University: 10 Advanced Network Topics, Management and Security Report
VerifiedAdded on 2020/05/11
|12
|4135
|117
Report
AI Summary
This report focuses on advanced network topics, management, and security for STP Ltd. It begins with a background of the project and explains how it supports future growth by implementing advanced technological tools. The report outlines the project's scope, goals, and strategic alignment, including a SWOT analysis. Key areas covered include network security, securing data through internal and external measures, and addressing threats. The report also addresses mobile device security, hardware purchases, business continuity planning, and risk management. Recommendations are provided to ensure the long-term success and security of STP Ltd's network infrastructure and data, emphasizing the importance of employee training and the implementation of robust security protocols to safeguard against internal and external threats. The report concludes with a comprehensive overview of the findings and offers actionable insights for improving the overall security posture.

1
Advanced Network Topics, Management And Security
<Student ID>
<Student Name>
<University Name>
Advanced Network Topics, Management And Security
<Student ID>
<Student Name>
<University Name>
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2
Contents
Background of the project...............................................................................................................3
How is this project going to support the future growth of STP?.................................................3
Scope of the project......................................................................................................................3
Goal of the project........................................................................................................................4
Strategic alignment of project......................................................................................................4
Network security..............................................................................................................................5
Securing data................................................................................................................................5
Procedures, people, policies, and products..................................................................................6
Security and privacy systems.......................................................................................................6
Other important threats................................................................................................................6
Mobile device security.................................................................................................................7
Plan for the hardware purchases......................................................................................................8
Business continuity..........................................................................................................................8
Risk management.............................................................................................................................9
Conclusion.......................................................................................................................................9
Recommendations..........................................................................................................................10
References......................................................................................................................................10
Contents
Background of the project...............................................................................................................3
How is this project going to support the future growth of STP?.................................................3
Scope of the project......................................................................................................................3
Goal of the project........................................................................................................................4
Strategic alignment of project......................................................................................................4
Network security..............................................................................................................................5
Securing data................................................................................................................................5
Procedures, people, policies, and products..................................................................................6
Security and privacy systems.......................................................................................................6
Other important threats................................................................................................................6
Mobile device security.................................................................................................................7
Plan for the hardware purchases......................................................................................................8
Business continuity..........................................................................................................................8
Risk management.............................................................................................................................9
Conclusion.......................................................................................................................................9
Recommendations..........................................................................................................................10
References......................................................................................................................................10

3
Background of the project
How is this project going to support the future growth of STP?
The main target of this report is to describe about the installation and use networking services at
STP Ltd. The entire focus of the report is based on the networking environment as well as with
the association the employees. Various numbers of strategies are provided for the longevity of
the business and also to assist the management process for better decisions. The aim of the
project is to provide the streamlined approach to the firm operation which will enable the
employees to have the tools that would help them to expand the business as well as the
customer's base (Elkhodr, Shahrestani & Cheung, 2016). This report has several facts and figures
that will be helpful for supporting the future requirements of the STP without compromising on
the quality as well as on the networking services. The technical skill of each employee will be
enhanced through certain programs and skills that will help the organization in achieving their
goals. In order to increase the growth of the business, it is necessary to implement the advanced
technological tools into the organization which will make the work easier as well as faster
(Garcia-Alfaro, et al., 2015). The implementation of the tools needs proper knowledge and
experience which will automatically empower the employee to get the success by properly
integrating the facilities in the real-time report. With the help of the new information system
manager, the developments will be more in the company regarding the enhancement of the
technical skills of the employees, to increase the growth of the business as well as to improve the
strategic goals of the sales at the STP.
Scope of the project
The aim of this project is to enhance the knowledge of the employee regarding the new
equipment that is invested by the owner of the STP. The advanced tools are far away from the
knowledge of the employee, so it is quite important for them to understand the facts about the
technical skills related to the tools. This report will show the best way to enhance their
knowledge regarding the technical skills which will support the growth of the company without
wasting a single penny as well as will protect the investment that is done by the owner
(Hatakeda, 2014). The scope is clear about the STP that aims to achieve the best strategic tricks
for the long continuity of the business without manipulating or changing the existing factors that
are necessary for the business.
Background of the project
How is this project going to support the future growth of STP?
The main target of this report is to describe about the installation and use networking services at
STP Ltd. The entire focus of the report is based on the networking environment as well as with
the association the employees. Various numbers of strategies are provided for the longevity of
the business and also to assist the management process for better decisions. The aim of the
project is to provide the streamlined approach to the firm operation which will enable the
employees to have the tools that would help them to expand the business as well as the
customer's base (Elkhodr, Shahrestani & Cheung, 2016). This report has several facts and figures
that will be helpful for supporting the future requirements of the STP without compromising on
the quality as well as on the networking services. The technical skill of each employee will be
enhanced through certain programs and skills that will help the organization in achieving their
goals. In order to increase the growth of the business, it is necessary to implement the advanced
technological tools into the organization which will make the work easier as well as faster
(Garcia-Alfaro, et al., 2015). The implementation of the tools needs proper knowledge and
experience which will automatically empower the employee to get the success by properly
integrating the facilities in the real-time report. With the help of the new information system
manager, the developments will be more in the company regarding the enhancement of the
technical skills of the employees, to increase the growth of the business as well as to improve the
strategic goals of the sales at the STP.
Scope of the project
The aim of this project is to enhance the knowledge of the employee regarding the new
equipment that is invested by the owner of the STP. The advanced tools are far away from the
knowledge of the employee, so it is quite important for them to understand the facts about the
technical skills related to the tools. This report will show the best way to enhance their
knowledge regarding the technical skills which will support the growth of the company without
wasting a single penny as well as will protect the investment that is done by the owner
(Hatakeda, 2014). The scope is clear about the STP that aims to achieve the best strategic tricks
for the long continuity of the business without manipulating or changing the existing factors that
are necessary for the business.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4
Goal of the project
The target of this report is to manage the entire scenario by properly educating the employees
regarding the new advanced tools and security systems. The owner of the STP is quite worried
regarding the development of the business as the situation is getting different with the new
systems that are composed of new policies and regulations (Kapovits, et al., 2014). The only
objective was to deliver the inventory control device that would use by the employee in an
accurate and reliable manner. The owner wants to integrate the entire things into one way so that
the main goal can be achieved. To understand the requirements of the clients, to use the tools in
an efficient manner, to regulate the new systems properly within the organization and the work
keeping pace to pace with the policies and regulations of the new advanced technical system is
the goal of this project.
Strategic alignment of project
The intention of the project is to upgrade the information system that can easily identify the
evaluation techniques required for the business environment which mainly comes in the form of
the SWOT analysis. The strategies are applied in order to determine the rapid growth of the
business as well as to realize the benefits of the business which are obtained from the efforts of
the valuable tools that are a part of the business sustainable plan (Krishnaswamy, 2017). The
table contains the necessary details of the SWOT analysis that focuses on the strengths,
weaknesses, opportunities as well as on the threats that are possible to come in the near future.
Table SWOT analysis of the project
Inter POSITIVE NEGATIVE
Strengths Weaknesses
Goal of the project
The target of this report is to manage the entire scenario by properly educating the employees
regarding the new advanced tools and security systems. The owner of the STP is quite worried
regarding the development of the business as the situation is getting different with the new
systems that are composed of new policies and regulations (Kapovits, et al., 2014). The only
objective was to deliver the inventory control device that would use by the employee in an
accurate and reliable manner. The owner wants to integrate the entire things into one way so that
the main goal can be achieved. To understand the requirements of the clients, to use the tools in
an efficient manner, to regulate the new systems properly within the organization and the work
keeping pace to pace with the policies and regulations of the new advanced technical system is
the goal of this project.
Strategic alignment of project
The intention of the project is to upgrade the information system that can easily identify the
evaluation techniques required for the business environment which mainly comes in the form of
the SWOT analysis. The strategies are applied in order to determine the rapid growth of the
business as well as to realize the benefits of the business which are obtained from the efforts of
the valuable tools that are a part of the business sustainable plan (Krishnaswamy, 2017). The
table contains the necessary details of the SWOT analysis that focuses on the strengths,
weaknesses, opportunities as well as on the threats that are possible to come in the near future.
Table SWOT analysis of the project
Inter POSITIVE NEGATIVE
Strengths Weaknesses
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5
nal
To improve the sales
Allows the set up on the cloud
platform
nicely expanded the customer base
hard working staffs
bonding is between the staffs and
customers
staffs are not much skilled about
the new systems
policies and regulation are not
maintained properly
threat are more
lack of procedures and policies
External
Opportunities Threats
Connects more with the customers
using intelligence management
System integration
Empowerment of staffs
Misuse of data
Competitors in the marketplace
Network security
The network security is the activity designed in order to protect the usability as well as the
integrity of the network and data. The network security includes the software as well as the
hardware technologies. The effective network management helps to access the network in a
better way. It aims to stop the variety of threats from entering into the network that is operating
in a wide range of area (Li, et al., 2015). It combines with the multiple layers of the defenses that
are on the edge of the network. Each layer of the network security is responsible to implement
the controls as well as the policies. The users those who have the authorized access to the
network can access the data otherwise, the malicious users are strictly blocked from accessing
the data that carry the unknown services and threats.
With the rise in the digitization, the technological aspects of each organization are also
increasing. Due to the digitization, the entire world is changing. The way we work, talk, play and
listen is now completely different from the last decades. Everyone wants to access the best tool
that can easily solve the issues coming in the way. The managers or the security managers of eth
information technology are responsible for the entire set up and operation of the network. The
organizations want to deliver their services in time as well as with greater efficiency to the
nal
To improve the sales
Allows the set up on the cloud
platform
nicely expanded the customer base
hard working staffs
bonding is between the staffs and
customers
staffs are not much skilled about
the new systems
policies and regulation are not
maintained properly
threat are more
lack of procedures and policies
External
Opportunities Threats
Connects more with the customers
using intelligence management
System integration
Empowerment of staffs
Misuse of data
Competitors in the marketplace
Network security
The network security is the activity designed in order to protect the usability as well as the
integrity of the network and data. The network security includes the software as well as the
hardware technologies. The effective network management helps to access the network in a
better way. It aims to stop the variety of threats from entering into the network that is operating
in a wide range of area (Li, et al., 2015). It combines with the multiple layers of the defenses that
are on the edge of the network. Each layer of the network security is responsible to implement
the controls as well as the policies. The users those who have the authorized access to the
network can access the data otherwise, the malicious users are strictly blocked from accessing
the data that carry the unknown services and threats.
With the rise in the digitization, the technological aspects of each organization are also
increasing. Due to the digitization, the entire world is changing. The way we work, talk, play and
listen is now completely different from the last decades. Everyone wants to access the best tool
that can easily solve the issues coming in the way. The managers or the security managers of eth
information technology are responsible for the entire set up and operation of the network. The
organizations want to deliver their services in time as well as with greater efficiency to the

6
customers (Livraga, et al., 2016). They want to protect the demands of each customer without
compromising on the quality of services. Therefore, the network security helps to protect their
desires and the proprietary information from the malicious attacks of the insiders as well as from
the outsiders.
Securing data
STP has seen the significant growth in a very short period of time. But, due to the introduction of
new information systems into the organization has brought the new challenges as well as
responsibilities towards the business environment of the STP. The most critical factor of this
scenario is all about securing the data (Li, et al., 2016). The management of the data of the
information security can be applied through various means-external and internal. The internal
security systems deal with the procedures that are related to the employees, policies as well as
with the products.
In the world of digital marketing, securing the data means getting more serious about the
information security (Li, et al., 2016). Protecting the data means to secure the data from the
fraud and malicious attackers, and to safeguard the data for the reputation of the firm. The
magnitude of the risks needs to be analyzed when the situation comes to the data theft. The cloud
platform provides the best services for securing the data as the storage space is more as
compared to any other platform. The business should remain vigilant regarding the security
systems in the cloud platforms (Mahdi, Alhabbash & Naser, 2016).
Procedures, people, policies, and products
There are several procedures applied to the STD Ltd's information security for enhancing the
policies and regulation of the company. Improvement in the policies patterns helps the
technicians to learn more about the network system as well as to configure it easily. The rules are
associated with the router which is considered as the most important device of the entire security
system. The policies are applied to the employees for dealing with the new security information
systems as well as to access the data out of it (Pappalardo, et al., 2014).
Security and privacy systems
The internet security provider (ISP) provides the secure WAN connection that helps to safeguard
the connection from the malicious attacks of the attackers both from the inside as well as outside
customers (Livraga, et al., 2016). They want to protect the demands of each customer without
compromising on the quality of services. Therefore, the network security helps to protect their
desires and the proprietary information from the malicious attacks of the insiders as well as from
the outsiders.
Securing data
STP has seen the significant growth in a very short period of time. But, due to the introduction of
new information systems into the organization has brought the new challenges as well as
responsibilities towards the business environment of the STP. The most critical factor of this
scenario is all about securing the data (Li, et al., 2016). The management of the data of the
information security can be applied through various means-external and internal. The internal
security systems deal with the procedures that are related to the employees, policies as well as
with the products.
In the world of digital marketing, securing the data means getting more serious about the
information security (Li, et al., 2016). Protecting the data means to secure the data from the
fraud and malicious attackers, and to safeguard the data for the reputation of the firm. The
magnitude of the risks needs to be analyzed when the situation comes to the data theft. The cloud
platform provides the best services for securing the data as the storage space is more as
compared to any other platform. The business should remain vigilant regarding the security
systems in the cloud platforms (Mahdi, Alhabbash & Naser, 2016).
Procedures, people, policies, and products
There are several procedures applied to the STD Ltd's information security for enhancing the
policies and regulation of the company. Improvement in the policies patterns helps the
technicians to learn more about the network system as well as to configure it easily. The rules are
associated with the router which is considered as the most important device of the entire security
system. The policies are applied to the employees for dealing with the new security information
systems as well as to access the data out of it (Pappalardo, et al., 2014).
Security and privacy systems
The internet security provider (ISP) provides the secure WAN connection that helps to safeguard
the connection from the malicious attacks of the attackers both from the inside as well as outside
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

7
of the organization (Pop, Zhu & Yang, 2017). The WAN connection ensures the necessary
infection and viruses that are a danger to the network. The confidence in the security systems of
exchanging the information can only be achieved by the ISP services.
Other important threats
The most of the threat is associated with the employees. They are considered as the important
factor for developing the information security of the company. They have limited knowledge of
the information security that is quite harmful to the growth rate of the organization. To secure the
data of the company, the knowledge about the new systems that are developed on the advance
version of the technologies should be learned by the employees in an efficient manner in order to
bring the profit as well as to increase the productivity. The network system needs to be updated
at a regular interval of time (Rittinghouse & Ransome, 2016). The firewall should be installed on
the device and the software should be updated regularly. Implementations of the strong
passwords are highly recommended by the security authorities of the company. The policies, as
well as the rules, should be implemented properly in order to protect the computer asserts as well
as to know more about the new systems (Schubert Jr & Kim, 2016). The policies and the new
rules will help the employee to know more about the advanced versions of the tools and
technology. The servers should be locked as soon as the user's work is done. The
implementations of the identity services like the intrusion detection are also needed.
Mobile device security
Every firm understands the real value of the mobile devices that are capable of adding the value
to the employee's productivity in order to provide the access to the business resources any time
wish to. The organizations are devising the best ways to work in an effective manner for
completing the task. The compromised mobile access allows the remote access to the sensitive
data of the organization or the other form of data the user have entrusted to the system. The
organization considers the mobile devices best for the productivity, flexibility as well as for the
mobility of the organization. The small firms are more capable of or agile to the technologies as
their owners can see the issues quickly and can change the existing function as soon as possible
(Tjelta, et al., 2014). They are less capable of adopting the security systems which are supposed
to protect the issues related to any field of the organization. The employees are connecting them
of the organization (Pop, Zhu & Yang, 2017). The WAN connection ensures the necessary
infection and viruses that are a danger to the network. The confidence in the security systems of
exchanging the information can only be achieved by the ISP services.
Other important threats
The most of the threat is associated with the employees. They are considered as the important
factor for developing the information security of the company. They have limited knowledge of
the information security that is quite harmful to the growth rate of the organization. To secure the
data of the company, the knowledge about the new systems that are developed on the advance
version of the technologies should be learned by the employees in an efficient manner in order to
bring the profit as well as to increase the productivity. The network system needs to be updated
at a regular interval of time (Rittinghouse & Ransome, 2016). The firewall should be installed on
the device and the software should be updated regularly. Implementations of the strong
passwords are highly recommended by the security authorities of the company. The policies, as
well as the rules, should be implemented properly in order to protect the computer asserts as well
as to know more about the new systems (Schubert Jr & Kim, 2016). The policies and the new
rules will help the employee to know more about the advanced versions of the tools and
technology. The servers should be locked as soon as the user's work is done. The
implementations of the identity services like the intrusion detection are also needed.
Mobile device security
Every firm understands the real value of the mobile devices that are capable of adding the value
to the employee's productivity in order to provide the access to the business resources any time
wish to. The organizations are devising the best ways to work in an effective manner for
completing the task. The compromised mobile access allows the remote access to the sensitive
data of the organization or the other form of data the user have entrusted to the system. The
organization considers the mobile devices best for the productivity, flexibility as well as for the
mobility of the organization. The small firms are more capable of or agile to the technologies as
their owners can see the issues quickly and can change the existing function as soon as possible
(Tjelta, et al., 2014). They are less capable of adopting the security systems which are supposed
to protect the issues related to any field of the organization. The employees are connecting them
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8
wirelessly with the mobile such as the laptops. So the risks of the environment are considered as
efficient as it holds the value to allure the eyes of the audiences to steal the data from the secure
place. It creates huge problems in the organization as those data are considered as the critical
data or may be sensitive in nature. The WLAN issues can easily be overcome with the better
configuration of each device as well as educating the employee in an efficient manner.
Plan for the hardware purchases
The idea of purchasing the hardware always needs to be unique and innovative. It gives the
maximum advantage to the firm in order to compete with the other competitors in the
marketplace. There are several other reasons for having a security plan that helps to operate the
tools in an effective manner. The recent reports of various organization provide the necessary
details that are aligned to the business strategies and have proper orientation in order to
demonstrate the performance of the business in a much better way. Proper planning is always
required to minimize the financial burden of the company in both small as well as large firms
(Schubert Jr & Kim, 2016). The same case happens in case of the STP Ltd. The company should
implement the best strategies to purchase the hardware that is capable of solving the risks of both
internal and external. The hardware is essential to ensure the functionality of the other devices as
well as to maintain the consistency of the operations (Tjelta, et al., 2014). The STP Ltd should be
capable of identifying the failures in eth devices that are more prone to the risks. The old
hardware should be replaced at a regular interval of time as and when required. There should not
be any delay in the replacement as the requirements are high in the market from the customer
point of view. It is also important to know the strategies that in what way eth employees are
accessing the hardware because it completely depends on the employees to increase the
productivity of the firm. When the new systems are coming to the markets which are quite
different in every aspect, the employees are facing problems in dealing with the hardware
devices (Pop, Zhu & Yang, 2017). Therefore, it is important to understand about the
implementation of the hardware and the employee should undergo the training process that will
clarify each bit of doubt regarding the hardware implementation.
wirelessly with the mobile such as the laptops. So the risks of the environment are considered as
efficient as it holds the value to allure the eyes of the audiences to steal the data from the secure
place. It creates huge problems in the organization as those data are considered as the critical
data or may be sensitive in nature. The WLAN issues can easily be overcome with the better
configuration of each device as well as educating the employee in an efficient manner.
Plan for the hardware purchases
The idea of purchasing the hardware always needs to be unique and innovative. It gives the
maximum advantage to the firm in order to compete with the other competitors in the
marketplace. There are several other reasons for having a security plan that helps to operate the
tools in an effective manner. The recent reports of various organization provide the necessary
details that are aligned to the business strategies and have proper orientation in order to
demonstrate the performance of the business in a much better way. Proper planning is always
required to minimize the financial burden of the company in both small as well as large firms
(Schubert Jr & Kim, 2016). The same case happens in case of the STP Ltd. The company should
implement the best strategies to purchase the hardware that is capable of solving the risks of both
internal and external. The hardware is essential to ensure the functionality of the other devices as
well as to maintain the consistency of the operations (Tjelta, et al., 2014). The STP Ltd should be
capable of identifying the failures in eth devices that are more prone to the risks. The old
hardware should be replaced at a regular interval of time as and when required. There should not
be any delay in the replacement as the requirements are high in the market from the customer
point of view. It is also important to know the strategies that in what way eth employees are
accessing the hardware because it completely depends on the employees to increase the
productivity of the firm. When the new systems are coming to the markets which are quite
different in every aspect, the employees are facing problems in dealing with the hardware
devices (Pop, Zhu & Yang, 2017). Therefore, it is important to understand about the
implementation of the hardware and the employee should undergo the training process that will
clarify each bit of doubt regarding the hardware implementation.

9
Business continuity
The change in the information security systems provides huge opportunities to the managers to
implement the cloud platform as it is considered as the best way to manage the growth of the
business as well as the continuity of it. The continuity of the business depends on the cloud set
up, the physical security systems, on the data backup process as well as on the succession of
planning which are further divided smaller sections. The environments of the business are
divided into many parts which are ensured by the manager or the information security manager
of the firm (Rittinghouse & Ransome, 2016). The elasticity of the services will only be measured
when the services are properly planned and done in advance. The continuity in the business also
depends on the employees. The employees are considered as the main reason for the better
performance of the firm. If the regular routine of the employees is distracted, then the rate for eth
productivity also gets disturbed. They will feel unable to come back to the track in order to
achieve the goal and maximum productivity for the organization (Mahdi, Alhabbash & Naser,
2016). Therefore, the STP Ltd has implemented the cloud set up that provides the maximum
chances of eliminating the backup and recovery which takes the maximum amount of space. The
cloud platform manages the entire set up and gives free space to the user for storing the data
which will be in a safe state.
Risk management
The management of the risk is considered as one of the important factors of every firm. The
growth of the company completely depends on the risk management that deals with the security
systems, privacy as well as with the optimization of the data. Often, the small businesses are
more aware of the risk management as they can easily identify the issues coming in the way of
the implementation. The risks are occurring in various fields which always need the immediate
responses from the user in order to get the solution as soon as possible. Identifying the risks at
right time and applying the solution to it can bring more profits to the organization (Garcia-
Alfaro, et al., 2015). The management of the risk includes the removal of the breaches, threats as
well as provides maximum security tips for the written policy of the security systems. The risks
in case of the information security are more, but once the strategy is done to fight with those
issues, then the entire set up can be modified to yield better production in the various subsection
areas.
Business continuity
The change in the information security systems provides huge opportunities to the managers to
implement the cloud platform as it is considered as the best way to manage the growth of the
business as well as the continuity of it. The continuity of the business depends on the cloud set
up, the physical security systems, on the data backup process as well as on the succession of
planning which are further divided smaller sections. The environments of the business are
divided into many parts which are ensured by the manager or the information security manager
of the firm (Rittinghouse & Ransome, 2016). The elasticity of the services will only be measured
when the services are properly planned and done in advance. The continuity in the business also
depends on the employees. The employees are considered as the main reason for the better
performance of the firm. If the regular routine of the employees is distracted, then the rate for eth
productivity also gets disturbed. They will feel unable to come back to the track in order to
achieve the goal and maximum productivity for the organization (Mahdi, Alhabbash & Naser,
2016). Therefore, the STP Ltd has implemented the cloud set up that provides the maximum
chances of eliminating the backup and recovery which takes the maximum amount of space. The
cloud platform manages the entire set up and gives free space to the user for storing the data
which will be in a safe state.
Risk management
The management of the risk is considered as one of the important factors of every firm. The
growth of the company completely depends on the risk management that deals with the security
systems, privacy as well as with the optimization of the data. Often, the small businesses are
more aware of the risk management as they can easily identify the issues coming in the way of
the implementation. The risks are occurring in various fields which always need the immediate
responses from the user in order to get the solution as soon as possible. Identifying the risks at
right time and applying the solution to it can bring more profits to the organization (Garcia-
Alfaro, et al., 2015). The management of the risk includes the removal of the breaches, threats as
well as provides maximum security tips for the written policy of the security systems. The risks
in case of the information security are more, but once the strategy is done to fight with those
issues, then the entire set up can be modified to yield better production in the various subsection
areas.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

10
Conclusion
The main target of this report is to open the real facts and figures of the organization which are
dealing with the new systems in terms of the security information. The STP Ltd is one those
companies which were facing some issues with the new systems as well as with the
implementation of it. The employees are not properly trained to use those devices as they are
much higher than their understanding level. Due to this reason, there are many issues were
coming up in the firm that needs the immediate response and attention to resolve the issues. The
issues are related to the understanding capability of the employees, implementation of the
various policies and regulations, as well as the administrative issues. The owner of the company
was worried regarding these issues as the company was investing a lot on the new devices and its
implementation. Through this report, the issues can be solved by integrating the technological
aspects as well as facilitating the services for educating the employees regarding the issues and
security systems.
Recommendations
Policies should be implemented properly that are related to the business continuity as well as
with the security systems. The use of the mobile should be limited in the workplace as there are
many chances of losing the critical data. The company should build the innovative strategy
where the employees can learn about the new advanced technological tools and should
implement it in order to avoid the risks. The employees should be able to manage and monitor
the planning that is done in the organization. Proper training and awareness program should
provide by the company where they will learn about the recent development and about the risk
management.
References
Abbadi, I.M., 2014. Cloud management and security. John Wiley & Sons.
Ashraf, M.A., Jamal, H., Khan, S.A., Ahmed, Z. and Baig, M.I., 2016. A Heterogeneous Service-
Oriented Deep Packet Inspection and Analysis Framework for Traffic-Aware Network
Management and Security Systems. IEEE Access, 4, pp.5918-5936.
Conclusion
The main target of this report is to open the real facts and figures of the organization which are
dealing with the new systems in terms of the security information. The STP Ltd is one those
companies which were facing some issues with the new systems as well as with the
implementation of it. The employees are not properly trained to use those devices as they are
much higher than their understanding level. Due to this reason, there are many issues were
coming up in the firm that needs the immediate response and attention to resolve the issues. The
issues are related to the understanding capability of the employees, implementation of the
various policies and regulations, as well as the administrative issues. The owner of the company
was worried regarding these issues as the company was investing a lot on the new devices and its
implementation. Through this report, the issues can be solved by integrating the technological
aspects as well as facilitating the services for educating the employees regarding the issues and
security systems.
Recommendations
Policies should be implemented properly that are related to the business continuity as well as
with the security systems. The use of the mobile should be limited in the workplace as there are
many chances of losing the critical data. The company should build the innovative strategy
where the employees can learn about the new advanced technological tools and should
implement it in order to avoid the risks. The employees should be able to manage and monitor
the planning that is done in the organization. Proper training and awareness program should
provide by the company where they will learn about the recent development and about the risk
management.
References
Abbadi, I.M., 2014. Cloud management and security. John Wiley & Sons.
Ashraf, M.A., Jamal, H., Khan, S.A., Ahmed, Z. and Baig, M.I., 2016. A Heterogeneous Service-
Oriented Deep Packet Inspection and Analysis Framework for Traffic-Aware Network
Management and Security Systems. IEEE Access, 4, pp.5918-5936.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

11
Attfield, P., Chenard, P., Curry, S., Ting, V., Reed, M. and Baar, D., Sequitur Labs, Inc.,
2016. System and Methods for Secure Utilization of Attestation in Policy-Based Decision Making
for Mobile Device Management and Security. U.S. Patent Application 15/157,755.
Bienko, C.D., Greenstein, M., Holt, S.E. and Phillips, R.T., 2015. IBM Cloudant: Database as a
Service Advanced Topics. IBM Redbooks.
Cao, J., Zhang, Y., Ji, R., Xie, F. and Su, Y., 2016. Web video topics discovery and
structuralization with social network. Neurocomputing, 172, pp.53-63.
Dorothy, A.B. and Kumar, S.B.R., 2016. Internet of Things: Data Management and Security. Int.
J. Control Theory Appl., 9(26), pp.115-120.
Elkhodr, M., Shahrestani, S. and Cheung, H., 2016. The internet of things: new interoperability,
management and security challenges. arXiv preprint arXiv:1604.04824.
Garcia-Alfaro, J., Navarro-Arribas, G., Aldini, A., Martinelli, F. and Suri, N., 2015. Data Privacy
Management, and Security Assurance. DPM and QASA.
Hatakeda, D.N., Microsoft Corporation, 2014. Management and security of personal
information. U.S. Patent 8,806,218.
Kapovits, Á., Covaci, S., Ververidis, C., Siris, V. and Guta, M., 2014, September. Advanced
topics in service delivery over integrated satellite terrestrial networks. In Advanced Satellite
Multimedia Systems Conference and the 13th Signal Processing for Space Communications
Workshop (ASMS/SPSC), 2014 7th (pp. 92-98). IEEE.
Krishnaswamy, J., 2017. Adaptations to Climate Change: Water Management and
Security. Agriculture under Climate Change: Threats, Strategies and Policies, 1, p.201.
Li, B., Feng, Z., Tang, M., Xu, Z., Fu, S., Wu, Q., Deng, L., Tong, W., Liu, S. and Shum, P.P.,
2015. Experimental demonstration of large capacity WSDM optical access network with
multicore fibers and advanced modulation formats. Optics express, 23(9), pp.10997-11006.
Livraga, G., Torra, V., Aldini, A., Martinelli, F. and Suri, N. eds., 2016. Data Privacy
Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th
Attfield, P., Chenard, P., Curry, S., Ting, V., Reed, M. and Baar, D., Sequitur Labs, Inc.,
2016. System and Methods for Secure Utilization of Attestation in Policy-Based Decision Making
for Mobile Device Management and Security. U.S. Patent Application 15/157,755.
Bienko, C.D., Greenstein, M., Holt, S.E. and Phillips, R.T., 2015. IBM Cloudant: Database as a
Service Advanced Topics. IBM Redbooks.
Cao, J., Zhang, Y., Ji, R., Xie, F. and Su, Y., 2016. Web video topics discovery and
structuralization with social network. Neurocomputing, 172, pp.53-63.
Dorothy, A.B. and Kumar, S.B.R., 2016. Internet of Things: Data Management and Security. Int.
J. Control Theory Appl., 9(26), pp.115-120.
Elkhodr, M., Shahrestani, S. and Cheung, H., 2016. The internet of things: new interoperability,
management and security challenges. arXiv preprint arXiv:1604.04824.
Garcia-Alfaro, J., Navarro-Arribas, G., Aldini, A., Martinelli, F. and Suri, N., 2015. Data Privacy
Management, and Security Assurance. DPM and QASA.
Hatakeda, D.N., Microsoft Corporation, 2014. Management and security of personal
information. U.S. Patent 8,806,218.
Kapovits, Á., Covaci, S., Ververidis, C., Siris, V. and Guta, M., 2014, September. Advanced
topics in service delivery over integrated satellite terrestrial networks. In Advanced Satellite
Multimedia Systems Conference and the 13th Signal Processing for Space Communications
Workshop (ASMS/SPSC), 2014 7th (pp. 92-98). IEEE.
Krishnaswamy, J., 2017. Adaptations to Climate Change: Water Management and
Security. Agriculture under Climate Change: Threats, Strategies and Policies, 1, p.201.
Li, B., Feng, Z., Tang, M., Xu, Z., Fu, S., Wu, Q., Deng, L., Tong, W., Liu, S. and Shum, P.P.,
2015. Experimental demonstration of large capacity WSDM optical access network with
multicore fibers and advanced modulation formats. Optics express, 23(9), pp.10997-11006.
Livraga, G., Torra, V., Aldini, A., Martinelli, F. and Suri, N. eds., 2016. Data Privacy
Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th

12
International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016,
Proceedings (Vol. 9963). Springer.
Li, X., Verspoor, K., Gray, K. and Barnett, S., 2016. Discovery of learning topics in an online
social network for health professionals. In Health Data Analytics Conference.
Mahdi, A.O., Alhabbash, M.I. and Naser, S.S.A., 2016. An intelligent tutoring system for
teaching advanced topics in information security.
Pappalardo, G., Amodeo, A., Apituley, A., Comeron, A., Freudenthaler, V., Linné, H., Ansmann,
A., Bösenberg, J., D'Amico, G., Mattis, I. and Mona, L., 2014. EARLINET: towards an
advanced sustainable European aerosol lidar network. Atmospheric Measurement Techniques,
(8), pp.2389-2409.
Pop, F., Zhu, X. and Yang, L.T., 2017. MidHDC: Advanced topics on middleware services for
heterogeneous distributed computing. Part 2.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Schubert Jr, T.F. and Kim, E.M., 2016. Fundamentals of Electronics: Book 4 Oscillators and
Advanced Electronics Topics. Synthesis Lectures on Digital Circuits and Systems, 11(2), pp.1-
266.
Tjelta, T., Millstein, G., Grøndalen, O., Østerbø, O., Lehne, P.H., Waldemar, P., Grønsund, P.,
Mahmood, K. and Lønsethagen, H., 2014, November. Research topics and initial results for the
fifth generation (5G) mobile network. In 5G for Ubiquitous Connectivity (5GU), 2014 1st
International Conference on (pp. 267-272). IEEE.
International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016,
Proceedings (Vol. 9963). Springer.
Li, X., Verspoor, K., Gray, K. and Barnett, S., 2016. Discovery of learning topics in an online
social network for health professionals. In Health Data Analytics Conference.
Mahdi, A.O., Alhabbash, M.I. and Naser, S.S.A., 2016. An intelligent tutoring system for
teaching advanced topics in information security.
Pappalardo, G., Amodeo, A., Apituley, A., Comeron, A., Freudenthaler, V., Linné, H., Ansmann,
A., Bösenberg, J., D'Amico, G., Mattis, I. and Mona, L., 2014. EARLINET: towards an
advanced sustainable European aerosol lidar network. Atmospheric Measurement Techniques,
(8), pp.2389-2409.
Pop, F., Zhu, X. and Yang, L.T., 2017. MidHDC: Advanced topics on middleware services for
heterogeneous distributed computing. Part 2.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Schubert Jr, T.F. and Kim, E.M., 2016. Fundamentals of Electronics: Book 4 Oscillators and
Advanced Electronics Topics. Synthesis Lectures on Digital Circuits and Systems, 11(2), pp.1-
266.
Tjelta, T., Millstein, G., Grøndalen, O., Østerbø, O., Lehne, P.H., Waldemar, P., Grønsund, P.,
Mahmood, K. and Lønsethagen, H., 2014, November. Research topics and initial results for the
fifth generation (5G) mobile network. In 5G for Ubiquitous Connectivity (5GU), 2014 1st
International Conference on (pp. 267-272). IEEE.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.