University Report: Recommendation Document for Network and Security
VerifiedAdded on 2023/04/21
|6
|1200
|240
Report
AI Summary
This report focuses on network security recommendations for a manufacturing company, Big Metals, which aims to extend its interface and upgrade its database to provide secure access via a portal, including access via mobile devices. The report addresses security concerns related to mobile device usage, proposing recommendations such as multi-factor authentication, VPNs, private firewalls, and regular updates. It discusses the advantages of mobile devices, like improved network connectivity, while also acknowledging disadvantages such as smaller screen sizes and the need for robust CPU and memory resources. The report highlights associated risks, including malware, intercepted communications, and human error, emphasizing the importance of data confidentiality. The report recommends the Agile methodology for project development, citing its flexibility in adapting to changes and its ability to reduce project risks through a dedicated team approach. The conclusion reinforces the importance of enhanced security alongside technological advancements, aiming for successful project outcomes.

Running head: RECOMMENDATION DOCUMENT FOR NETWORK AND SECURITY
Recommendation Document for Network and Security
Name of the Student
Name of the University
Author’s note
Recommendation Document for Network and Security
Name of the Student
Name of the University
Author’s note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1RECOMMENDATION DOCUMENT FOR NETWORK AND SECURITY
Table of Contents
1. Introduction..................................................................................................................................2
2. Discussion....................................................................................................................................2
2.1 Recommendation for the use of Mobile Devices..................................................................2
3. Conclusion...................................................................................................................................4
References........................................................................................................................................5
Table of Contents
1. Introduction..................................................................................................................................2
2. Discussion....................................................................................................................................2
2.1 Recommendation for the use of Mobile Devices..................................................................2
3. Conclusion...................................................................................................................................4
References........................................................................................................................................5

2RECOMMENDATION DOCUMENT FOR NETWORK AND SECURITY
1. Introduction
Big Metals is a manufacturing company that is responsible for manufacturing the
automobile parts. The company performs Research and Development and thus support important
patents. La Polla, Martinelli and Sgandurra (2013) have discussed that in the present times, the
company has planned to extend their interface, upgrade their existing database and thus provide
users with a secure portal. This report thus puts focus on the concerns over the security of the
network based on the use of mobile devices.
2. Discussion
2.1 Recommendation for the use of Mobile Devices
Mobile devices are considered to be a convenient way to process data and thus their use
within the business practices have formed a major part in the recent times have been described
by Cheever et al. (2014). As the recent generated data resides within mobile devices, hence there
are several chances that these would be the prime target before hackers and criminal
organisation.
Some of the recommendations that could support the major impact of risks on the mobile
devices are:
Use of multi-factor authentication methods based on accessing internet resources.
Use of VPN during accessing of Wi-Fi or during using of applications based within ASP.
Installation of a private firewall.
According to Ellaway et al. (2014) the regular update of mobile applications and
installation of security patches within browsers and mobile operating systems.
1. Introduction
Big Metals is a manufacturing company that is responsible for manufacturing the
automobile parts. The company performs Research and Development and thus support important
patents. La Polla, Martinelli and Sgandurra (2013) have discussed that in the present times, the
company has planned to extend their interface, upgrade their existing database and thus provide
users with a secure portal. This report thus puts focus on the concerns over the security of the
network based on the use of mobile devices.
2. Discussion
2.1 Recommendation for the use of Mobile Devices
Mobile devices are considered to be a convenient way to process data and thus their use
within the business practices have formed a major part in the recent times have been described
by Cheever et al. (2014). As the recent generated data resides within mobile devices, hence there
are several chances that these would be the prime target before hackers and criminal
organisation.
Some of the recommendations that could support the major impact of risks on the mobile
devices are:
Use of multi-factor authentication methods based on accessing internet resources.
Use of VPN during accessing of Wi-Fi or during using of applications based within ASP.
Installation of a private firewall.
According to Ellaway et al. (2014) the regular update of mobile applications and
installation of security patches within browsers and mobile operating systems.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3RECOMMENDATION DOCUMENT FOR NETWORK AND SECURITY
Some of the potential advantages of use of mobile devices are that: This would help the
IT department to manage the different applications within Operating Systems as discussed by
McNaughton and Light (2013). It would also help in supporting the access of several devices
within any location based on improved network connectivity.
On the other hand, some disadvantages that would be faced within the mobile working
environment are: impact of less screen size, which could impact the eyesight of individuals.
According to Ellaway et al. (2014) there should also be a high form of CPU and memory
resources. This would be helpful for running the client machine and using of a Bluetooth
keyboard.
Some of the risks that are also associated with the impact of a mobile working
environment. These are listed as follows: maladvertising and Mobile affected malware, impact of
perpetrators who would typically target devices. The risks also include intercepted
communications, human error and threats from inside the organisation. Lebek, Degirmenci and
Breitner (2013) have discussed that confidentiality also plays a major role within an organisation.
Hence, the loss of confidentiality within the mobile devices would be a great harm to the
organisation based on exchange of data. Confidential information should be stored in highly
secure servers. They should not be disclosed to different third parties that includes partner
agencies and advertising networks.
Based on the concerns over the security of network, there should be a proper mode of
development approach. This would eventually lead to provide technical and R&D documentation
within the global environment. Based on the current trends of the market, it could be
recommended that the Agile methodology would be the best for the project. This methodology
would mostly prefer the choice of customers. According to Inayat et al. (2015) the methodology
Some of the potential advantages of use of mobile devices are that: This would help the
IT department to manage the different applications within Operating Systems as discussed by
McNaughton and Light (2013). It would also help in supporting the access of several devices
within any location based on improved network connectivity.
On the other hand, some disadvantages that would be faced within the mobile working
environment are: impact of less screen size, which could impact the eyesight of individuals.
According to Ellaway et al. (2014) there should also be a high form of CPU and memory
resources. This would be helpful for running the client machine and using of a Bluetooth
keyboard.
Some of the risks that are also associated with the impact of a mobile working
environment. These are listed as follows: maladvertising and Mobile affected malware, impact of
perpetrators who would typically target devices. The risks also include intercepted
communications, human error and threats from inside the organisation. Lebek, Degirmenci and
Breitner (2013) have discussed that confidentiality also plays a major role within an organisation.
Hence, the loss of confidentiality within the mobile devices would be a great harm to the
organisation based on exchange of data. Confidential information should be stored in highly
secure servers. They should not be disclosed to different third parties that includes partner
agencies and advertising networks.
Based on the concerns over the security of network, there should be a proper mode of
development approach. This would eventually lead to provide technical and R&D documentation
within the global environment. Based on the current trends of the market, it could be
recommended that the Agile methodology would be the best for the project. This methodology
would mostly prefer the choice of customers. According to Inayat et al. (2015) the methodology
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4RECOMMENDATION DOCUMENT FOR NETWORK AND SECURITY
would be able to welcome changes that would be according to expected schedule, costs and other
features. Based on this methodological approach, there would be an approach for reducing the
amount of risks within a project. The agile methodology is also highly feasible as it would
involve a highly dedicated team who would be able to understand the case scenarios and
recommend better solutions. This kind of teams would also involve high level of synchronization
and coordination within the members of the team. The methodology would also perform better
within proper time and available resources as described by La Polla, Martinelli and Sgandurra
(2013). This would reduce the risk based on immediate needs of availability of resources and
would ensure the delivery of products or services within the proper time period.
3. Conclusion
Based on the discussion from the above report, it could be concluded that the impact of
mobile devices within the virtual environment would be able to lead to the success of the
organisation. With the upgrade in the technical platform, there should also be a higher level of
security within the devices. There are major kind of risks in the outside environment. There
could be different kind of software methodological approaches, which could be applied to the
current work of the project. Based on the provided choices, there should be a systematic and
steady form of approach for applying them to the development of the project. This would thus
ensure a healthy project development approach and success to the future outcomes.
would be able to welcome changes that would be according to expected schedule, costs and other
features. Based on this methodological approach, there would be an approach for reducing the
amount of risks within a project. The agile methodology is also highly feasible as it would
involve a highly dedicated team who would be able to understand the case scenarios and
recommend better solutions. This kind of teams would also involve high level of synchronization
and coordination within the members of the team. The methodology would also perform better
within proper time and available resources as described by La Polla, Martinelli and Sgandurra
(2013). This would reduce the risk based on immediate needs of availability of resources and
would ensure the delivery of products or services within the proper time period.
3. Conclusion
Based on the discussion from the above report, it could be concluded that the impact of
mobile devices within the virtual environment would be able to lead to the success of the
organisation. With the upgrade in the technical platform, there should also be a higher level of
security within the devices. There are major kind of risks in the outside environment. There
could be different kind of software methodological approaches, which could be applied to the
current work of the project. Based on the provided choices, there should be a systematic and
steady form of approach for applying them to the development of the project. This would thus
ensure a healthy project development approach and success to the future outcomes.

5RECOMMENDATION DOCUMENT FOR NETWORK AND SECURITY
References
Cheever, N.A., Rosen, L.D., Carrier, L.M. and Chavez, A., 2014. Out of sight is not out of mind:
The impact of restricting wireless mobile device use on anxiety levels among low, moderate and
high users. Computers in Human Behavior, 37, pp.290-297.
Ellaway, R.H., Fink, P., Graves, L. and Campbell, A., 2014. Left to their own devices: medical
learners’ use of mobile technologies. Medical teacher, 36(2), pp.130-138.
Inayat, I., Salim, S.S., Marczak, S., Daneva, M. and Shamshirband, S., 2015. A systematic
literature review on agile requirements engineering practices and challenges. Computers in
human behavior, 51, pp.915-929.
La Polla, M., Martinelli, F. and Sgandurra, D., 2013. A survey on security for mobile
devices. IEEE communications surveys & tutorials, 15(1), pp.446-471.
Lebek, B., Degirmenci, K. and Breitner, M.H., 2013. Investigating the influence of security,
privacy, and legal concerns on employees' intention to use BYOD mobile devices.
McNaughton, D. and Light, J., 2013. The iPad and mobile technology revolution: Benefits and
challenges for individuals who require augmentative and alternative communication.
References
Cheever, N.A., Rosen, L.D., Carrier, L.M. and Chavez, A., 2014. Out of sight is not out of mind:
The impact of restricting wireless mobile device use on anxiety levels among low, moderate and
high users. Computers in Human Behavior, 37, pp.290-297.
Ellaway, R.H., Fink, P., Graves, L. and Campbell, A., 2014. Left to their own devices: medical
learners’ use of mobile technologies. Medical teacher, 36(2), pp.130-138.
Inayat, I., Salim, S.S., Marczak, S., Daneva, M. and Shamshirband, S., 2015. A systematic
literature review on agile requirements engineering practices and challenges. Computers in
human behavior, 51, pp.915-929.
La Polla, M., Martinelli, F. and Sgandurra, D., 2013. A survey on security for mobile
devices. IEEE communications surveys & tutorials, 15(1), pp.446-471.
Lebek, B., Degirmenci, K. and Breitner, M.H., 2013. Investigating the influence of security,
privacy, and legal concerns on employees' intention to use BYOD mobile devices.
McNaughton, D. and Light, J., 2013. The iPad and mobile technology revolution: Benefits and
challenges for individuals who require augmentative and alternative communication.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





