CFPBUS006: Analyzing Professional Skills in the Digital Age Report
VerifiedAdded on 2023/06/10
|11
|3714
|413
Report
AI Summary
This report provides a comprehensive overview of integrated professional skills in the digital age, focusing on collaboration in the workplace and the tools that helped businesses survive the pandemic, such as GoToMeeting and Dapulse. It delves into the advantages, disadvantages, suitability, and applications of cloud storage, cloud computing, and e-commerce in improving digitalization. The report also addresses security and privacy challenges arising from the pandemic, proposing possible measures to mitigate risks. Additionally, it discusses the benefits and limitations of establishing a company's own network. The content covers various aspects of digital transformation, including the impact of remote work, cybersecurity threats, and the importance of user behavior analytics. The report also touches upon the Russia-Ukraine conflict, briefly mentioning Russia's efforts to develop its own internet connection and disconnect from the global internet. The report is a valuable resource for understanding the evolving landscape of digital skills and business operations in the modern era.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

CFPBUS006 INTEGRATED
PROFESSIONAL SKILLS
IN THE DIGITAL AGE
PROFESSIONAL SKILLS
IN THE DIGITAL AGE
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

TABLE OF CONTENT
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Collaboration in the work place, tools which helps business to survive in the pandemic...........3
Advantages, Disadvantages, Suitability and Applications of cloud storage and computing in
improving digitalization...............................................................................................................5
Security and privacy challenges due to pandemic and some possible measures that could be
taken.............................................................................................................................................7
Benefits and Limitations of own network...................................................................................8
CONCLUSION..............................................................................................................................10
REFERENCES..............................................................................................................................11
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Collaboration in the work place, tools which helps business to survive in the pandemic...........3
Advantages, Disadvantages, Suitability and Applications of cloud storage and computing in
improving digitalization...............................................................................................................5
Security and privacy challenges due to pandemic and some possible measures that could be
taken.............................................................................................................................................7
Benefits and Limitations of own network...................................................................................8
CONCLUSION..............................................................................................................................10
REFERENCES..............................................................................................................................11

INTRODUCTION
The internet is way of getting linked with the global for sharing news, information,
getting new ideas of recent development around the world. In the business world communication
and information technology plays a major role in development of company performance. There
are top five skills that is need for digital age such as culture intelligence, emotional intelligence,
virtual collaboration, geek acumen and critical problem solving. ICT (information and
communications technology) is used to manage communication processes like broadcast media,
telecommunication, intelligence management systems, transmission system, audio visual
processing, monitoring function and network based control. In simple words information and
communication technology is the components and infrastructure that allow modern computing
(Wang, and Alexander., 2021).
This report highlights the concept of collaboration in the work place and two
collaboration tools used by company to manage their activities during the pandemic. It will also
include a brief about cloud storage, e-commerce and cloud computing and some advantages and
disadvantages, application and suitability of the cloud storage and improving digitalization.
Moreover, this report will discuss security and privacy challenges and some possible measures
that could be taken. This report also involves the conflicts between the Ukraine and Russia, and a
brief about Russia develop their internet connection and disconnecting from global internet.
MAIN BODY
Collaboration in the work place, tools which helps business to survive in the pandemic
Collaboration in work culture is a style which helps employees to work together for
achieving business objectives and goals this is beneficial for employees and company.
Collaboration improve team work and solves problem effectively, this leads company to get
more innovation, improve communication, increase success and efficient processes. Good
The internet is way of getting linked with the global for sharing news, information,
getting new ideas of recent development around the world. In the business world communication
and information technology plays a major role in development of company performance. There
are top five skills that is need for digital age such as culture intelligence, emotional intelligence,
virtual collaboration, geek acumen and critical problem solving. ICT (information and
communications technology) is used to manage communication processes like broadcast media,
telecommunication, intelligence management systems, transmission system, audio visual
processing, monitoring function and network based control. In simple words information and
communication technology is the components and infrastructure that allow modern computing
(Wang, and Alexander., 2021).
This report highlights the concept of collaboration in the work place and two
collaboration tools used by company to manage their activities during the pandemic. It will also
include a brief about cloud storage, e-commerce and cloud computing and some advantages and
disadvantages, application and suitability of the cloud storage and improving digitalization.
Moreover, this report will discuss security and privacy challenges and some possible measures
that could be taken. This report also involves the conflicts between the Ukraine and Russia, and a
brief about Russia develop their internet connection and disconnecting from global internet.
MAIN BODY
Collaboration in the work place, tools which helps business to survive in the pandemic
Collaboration in work culture is a style which helps employees to work together for
achieving business objectives and goals this is beneficial for employees and company.
Collaboration improve team work and solves problem effectively, this leads company to get
more innovation, improve communication, increase success and efficient processes. Good

collaboration refers as it has willingness and honesty to change to create things better. Some
example of employee’s collaboration is video conferencing, cross function team, task
management, documentation sharing, peer training etc. but during pandemic is very difficult to
maintain collaboration and team work in the work place because at that time physical contract is
reduced. Pandemic is challenging for many people, it changes day to day life style of people, for
employees and employers it was challenging too they have to protect each other as well as
themselves, to stop further spread of Covid -19 (Cai, Fry and Wagner., 2021). Through learning
and listening from the team member help company to achieve the goals on time and in proper
manner.
There is some way by which organization can create good collaboration in the work place
such as company may cultivate transparency and openness, so for this they open about the
challenges and issue that company is facing and offer incentives to employees who offer
solutions. Another way is company can offer positivity and rewards to employees, so they feel
motivated towards work in team and get more benefices. As the tome of Covid-19 there is
situation where employees are doing work from home that create difficult to manage business
operation (Carley, and et.al., 2018.). Collaboration in the work place increase the employee’s
performance and the way to create effective interaction between team members and increase
ideas and thought sharing. At the time of pandemic team collaboration software is on rise. There
are some collaboration tools which helps business to survive during Covid-19 are as follows:
Go to Meeting application: It is a unique solution for the organization that have expanded web
and video conferencing tools. This application is beneficial for both employees and company as
well, because it is very easy to use and have flexibility, affordability and security. By this
application documents are share easily, and it permits users to have control over the equipment
which make transfer of information easier. This application allows large meeting and it also
allows users to record meeting so it is a good option for individual who not attend meeting due to
network issue or any other reason. By this application manager give their feedbacks and allot
work to the employees so its create effective management. By such meeting they know more
about their team members and work together to achieve organization goals.
Dapulse: It is collaboration tools which helps company to communicate, assign tasks and set
objective. One of the big advantages of this is it has good visual design so it is easy to
understand. This creates effortless collaboration, this application allows to leaves notes, upload
example of employee’s collaboration is video conferencing, cross function team, task
management, documentation sharing, peer training etc. but during pandemic is very difficult to
maintain collaboration and team work in the work place because at that time physical contract is
reduced. Pandemic is challenging for many people, it changes day to day life style of people, for
employees and employers it was challenging too they have to protect each other as well as
themselves, to stop further spread of Covid -19 (Cai, Fry and Wagner., 2021). Through learning
and listening from the team member help company to achieve the goals on time and in proper
manner.
There is some way by which organization can create good collaboration in the work place
such as company may cultivate transparency and openness, so for this they open about the
challenges and issue that company is facing and offer incentives to employees who offer
solutions. Another way is company can offer positivity and rewards to employees, so they feel
motivated towards work in team and get more benefices. As the tome of Covid-19 there is
situation where employees are doing work from home that create difficult to manage business
operation (Carley, and et.al., 2018.). Collaboration in the work place increase the employee’s
performance and the way to create effective interaction between team members and increase
ideas and thought sharing. At the time of pandemic team collaboration software is on rise. There
are some collaboration tools which helps business to survive during Covid-19 are as follows:
Go to Meeting application: It is a unique solution for the organization that have expanded web
and video conferencing tools. This application is beneficial for both employees and company as
well, because it is very easy to use and have flexibility, affordability and security. By this
application documents are share easily, and it permits users to have control over the equipment
which make transfer of information easier. This application allows large meeting and it also
allows users to record meeting so it is a good option for individual who not attend meeting due to
network issue or any other reason. By this application manager give their feedbacks and allot
work to the employees so its create effective management. By such meeting they know more
about their team members and work together to achieve organization goals.
Dapulse: It is collaboration tools which helps company to communicate, assign tasks and set
objective. One of the big advantages of this is it has good visual design so it is easy to
understand. This creates effortless collaboration, this application allows to leaves notes, upload
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

relevant document for colleagues. This application has feature like collaboration tools for many
employees, zero meetings and emails overhead, motivational tool, easy communication etc. a
collaboration tools helps individual to collaboration.
Company across the world were faced new challenge during the pandemic, that is how
remote work be facilitated etc. There are some advantages of collaboration tools such as it saves
resources and time, improve communication, boost team morale, increase productivity etc. It
enhances productivity because it focuses on the important tasks, help in removing obstacles and
generate solutions and ideas to complex problems (Hu., 2020.). Collaboration technologies helps
in better customer engagement that is if employees are more communicate with each other than it
creates good working environment. During the Covid-19 work from home is rise so it’s very
important for company to make effective management, so they use such tools to manage their
work.
Advantages, Disadvantages, Suitability and Applications of cloud storage and computing in
improving digitalization
Cloud Computing
Cloud computing is a web of serving connection by the use of internet. The
information’s, software's and resources are some main function shared by the internet and acts
like transparent cable that attach everything including virtual service and physical serves all
around the globe (Srivastava, and Khan., 2018). Cloud computing is the demand accessibility of
the computer serves such as database, data storage, etc. this network gives access to data centres
to most of the users. There are some examples of cloud computing service such as AWS, google
cloud, etc. There are various types of cloud such as community cloud, hybrid cloud, etc.
community cloud provides resources for a community and organization.
Advantages: The advantages of community cloud are it has the proper security comparatively to
other clouds. Cloud has more security features comparatively to others and also supply more
security. There are some job benefits in this serving connection such as cloud broker, this act as a
mediator in between the buyer and the merchant of a cloud computing of that service, in general
words it negotiates between two or more parties (Sunyaev., 2020). It automatically updates and
has a work practice flexibility. The advantage of cloud computing is that you can store any type
employees, zero meetings and emails overhead, motivational tool, easy communication etc. a
collaboration tools helps individual to collaboration.
Company across the world were faced new challenge during the pandemic, that is how
remote work be facilitated etc. There are some advantages of collaboration tools such as it saves
resources and time, improve communication, boost team morale, increase productivity etc. It
enhances productivity because it focuses on the important tasks, help in removing obstacles and
generate solutions and ideas to complex problems (Hu., 2020.). Collaboration technologies helps
in better customer engagement that is if employees are more communicate with each other than it
creates good working environment. During the Covid-19 work from home is rise so it’s very
important for company to make effective management, so they use such tools to manage their
work.
Advantages, Disadvantages, Suitability and Applications of cloud storage and computing in
improving digitalization
Cloud Computing
Cloud computing is a web of serving connection by the use of internet. The
information’s, software's and resources are some main function shared by the internet and acts
like transparent cable that attach everything including virtual service and physical serves all
around the globe (Srivastava, and Khan., 2018). Cloud computing is the demand accessibility of
the computer serves such as database, data storage, etc. this network gives access to data centres
to most of the users. There are some examples of cloud computing service such as AWS, google
cloud, etc. There are various types of cloud such as community cloud, hybrid cloud, etc.
community cloud provides resources for a community and organization.
Advantages: The advantages of community cloud are it has the proper security comparatively to
other clouds. Cloud has more security features comparatively to others and also supply more
security. There are some job benefits in this serving connection such as cloud broker, this act as a
mediator in between the buyer and the merchant of a cloud computing of that service, in general
words it negotiates between two or more parties (Sunyaev., 2020). It automatically updates and
has a work practice flexibility. The advantage of cloud computing is that you can store any type

of information in the cloud, it also shares files with various people at the same moment hence it
also protects the files with are saved.
Disadvantages: computing in improving digitalization are firstly no-one can access it offline, it
will always be needed internet, sometimes it also has some technical issues, in spite of the fact
that the quality may be high but the technical hitch can take place just as they occur in any
technology. Common risks such as data leakage, data loss, hijacking service, sometime the
provider isn't reliable.
Suitability: Data backup and data disaster.
Cloud Storage
This is a model of cloud computing which store the data between a provider who
manages and operates data as a service, it also gets rid of buying their own infrastructure of data
storage (Kamara, and Lauter., 2018). There are some types of cloud storage such as public cloud
storage which supports customers who are in need of utilizing the computer assets such as
software and hardware, private cloud storage, this model is the configuration that is used only by
an exclusive organization.
Advantages: Highly secured and it has the ability to customize, etc. The storage saved in it is
saved for a lifetime, this technology makes the remote work possible because if you do not have
the access to the work files then no one can use it, anyone can share files very easily, this is the
easiest way of sharing files. Choosing cloud store is a very good choice for approaching testing
and development. The applications of cloud storage are mentioned as it can analyse big data's, it
has a good system of backup and recovery, it can feed the data online as well, it also keeps the
file encrypted and has a lifetime storage.
Disadvantages: It has internet failure, security and privacy can be the issue, this isn't suited to all
business needs.
Suitability: Stores any type of files and information’s such as emails, this makes easy to share
files to more than two people at once, it helps to protect files in the cloud.
E-commerce
E-commerce mentions to the purchase and trading of services using the internet and it
also helps to execute the data of transactions (Jílková, and Králová., 2021). There are some types
of e-commerce such as business to business, business to consumer and consumer to consumer.
also protects the files with are saved.
Disadvantages: computing in improving digitalization are firstly no-one can access it offline, it
will always be needed internet, sometimes it also has some technical issues, in spite of the fact
that the quality may be high but the technical hitch can take place just as they occur in any
technology. Common risks such as data leakage, data loss, hijacking service, sometime the
provider isn't reliable.
Suitability: Data backup and data disaster.
Cloud Storage
This is a model of cloud computing which store the data between a provider who
manages and operates data as a service, it also gets rid of buying their own infrastructure of data
storage (Kamara, and Lauter., 2018). There are some types of cloud storage such as public cloud
storage which supports customers who are in need of utilizing the computer assets such as
software and hardware, private cloud storage, this model is the configuration that is used only by
an exclusive organization.
Advantages: Highly secured and it has the ability to customize, etc. The storage saved in it is
saved for a lifetime, this technology makes the remote work possible because if you do not have
the access to the work files then no one can use it, anyone can share files very easily, this is the
easiest way of sharing files. Choosing cloud store is a very good choice for approaching testing
and development. The applications of cloud storage are mentioned as it can analyse big data's, it
has a good system of backup and recovery, it can feed the data online as well, it also keeps the
file encrypted and has a lifetime storage.
Disadvantages: It has internet failure, security and privacy can be the issue, this isn't suited to all
business needs.
Suitability: Stores any type of files and information’s such as emails, this makes easy to share
files to more than two people at once, it helps to protect files in the cloud.
E-commerce
E-commerce mentions to the purchase and trading of services using the internet and it
also helps to execute the data of transactions (Jílková, and Králová., 2021). There are some types
of e-commerce such as business to business, business to consumer and consumer to consumer.

Advantages: It can eliminate the operating cost and also helps in connecting people, it is the
faster buying process, helps customers reach all over the country.
Disadvantages: You do not know the person you are selling or buying the product from such as
lack of personal touch, credit card fraud for online businesses.
Suitability: Online booking is available as well as it can be wholesale, at the stage of pandemic
online booking is often a good source.
Security and privacy challenges due to pandemic and some possible measures that could be taken
The pandemic has created new issues and challenges for the organizations as they adopt
operating model that is work from home become new normal. Businesses are accelerating their
cybersecurity and digital transformation is now their major concern. The legal, reputational,
compliance and operational implications could be fair if cyber security risks are neglected.
During Covid-19 cyber-attacks increases, there is no proper define of cyber-attack in most cases
the cyber-attack is deliberate entry into system and networks of computer data. Cyber-attacks use
ICTs to boost common crimes such as fraud, intellectual property theft and harassment. Some
attacks are crimes which can only committed by using information and communication
technology like DDoS attacks and hacking. Cyber security is an application of technology,
control and processes to protect system, programs, devices, data and networks from cyber-
attacks (Nguyen, and Reddi., 2019). Due to pandemic work from home culture is new normal but
is challenging too to manage their work, risk of cyber-attacks etc. The following are the privacy
and security challenges that company face:
Unauthorized access to data: It is when an individual gains entry to computer system, network,
data, application software and any resources without permission. The common causes of this is
weak passwords, share password across services, primarily phishing, social engineering attacks
etc. By this company private data destroy, steal goods and money by fraud, damage to trust and
reputation, reduce share price and financial valuation etc. For this company could take string
passwords policy which means create long passwords include numbers, special characters, letters
and change frequently (Tawalbeh, and et.al., 20200. Monitoring user activity to detect abnormal
activities like login at unusual hours, multiple login attempts etc. for these there are some
faster buying process, helps customers reach all over the country.
Disadvantages: You do not know the person you are selling or buying the product from such as
lack of personal touch, credit card fraud for online businesses.
Suitability: Online booking is available as well as it can be wholesale, at the stage of pandemic
online booking is often a good source.
Security and privacy challenges due to pandemic and some possible measures that could be taken
The pandemic has created new issues and challenges for the organizations as they adopt
operating model that is work from home become new normal. Businesses are accelerating their
cybersecurity and digital transformation is now their major concern. The legal, reputational,
compliance and operational implications could be fair if cyber security risks are neglected.
During Covid-19 cyber-attacks increases, there is no proper define of cyber-attack in most cases
the cyber-attack is deliberate entry into system and networks of computer data. Cyber-attacks use
ICTs to boost common crimes such as fraud, intellectual property theft and harassment. Some
attacks are crimes which can only committed by using information and communication
technology like DDoS attacks and hacking. Cyber security is an application of technology,
control and processes to protect system, programs, devices, data and networks from cyber-
attacks (Nguyen, and Reddi., 2019). Due to pandemic work from home culture is new normal but
is challenging too to manage their work, risk of cyber-attacks etc. The following are the privacy
and security challenges that company face:
Unauthorized access to data: It is when an individual gains entry to computer system, network,
data, application software and any resources without permission. The common causes of this is
weak passwords, share password across services, primarily phishing, social engineering attacks
etc. By this company private data destroy, steal goods and money by fraud, damage to trust and
reputation, reduce share price and financial valuation etc. For this company could take string
passwords policy which means create long passwords include numbers, special characters, letters
and change frequently (Tawalbeh, and et.al., 20200. Monitoring user activity to detect abnormal
activities like login at unusual hours, multiple login attempts etc. for these there are some
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

strategies such as rule based alters, behavioural analytics and log analysis which can be use by
company.
Event and user behavioural analytics: User identities are target for the attackers as user are
central to resources all over the organization. For this Cynet user behaviour is the best solution,
by analysis profiles and monitors user activities, to make a legitimate base line and detect
abnormal activities that effect company.
Cloud storage security: It is the most effective tools for employers and employees alike. The
dependants and use in cloud storage have raised significantly, mainly during the pandemic
situation, due to remote work (Kurda, and et.al 2021). Employees use the cloud storage security
for backing up their data and files on their computers. Cloud storage can liable to cybersecurity
threats. The shared data and files are also at high risk of hacked (Yang., Xiong and Ren., 2020).
Company make sure all their data is safe from such hacker.
Corruption of data and lack of accountability: data corruption means errors in computer
network and data that occur during reading, transmission, writing, processing or storage which
develop unintended change to original data. So for this company can protect the network and use
data integrity security technology.
Human error: It is another issue, during Covid-19 human error was a major problem of cyber
insecurity. Employees would recklessly or unknowingly give access to wrong person. Remote
work has challenges for many businesses they are not prepared for it so many companies had to
improve their capabilities and capacity for remote work and cybersecurity was not their key
priority at that time (Williams, and et.al., 2020). For increase cybersecurity companies and
employees may implement practices such as use a virtual private network, cybersecurity
awareness, antivirus protection, frequent reviews, risk management and of employees use their
home networks then they make sure that the Wi-Fi passwords is strong.
Benefits and Limitations of own network
Advantages: Saving money by sharing one device between two peoples, helps to increase
confidence, making connection is somehow hard for some people so this networking will help
and push people to talk to people they do not know, the main purpose of own networking is that
it will raise the persons profile and help to be visible, it also built a good level of confidence in a
person, by using this network the person can get good support and advice for their career, it also
company.
Event and user behavioural analytics: User identities are target for the attackers as user are
central to resources all over the organization. For this Cynet user behaviour is the best solution,
by analysis profiles and monitors user activities, to make a legitimate base line and detect
abnormal activities that effect company.
Cloud storage security: It is the most effective tools for employers and employees alike. The
dependants and use in cloud storage have raised significantly, mainly during the pandemic
situation, due to remote work (Kurda, and et.al 2021). Employees use the cloud storage security
for backing up their data and files on their computers. Cloud storage can liable to cybersecurity
threats. The shared data and files are also at high risk of hacked (Yang., Xiong and Ren., 2020).
Company make sure all their data is safe from such hacker.
Corruption of data and lack of accountability: data corruption means errors in computer
network and data that occur during reading, transmission, writing, processing or storage which
develop unintended change to original data. So for this company can protect the network and use
data integrity security technology.
Human error: It is another issue, during Covid-19 human error was a major problem of cyber
insecurity. Employees would recklessly or unknowingly give access to wrong person. Remote
work has challenges for many businesses they are not prepared for it so many companies had to
improve their capabilities and capacity for remote work and cybersecurity was not their key
priority at that time (Williams, and et.al., 2020). For increase cybersecurity companies and
employees may implement practices such as use a virtual private network, cybersecurity
awareness, antivirus protection, frequent reviews, risk management and of employees use their
home networks then they make sure that the Wi-Fi passwords is strong.
Benefits and Limitations of own network
Advantages: Saving money by sharing one device between two peoples, helps to increase
confidence, making connection is somehow hard for some people so this networking will help
and push people to talk to people they do not know, the main purpose of own networking is that
it will raise the persons profile and help to be visible, it also built a good level of confidence in a
person, by using this network the person can get good support and advice for their career, it also

builds up business connections, network forms trust and shares goals, it helps in building long-
lasting relationships, there are too many opportunities in networking such as finding new jobs,
creating new partners and connecting with new peoples (Desai, Upadhyaya, and Palandoken.,
2018).
Disadvantages: it can be a little expensive and also can be limited storage capacity, in own
network the system is more like independent and less unprotected, a person who holds self-
networking need to have proper maintenance and should have good training, there are failure in
server of files and this is a stop to complete networking (Buttaro Jr and Gambaro., 2018). There
will be a problem of breaking of cables and this can be a stop to the network, the system can
have a problem running if the server breaks down, there can be issue of virus which can easily be
spread and by this other computer can also get in the infection of malware
There can be many security risks in the personal networking if there are huge number of users.
Network can exceedingly lessen the productivity of the company; this task should be given to the
management to decide the size of the usage on the computer. Maintenance of the network is
important and this can only be done by a professional. There can be many health issues by using
the network such as gaming, this can make the player addicted and the player can harm himself.
Networking can spread viruses over Wi-Fi, email and internet file downloads, there are also
some social media scam which can cause the computer in use. If your network is growing large
then there could be a security issue. This requires training and is very much complicated for a
new user. Network has capability to use internet connection among all networks users and
protect information’s and data of the country. By own networks people can exchange data and
messages in convenient way. So it’s not only saves money and time but it makes sure that
messages and data get delivered on time and to the right person. It also improves security there
are low chances of data hacking and cyber attracts (Crumpler and Lewis., 2019). It also reduces
dependants on global network, as Russia create their own local networks it reduces their
dependants on global networks. For making local network high cost is required and for setting
whole system it involve initial cost.
lasting relationships, there are too many opportunities in networking such as finding new jobs,
creating new partners and connecting with new peoples (Desai, Upadhyaya, and Palandoken.,
2018).
Disadvantages: it can be a little expensive and also can be limited storage capacity, in own
network the system is more like independent and less unprotected, a person who holds self-
networking need to have proper maintenance and should have good training, there are failure in
server of files and this is a stop to complete networking (Buttaro Jr and Gambaro., 2018). There
will be a problem of breaking of cables and this can be a stop to the network, the system can
have a problem running if the server breaks down, there can be issue of virus which can easily be
spread and by this other computer can also get in the infection of malware
There can be many security risks in the personal networking if there are huge number of users.
Network can exceedingly lessen the productivity of the company; this task should be given to the
management to decide the size of the usage on the computer. Maintenance of the network is
important and this can only be done by a professional. There can be many health issues by using
the network such as gaming, this can make the player addicted and the player can harm himself.
Networking can spread viruses over Wi-Fi, email and internet file downloads, there are also
some social media scam which can cause the computer in use. If your network is growing large
then there could be a security issue. This requires training and is very much complicated for a
new user. Network has capability to use internet connection among all networks users and
protect information’s and data of the country. By own networks people can exchange data and
messages in convenient way. So it’s not only saves money and time but it makes sure that
messages and data get delivered on time and to the right person. It also improves security there
are low chances of data hacking and cyber attracts (Crumpler and Lewis., 2019). It also reduces
dependants on global network, as Russia create their own local networks it reduces their
dependants on global networks. For making local network high cost is required and for setting
whole system it involve initial cost.

CONCLUSION
The above report includes brief of information and communication technology. It also
includes importance of collaboration in the workplace during pandemic and two collaboration
tools that is Go to meeting and Dapulse application. This report also discusses the concept of
cloud computing, e-commerce and cloud storage and their advantages, applications, suitability
and disadvantages and improvement in digitalization. During the pandemic company adopt work
from home because physical contract is not allowed so it’s very difficult to manage and protect
data so the report includes some security and privacy challenges such as human error, cloud
storage, unauthorized access to data, corruption of the data etc. that company and employees face
at that time. Furthermore, it includes some possible measure that company could be taken, and
also discuss the concept of the local networks and their benefits and limitation.
The above report includes brief of information and communication technology. It also
includes importance of collaboration in the workplace during pandemic and two collaboration
tools that is Go to meeting and Dapulse application. This report also discusses the concept of
cloud computing, e-commerce and cloud storage and their advantages, applications, suitability
and disadvantages and improvement in digitalization. During the pandemic company adopt work
from home because physical contract is not allowed so it’s very difficult to manage and protect
data so the report includes some security and privacy challenges such as human error, cloud
storage, unauthorized access to data, corruption of the data etc. that company and employees face
at that time. Furthermore, it includes some possible measure that company could be taken, and
also discuss the concept of the local networks and their benefits and limitation.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

REFERENCES
Books and Journals
Buttaro Jr, A. and Gambaro, L., 2018. The Index of Local Area Relative Disadvantage: A Cross-
Country Comparison. Centre for Longitudinal Studies, UCL: London, UK..
Cai, X., Fry, C.V. and Wagner, C.S., 2021. International collaboration during the COVID-19
crisis: autumn 2020 developments. Scientometrics. 126(4). pp.3683-3692.
Carley, and et.al., 2018. Social cyber-security. In International conference on social computing,
behavioral-cultural modeling and prediction and behavior representation in modeling
and simulation (pp. 389-394). Springer, Cham.
Crumpler, W. and Lewis, J.A., 2019. The cybersecurity workforce gap. Washington, DC, USA:
Center for Strategic and International Studies (CSIS).
Desai, A., Upadhyaya, T. and Palandoken, M., 2018. Dual band slotted transparent resonator for
wireless local area network applications. Microwave and Optical Technology
Letters, 60(12), pp.3034-3039.
Hu, R., 2020. COVID-19, smart work, and collaborative space: A crisis-opportunity
perspective. Journal of Urban Management. 9(3). pp.276-280.
Jílková, P. and Králová, P., 2021. Digital consumer behaviour and ecommerce trends during the
COVID-19 crisis. International Advances in Economic Research. 27(1). pp.83-85.
Kamara, S. and Lauter, K., 2018. Cryptographic cloud storage. In International Conference on
Financial Cryptography and Data Security (pp. 136-149). Springer, Berlin, Heidelberg.
Kurda, and et.al 2021. A Review on Security and Privacy Issues in IoT Devices. Academic
Journal of Nawroz University. 10(4). pp.192-205.
Nguyen, T.T. and Reddi, V.J., 2019. Deep reinforcement learning for cyber security. IEEE
Transactions on Neural Networks and Learning Systems.
Srivastava, P. and Khan, R., 2018. A review paper on cloud computing. International Journal of
Advanced Research in Computer Science and Software Engineering. 8(6). pp.17-20.
Sunyaev, A., 2020. Cloud computing. In Internet computing (pp. 195-236). Springer, Cham.
Wang, L. and Alexander, C.A., 2021. Cyber security during the COVID-19 pandemic. AIMS
Electronics and Electrical Engineering. 5(2). pp.146-157.
Williams, and et.al., 2020. Cybersecurity risks in a pandemic. Journal of medical Internet
research. 22(9). p.e23692.
Yang, P., Xiong, N. and Ren, J., 2020. Data security and privacy protection for cloud storage: A
survey. IEEE Access. 8. pp.131723-131740.
Books and Journals
Buttaro Jr, A. and Gambaro, L., 2018. The Index of Local Area Relative Disadvantage: A Cross-
Country Comparison. Centre for Longitudinal Studies, UCL: London, UK..
Cai, X., Fry, C.V. and Wagner, C.S., 2021. International collaboration during the COVID-19
crisis: autumn 2020 developments. Scientometrics. 126(4). pp.3683-3692.
Carley, and et.al., 2018. Social cyber-security. In International conference on social computing,
behavioral-cultural modeling and prediction and behavior representation in modeling
and simulation (pp. 389-394). Springer, Cham.
Crumpler, W. and Lewis, J.A., 2019. The cybersecurity workforce gap. Washington, DC, USA:
Center for Strategic and International Studies (CSIS).
Desai, A., Upadhyaya, T. and Palandoken, M., 2018. Dual band slotted transparent resonator for
wireless local area network applications. Microwave and Optical Technology
Letters, 60(12), pp.3034-3039.
Hu, R., 2020. COVID-19, smart work, and collaborative space: A crisis-opportunity
perspective. Journal of Urban Management. 9(3). pp.276-280.
Jílková, P. and Králová, P., 2021. Digital consumer behaviour and ecommerce trends during the
COVID-19 crisis. International Advances in Economic Research. 27(1). pp.83-85.
Kamara, S. and Lauter, K., 2018. Cryptographic cloud storage. In International Conference on
Financial Cryptography and Data Security (pp. 136-149). Springer, Berlin, Heidelberg.
Kurda, and et.al 2021. A Review on Security and Privacy Issues in IoT Devices. Academic
Journal of Nawroz University. 10(4). pp.192-205.
Nguyen, T.T. and Reddi, V.J., 2019. Deep reinforcement learning for cyber security. IEEE
Transactions on Neural Networks and Learning Systems.
Srivastava, P. and Khan, R., 2018. A review paper on cloud computing. International Journal of
Advanced Research in Computer Science and Software Engineering. 8(6). pp.17-20.
Sunyaev, A., 2020. Cloud computing. In Internet computing (pp. 195-236). Springer, Cham.
Wang, L. and Alexander, C.A., 2021. Cyber security during the COVID-19 pandemic. AIMS
Electronics and Electrical Engineering. 5(2). pp.146-157.
Williams, and et.al., 2020. Cybersecurity risks in a pandemic. Journal of medical Internet
research. 22(9). p.e23692.
Yang, P., Xiong, N. and Ren, J., 2020. Data security and privacy protection for cloud storage: A
survey. IEEE Access. 8. pp.131723-131740.
1 out of 11
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.