Report: Network Security Analysis for ICT Business

Verified

Added on  2020/07/22

|13
|4505
|345
Report
AI Summary
This report examines the network security challenges faced by an ICT firm, focusing on the importance of protecting data and information from unauthorized access. It provides an overview of network security, emphasizing the role of network administrators and the measures taken to safeguard data. The report delves into various web application types, including static, dynamic, e-commerce, and animated applications, highlighting their features and suitability for different business needs. It also discusses content management systems and different security applications like Android Device Manager and AVG Antivirus. The report underscores the need for robust security measures to protect against threats and ensure the integrity of network infrastructure, providing valuable insights for ICT businesses aiming to enhance their data protection strategies.
Document Page
REPORT
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
EXECUTIVE SUMMARY
Information technology is the combination of 3 basic elements that includes decision
support, computational data processing and business software. Information and communication
technology is considered as the activities that are used in maintaining broadcast media,
telecommunication, exchange of information, intelligent building management system,
transmission system audio-visual communication processing and some activities that are based
on control and monitoring of network (Kahate, 2013). ICT is a small business consultancy
related with network and software. The firm is working for last five years, in respect of providing
best security and technology services to their customers. The company put its affords to explore
their business in various branches and want to capture a wide area of Australia or worldwide.
There are so many options available for firm to explore their business and increase profit. Major
scope for company is to produce more effective applications for securing data and network.
Network is an essential term which used to establishes an effective connectivity among
various servers. Large number of people are using various different type of networks for their
work in order to finding effective result and findings. There are so many hackers and virus are
available which has directly impacted on the overall network and can easily hack the data and
information which are go through form the network.
Hackers are the most disturbing elements of the society who hack important data and
information which are having value for an individual. Through this they can harm and black
male people in terms of money. So network security agencies put their best efforts to provide
high range of security to their network, so that no one can hack their data and information.
Organisations faces various issues related with network and this may cause bad impact on
organisational work. Investigator faces so many issue regarding collecting data and information.
It is not easy to gather proper information about network security form a single source because it
is very tedious topic of networking (Livingstone, (2012)). For collecting proper data and
information researcher use various different source and networks. For this present report it has
been founded that company needs to adopt various tools and techniques for resolving the issues
which are arises form the network threats. Company provide various laws and legislations in
order to provide high quality services to their potential customers.
Document Page
Table of Contents
EXECUTIVE SUMMARY ............................................................................................................2
INTRODUCTION ..........................................................................................................................1
SECTION: NETWORK SECURITY ...........................................................................................2
CONCLUSION ...............................................................................................................................7
RECOMMENDATION .................................................................................................................8
REFERENCES ...............................................................................................................................9
Document Page
INTRODUCTION
Network security is described as a process which taking software and physical obstructive
measures to provide protecting criteria to the underlying network infrastructure from the
unlicensed misuse, access, malfunctions, destructions, modifications or improper discloser
(Castellucci & et. al., 2013). It helps in developing a safe and secure platform better accessing of
computer networks and network accessible resources. An organisation hires well educated people
in their firm who are having a significant knowledge about computer and software technology and
he or she is responsible for all activities in firm related with network and software. In an
organisation network security is handled by network administrator. Network security is
considered as some set of activities that used to protect the integrity and accessibility of
information, data and network. In this software as well as hardware are involved. Organisations are
focused towards developing an effective network security environment for protecting network
from threats and unauthorised accesses. In today’s scenario every business organisation run their
activities through internet and technology for providing best and suitable services to customers and
clients. Some important activities are conducted by firm for protecting data and information. With
the use of smart technology people can share and transfer personal and sensitive information. ICT
is a small business organisation that is based in Melbourne. The firm was established before 5
years ago. It mainly focuses on providing best and high range internet and security system to their
customers for protecting data and information from unauthorised elements that may impact the
overall condition of firm (Bhuasiri and et. al., (2012)). They mostly give services to small and
medium size organisations in respect of earn profit. Now a day they are focuses on maximising
profit and growth of company. There is huge requirement of technology in organisation because
the overall work is based on computers and internet. These are helpful in making human life more
easy and comfortable.
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SECTION: NETWORK SECURITY
Network security is consisting as a complicated subject which is not easy to handle by any
one, only trained and experienced people can handle the conflicts and problems related with
internet and network. For resolving these kind of problems person need to do study about the
various facts that are included in this. It has a great impact on human’s life. Network security
describe as the security of practices and policies that are assumed to resolve and handle misuse,
unauthorised access of various networks and computers. Network administrator is responsible
for managing and controlling all authorised data that are integrated in network security. It is
required for user to choose or get some detail in the form of ID, password and authenticating data
which give permission to access program and information in between their authority. The most
developing criteria of network security is to customise applications with more advance and unique
features for protecting their data and information from unauthorised access (Khakzad, Khan, F., &
Amyotte, 2013). In today’s scenario mostly big as well as small organisation are using various
network and technology for growth and success. These are secure in nature but some time due to
hackers and unauthorised users the security of data has fall down . Company hire experienced
people with extraordinary knowledge and skill to give a proper solution for problem and conflict
that are arises due to lack of network security. Every organise run or manage their work on the
basis of different application programme and software’s. These applications play an essential role
in every business firm, some are described as below:
Static web application: These type of application is not appropriate for every firm because
it gives very small content. These are not flexible in nature so small firms are usually adopt this
application for access less important information and document. Static web applications are mainly
customising in HTML and CSS, these are major developers of this application but user can use
Query and Ajax on the basis of their own need. I this app user can emerge animated elements such
as pictures, graphs, banners and videos for making their application more attractive and effective.
In this application modification of data and content is not easy and for make changes an effective
complicated procedure has to be followed by user. First of all, HTML code has to be download for
create changes and then send all content back to the server (Li & et. al., 2014) These kind of
modifications can be possible by webmasters or application developer organisations who are
designed to resolve such type of issues. This is mainly used by the small business enterprises who
2
Document Page
are deal in very less capital, in this very small number of data and information has to be delivered,
this is not significant or appropriate for large business firms.
Dynamic web application: It is very complicate and complex in technical level. In this
database management system has to be used for loading data and its contents are easily updated
while user access or use them in appropriate manner (Term, 2017). An administrator can easily
modify and make changes in the application content with the use of administration panel in the
form of image, graph and text. For developing dynamic web application various differs languages
are being used. Structuring of content is very important aspect and for this ASP or PHP languages
are used for giving a proper frame to the contents. Without creating modification, it is not possible
to access the server for updating the content. It gives permission to user to establish a great
quantity features like databases and forums. The firms who are dealing in technical equipments
and complex business environment are using this application for updating their important data and
information in a right manner. The administrator of firm known the actual working procedure of
various equipments which are used by firm, so that they can easily operate them and resolve the
problems and issues.
Shop online or e-commerce: M-commerce or e-commerce are helpful in reassembling the
site or server if the web application is in the form of online store. These kind of process are very
much hard to access or develop because there is huge integration of electronic payment method
that has to be made by pay pal, credit card or many other methods. An management panel has to be
used by administrator for listing new goods, delete old entries, update products, payment and
manage applications that are used in different function (Ma & et. al., 2012).
Portal web app: With this app it is possible for user to access various alternative
categories, section on a single home page. This is a combination of various aspects that are used to
access a server such as chats, mails, forums, browser, area of access. This allow a user after
registering on the latest content.
Animated web application: This is most popular application that is used in very wide
range. This is developed through plash technology. This approach helps to show various animated
effects to give an effective impression on clients. This is widely used by designers and creative
directors for making innovative and effective changes in respect of attracting clients and
customers. The major weakness of this app is that it is not suitable for web positioning and
optimization of SEO.
3
Document Page
Web applications with a content management system: It is necessary to update the content
regularly for developing web application. The major element is installation of content management
system, it is used by administrator for making changes and modification. Some important content
management systems are described as under: Work press: It is an essential widespread management in which plenty of information,
tutorials and guides. This helps the user to develop and customise information and better
understanding of work. Joomla: It comes in exist after word press, it is very intuitive in nature and does not have
large number of users but have variety of communities (Shin & Gu, 2012, October).
Drupal: It is most effective software of CMS; it is designed for establishing communities.
These are the most usable and common content pages that are available for users to access
data and information.
Type of different information and security application:
Security is essential for every business firm or human’s normal life (Ur & et. al., 2012,
July). Every people want some kind of privacy in their life, so their use various application that
provide safety and security to their personal data and information. Some are describing as under:
Android device manager: this is most popular application that have been used by large
number of people or organisation to manage their data and information. Due to reason of hackers
and unauthorised access organisation need a software or application for protecting their
confidential information from authorised users. They hack all personal detail of people as well as
firm and used them negatively. This application is an anti-theft service, it available on every
google devices. User can easily access anytime with the use of google setting on the android
devices. This application is application is applicable for android devices (Morrow, 2012) . It starts
working with the activation on web user can having the authority of android device manager and
able to make changes and sorts the things. It provides the service of wiping and locating the device
in this an alarm facility is available for getting the notification about the work. There are so many
anti-theft options are available for providing security and safety like Cerberus.
AVG Antivirus: It is considered as antivirus guard, it is most popular and leading antivirus
for protecting data and information that are available on different devices. It gives high rang
security to applications and software that are related with android systems. It is famous for
providing antivirus or computer security services for windows, OSX, IOS, Linux and various
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
operating systems. Large number of people and organisations are attracting towards this because of
its high quality antivirus software (Cardona, Kretschmer & Strobel, (2013)). Big firms and an
individual use this application for giving advance protection through AVG antivirus and security.
Now a day AVG introduces a PC performance optimization utility that is known as AVG pc. It
provides services to their users for making solutions for medium and small firms who are using
home packages and AVG email server editions.
Signal private messenger: It is a kind or messaging app which is as similar to other
messaging application like messenger, WhatsApp etc. it is mainly focuses on privacy and security
rather than any kind of other facility. It is famous for its security features, in which there is not any
chance of hacking or leaking any data and information. It is used by high profile information
technology companies for protecting their personal information in an effective manner. It is easy to
use and easily available for chrome, iOS and android. Along with it also provide service of many
protocols related with security such as basing tools and techniques for messaging which is
necessary for user, group chats for transferring data and information to various people in same
time. Reading receipts, emoji and voice and video call services for giving an effective
communication channel among people (Perlman, Kaufman & Speciner, 2016).
These all above mentioned application are used by small as well as large business firms for
providing safety and security to their users due to hacking and leakage of personal information.
Now a day ICT focuses on effective implementation of their new project in which they sign
an agreement with large organisations to develop application in house and customise off the shelf
software on the basis of requirement of customer. The major purpose of conducting this report is to
find out the advantages and disadvantage of the network security. This report helps to identifying
the actual impact of network security in an organisation or for an individual. The major key issue
of the research is that it is hard to find out the hacker who is responsible for dis management of the
network. Now a day every firm is depend of effective functioning of network and technology for
effective implementation of work. The major work of this organisation is to develop and customise
various applications that are related with network and information security. They mainly give
services to small business enterprises for protection of their network and information from various
hackers and unauthorised elements (Edmunds, Thorpe & Conole, (2012)). Network and
technologies having various advantages as well as disadvantages also. It is required for firm or an
individual to make some significant efforts in order to resolve the issues which are causes through
5
Document Page
the network. A bad network cause very bad image of firm who is responsible for providing g
network security and connection to the people who are willing to taking the advantage of network
services.
Computers and its networks are widely used by large as well as small business organisation
in respect of increasing profit and revenue for company (Yu and et. al., (2012)). For resolving the
issues and conflicts related with network security and cyber security has been established. Rules
can be describes as the type of signatures but policies can be considered as the combination of
various rules. Protocols refers to collection of several policies which are used according to the
various environment of network. Large number of protocols applied to transfer several type of
data, in computer network is an essential term. The widely used protocol is HTTP hyper text
transfer protocol which helps in transferring data and information without any risk and issue. It
helps in defining the way how messages are formatted or transmitted. There are so many threats
attacks to the computer network, this protocol helps in exploiting the breaches of network security.
Some major issue of network securities are described as under:
Route injection attacks is the major issue of networking and this arises through router
updates and can cause flow of unauthorised destinations.
Masquerading takes place when an attacker influence IP packets to distort the actual IP
address. This is used for access the fake and false data into a secure network in order to
gaining unauthorised access.
Deployment of appropriate security detection, poor configuration, mechanism prevention
and so many network tools can generate serious issues.
So many other issues are also affect the security of network, so it is required for each company to
take appropriate action for providing security to their networks form various attechers.
Information and communication technologies is the wide area of outstanding relevance of
public life. This can be describes as the process in which information exchange and development
of interactive communication are involved (Michaels, Natraj & Van Reenen, (2014)). In ICT
various things are emerged such as internet banking, development related with interactive
communication or information exchange automation of manufacturing, computerization, computer
network, systematisation of data in database and plate form of collaboration.
6
Document Page
CONCLUSION
A major outcome from this report is that with highly advancement of time, there are vast
number of viruses and hackers are identified which used to perform some unnecessary activities
which lead to affect society. Many new and advanced applications are already in demand. Business
firms whether they are small or large utilise them in working with more efficiency. Thus,
organisation which are usually related with information and technology have to work in an
appropriate manner without harming society and environment. For this purpose, a major path is
identified which is recognise as Robotics because in near future mostly work get done through
robots as a substitute of human beings. The major work of any firm is to provide an effective
network through which they can easily communicate with others and can easily do their work in
most effective manner. The company needs to ensure their customers for rendering high quality
security measures to them in respect of securing the data and information. The big firms spend
huge amount of money in arraigning of proper and secure measured of security, so their
confidential data and information can be transect through secure and safe media. It gives beneficial
and comfortable working environment to company and their employees but due to problem in
network confidential information will be leaked and company may face loss situation. Robots are
eco friendly and same as human beings but they do not have feelings at all. Thus, they never try to
harm environment, society and their programmes are highly set up so they aware about all rules
and regulations which relates with them. Hence, this is considering as major thing for protecting
each and every sort in an appropriate manner without harm user base and their information.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
RECOMMENDATION
ICT organisations use some number of applications which are helpful for managing all the
things properly, an organisation have to find out the deviations which are taking place at the time
when they are working on any project. It is very essential for them to take appropriate decision on
the basis of all differences which are identified by them. For this context, authority have to
measure number of variances which are taking place during in managing and protecting the detail
of their users but some of the time it gets identified that few major viruses affect their highly
protected data base. For this purpose, they have to use variety number of approaches through
which they can improve their services.
Have to take care about society in which their customer’s welfare is must. Many
viruses affect directly the personal information of users thus management have to
protect their system by highly secure things and application which aid them in
securing their database.
Also, they have to identify the number of laws which are framed under this
circumstances so that their number of users get quality services without any problem.
Always follow the ethical norms under which try to protect data and personal
information of clients which create a feeling of security and satisfaction in number of
users which is must for an organisation.
For protecting any sort of data management have to use robot for this purpose who are
highly advanced in technology. This advancement leads to manage their working because it
became easy for them to protect data from any unwanted external factors. This factor aids
them in protecting their data and users from any other else. Their clients lead to get satisfy
from such practices and become happy because their information is protected from other
personalities.
8
Document Page
REFERENCES
Books and Journals
Castellucci, L. A. & et. al., (2013). Efficacy and safety outcomes of oral anticoagulants and
antiplatelet drugs in the secondary prevention of venous thromboembolism: systematic
review and network meta-analysis. Bmj. 347. f5133.
Khakzad, N., Khan, F., & Amyotte, P. (2013). Dynamic safety analysis of process systems by
mapping bow-tie into Bayesian network. Process Safety and Environmental Protection.
91(1). 46-53.
Li, L. & et. al., (2014). The efficacy and safety of different kinds of laparoscopic cholecystectomy:
a network meta analysis of 43 randomized controlled trials. PLoS One. 9(2). e90313.
Ma, X. & et. al., (2012). Design and analysis of a robust broadcast scheme for VANET safety-
related services. IEEE Transactions on Vehicular Technology. 61(1). 46-61.
Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data.
Network Security. 2012(12). 5-8.
Shin, S., & Gu, G. (2012, October). CloudWatcher: Network security monitoring using OpenFlow
in dynamic cloud networks (or: How to provide security monitoring as a service in
clouds?). In Network Protocols (ICNP), 2012 20th IEEE International Conference on (pp.
1-6). IEEE.
Sievert, D. M., & et. al., (2013). Antimicrobial-resistant pathogens associated with healthcare-
associated infections summary of data reported to the National Healthcare Safety
Network at the Centers for Disease Control and Prevention, 2009–2010. Infection Control
& Hospital Epidemiology. 34(1). 1-14.
Tankard, C. (2012). Big data security. Network security. 2012(7). 5-8.
Yu, F., and et. al., (2012). An ICT-based strategy to a colorimetric and ratiometric fluorescence
probe for hydrogen sulfide in living cells. Chemical Communications, 48(23), 2852-2854.
Michaels, G., Natraj, A., & Van Reenen, J. (2014). Has ICT polarized skill demand? Evidence
from eleven countries over twenty-five years. Review of Economics and Statistics, 96(1),
60-77.
Livingstone, S. (2012). Critical reflections on the benefits of ICT in education. Oxford review of
education, 38(1), 9-24.
Bhuasiri, W., and et. al., (2012). Critical success factors for e-learning in developing countries: A
comparative analysis between ICT experts and faculty. Computers & Education, 58(2),
843-855.
Cardona, M., Kretschmer, T., & Strobel, T. (2013). ICT and productivity: conclusions from the
empirical literature. Information Economics and Policy, 25(3), 109-125.
Edmunds, R., Thorpe, M., & Conole, G. (2012). Student attitudes towards and use of ICT in
course study, work and social activity: A technology acceptance model approach. British
journal of educational technology, 43(1), 71-84.
Stockhammer, T. (2011, February). Dynamic adaptive streaming over HTTP--: standards and
design principles. In Proceedings of the second annual ACM conference on Multimedia
systems (pp. 133-144). ACM.
Jiang, J., Sekar, V., & Zhang, H. (2012, December). Improving fairness, efficiency, and stability in
http-based adaptive video streaming with festive. In Proceedings of the 8th international
conference on Emerging networking experiments and technologies (pp. 97-108). ACM.
9
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]