taken by InfoSec. The procedure lies within, if any layer fails, the other layers come to the
rescue, in this way a system can be saved from data breaches to the utmost. For instance, the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10IT INFRASTRUCTURE MANAGEMENT PG
wireless network connectivity fails to protect data, and then the next layer or the next
procedure can protect the data (McCarthy et al., 2016). By means of encrypting data, the data
can be protected from all kinds of breaches. However, the process infosec have adopted are-
i. Senior management commitment and their support
ii. Policies and IT training
iii. Procedures involved it IT security
iv. Keeping the hardware and software solutions up to date all the time.
Unintentional threats involve the human errors, environmental hazards and the
failures of the computer system. Al these cause disruptions and malfunctions within the
computer system. This can cause the disruptions within the business activities as well.
Intentional threats involve the botnets, spyware, adware, spam and phishing and all
these activities require human interactions and they are generally carried out by intruders to
steal personal information and resources (Slusky & Goodrich, 2016).
3. Defending Against Fraud
Insider fraud: Insider fraud refers to the intentional use of one’s information and
assets for misuse purpose or to conduct any crime within. The insider frauds are carried out
by internal employees of a company and the contractors for personal benefits. Special
measures should be adopted to prevent this sort of attacks.
Internal fraud detection and prevention: The internal fraud detection and prevention
can be carried out by respective companies. The companies should take harsh decisions and
also should educate the employees with the fact that they are under constant vigilance of the
company’s supervisors and any kind of fraud will not be entertained (Furfaro et al., 2016).
Document Page
11IT INFRASTRUCTURE MANAGEMENT PG
4. Information Assurance and Risk Management
The defence strategies will be described as follows-
i. Prevention and deterrence: Proper security measures can assist in preventing any
errors occur within, it also prevents the intruders to attack one’s system, the proper security
measures also help in denying unauthorised access.
ii. Detection: The proper security measures undertaken help to detect any attack or
any malfunctions occurring within the system and the database.
iii. Introduction of the fault-tolerant system: The fault tolerant system is responsible
to perform operations in the system when the system is malfunctioned. The fault tolerant
system can also be referred as safe mode (Slusky & Goodrich, 2016).
iv. Recovery: A recovery plan must be prepared based on the damaged information
system so that the data can be recovered quickly and the business operations can be started as
early as possible.
v. Correction: Security measures must be taken to fix any sort of damages within the
system and the database and these corrections will make the system to work as early as
possible. It will also assure that these kinds of disruptions will not occur again.
vi. Awareness and compliance: All the companies must be knowledgeable and stay
educated about all the security measures. The management team along with the employees
must be aware of the security control measures and the defence strategies to conduct business
activities well.
The defence control can be classified into general control measures and physical
control measures. The general control can be classified into physical control, access control,
data security, communication, administrative, the access controls can again be classified into
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]