Discuss About The Technologies Network Information Security?
In this era of modern technology, ICT is gaining importance with time. The solutions that are provided by ICT help the organizations to create value (Keller & Heiko, 2014). It has become very crucial for the businesses to integrate and incorporate ICT in its business plan in order to achieve success (Day et al., 2012). ICT promotes a good process for managing information. Several IT projects have failed because the businesses have not been able to incorporate ICT in its processes and have treated ICT to be separate from business (Vaishnavi & Kuechler, 2015). There are numerous securities threats associated with ICT. The case study provided here talks about a small Australian software development firm that wants to expand its business. This report provides details about the ICT security needs and the security applications that would help the organization to expand.
This report talks about the network and information security in ICT. This report describes three such network or information security applications that are currently being used in the market. It also talks about the success as well as the failure factors of the network or information security applications. This report gives a brief overview of how these applications will help the organization to expand. It will point out the advantages and limitations of the applications. This report also provides recommendations from the entire discussion.
The concept of information and network security deals with the protection of information against any type of unauthorized tampering and access (Shiravi, Shiravi & Ghorbani, 2012). Every organization is aware of the security and data threats and gives it the topmost priority while implementing any business process. Information security also deals with protecting the system as well as network from any type of malware and virus attacks. The attacker generally tries to exploit the weaknesses that exist in the system or network (Skopik et al., 2012). A system or network can have technological, policy as well as configuration weakness (Luiijf, 2012). Strong security policies and standards can be implemented in order to overcome or mitigate such security threats.
ICT security threats are increasing at a fast pace. Every organization uses security applications that can be firewalls, antivirus as well as a system that detects intrusion (Grech et al., 2012). If the organization uses appropriate technologies and applications then it will help the organization to protect their sensitive information from any type of attack and data loss. Updated versions of the security applications will help the organization to develop and grow at a fast pace. It will also help to improve its operational efficiency along with customer satisfaction. Sensitive information can be encrypted so that it does not get hacked or misused by the attackers (Stallings & Tahiliani, 2014).There will not be any type of digital assaults by adopting and incorporating security applications that are appropriate for the organization. The organization can also use internet protocols and internet policies in order to protect itself from any security or data risks and threats.
Kaspersky Internet Security can be used by the software development company in Australia. This protects the computer from any types of known as well as new threats, phishing attacks, network attacks as well as spam (Gudkova et al., 2013). Several functions as well as protection components form a part of this application. The protection component is able to handle any threats. These components are known for providing real-time solutions and protection. File Anti-Virus is known for preventing any type of virus attacks that takes place in the files of the computer. It scans all the files that are saved, launched or opened on the system. Only disinfected and non infected files can be further accessed. The Mail Anti-Virus is responsible for scanning any type mails that are being sent or received in the computer system. The IM clients are protected by the IM Anti-Virus. The webcam can also be protected with the component of Webcam access. Firewall helps to protect the internal network from any external intrusion. Network monitoring is done by the network monitor. Anti-Spam scans all the email messages that are received. It also does the function of preventing phishing activity by checking the URLs. The installation package size is less. All these factors are responsible for the success of this security application. Some of the challenging factors of this security application are that it is said to reduce the performance of the computer and it cannot detect any malicious website at a fast rate. The system speed reduces and also the firewall compatibility also needs improvement (Verlinde & Verlinde, 2013). But the overall advantages overshadow the disadvantages of this application and therefore the given organization can implement and incorporate this application.
Bitdefender Total Security is another application that can be used by the organizations in order to protect the computer system against all types of malware like viruses, Trojans, spyware as well as internet threats like phishing, spam and hacking attacks (Pavel, 2013). It performs the functions of on access scanning in order to prevent any type of entry of the malware threats. It also performs on demand scanning where it detects and removes any malware residing in the computer system. It provides a real time protection to the network as well as the system. Bitdefender can also scan the files in the system. Bitdefender can automatically scan the emails as well as the HTTP traffic in order to protect the computer from downloading infected documents from the internet. It also improves the responsiveness of the system by scanning new and modified files. There are functionalities like tracking of the keyboard. There is a component called keylogger that tracks and records whatever is typed on the keyboard. It also has a scanning feature that helps it to scan the system during the time of startup. It also has the ability to scan cookies as well as the memory. There are certain disadvantages of this application as well, like the process of scanning archives is extremely slow and uses huge amount of resources. The web traffic scanning process is also a slow process and the system performance is deteriorated.
Norton Security applications can also be used for the purpose protecting the computer networks and systems from the advanced threats of this generation. It gives superior security features along with fast performance (Min et al., 2014). It helps in safeguarding the identity and protecting sensitive data. Its main advantage over any other application is that it helps the computer to run at a high speed and perform well. It has the ability to protect computers as well as other devices from any kinds of security threats (Ciampa, 2012). This application allows the organization to select which data is to be protected along the with the security level. It also gives the user the right to select the Internet access level. It gives an automatic generated message or warning if sensitive information is being sent without any encryption. All the internet connections are also monitored by this application. Norton Anti-Virus prevents any type of malware attack like virus, Trojan horses as well as worms. Norton Firewall alerts the system if there is any kind of intrusion and prevents any types of external attacks (Suh et al., 2014). It also blocks any type of advertisements on the web. These factors are called the success factors of the application. There are certain features that are responsible for its failure like it consumes a huge memory of the system in which it is installed. It is extremely difficult to uninstall the application. It cannot be completely removed from the system. The benefits that this application provides are much more as compared to the limitations. Therefore, the given organization can adopt this Norton security application.
The above mentioned applications can be used for the purpose of expanding the business in the upcoming five years and form many branches within ICT. The information and communication technology is prone to several types of risks that can harm the operations of the organization. Some of the risks are as follows:
Malicious Software: It is a type of software that is designed to harm or damage the computer system (Sikorski & Honig, 2012). Some examples of malwares are viruses, Trojan horses as well as worms. This type of attack falls under the category of deliberate threats.
Spyware: These programs get installed in the system without letting the users know about it. They keep a watch on the activities of the system and access the information (Kahate, 2013). These programs then send the sensitive data to the attacker.
Vulnerabilities: These are faults in the system that can be exploited by the attackers. The attackers exploit the system in order to damage, steal and block information that is confidential to the organization.
The above mentioned risks need to be prevented and mitigated so that the organization does not face any difficulty in developing and expanding its business. The information or network security applications are no longer an option. The emergence of the security threats has made the use of security applications as a necessity for all the organizations.
Adopting these applications will provide several benefits to the organizations. The sensitive information will be safe and secured. The attackers will not be able to hack into the system or the network and capture the sensitive information of the system. Implementing strong security policies will help the organization to become well reputed in the industry as well as it will help to create a global image around the world. The organization will achieve its present goals of expanding if they adopt security applications (Cardona, Kretschmer & Strobel, 2013). The organization should not focus on the developing in house security applications. They should concentrate on purchasing vendor applications. This will help to reduce their cost. The maintenance of the applications will not be a headache for the organization. The organization will not need to spend money and time behind the maintenance process (Kotelnikov, 2014). They can invest their time and money in other operations that will help them to increase the productivity and generate revenue. The third party vendor will take the responsibility of the maintenance. The organization would incur huge expense it they had to build their own applications. The vendors have expertise knowledge and they will solve any type of issue that is faced by the organization. The disadvantage of buying the applications from the vendors is that the organization will not have much control over the applications. The organization will become dependent on the vendors. There can be clash between the organization and the vendors. The advantages overshadow the disadvantages and therefore the organization must purchase the information or security applications from the vendors.
Conclusion
It can be concluded from this report that it is extremely essential for the organization to implement and use information and network security applications. The emergence of information and communication technology has led to the rise in the level of the security threats. This report has explained about three such important and useful security applications that can be used by the organization for the purpose of expanding. The three applications that have been discussed in this report are Norton Security, Bitdefender Total Security and Kaspersky Internet Security. Norton Security is known for giving superior security features along with fast performance. It helps in safeguarding the identity and protecting sensitive data. Bitdefender Total Security is another application that can be used by the organizations in order to protect the computer system against all types of malware like viruses, Trojans, spyware as well as internet threats like phishing, spam and hacking attacks. Kaspersky Internet Security protects the computer from any types of known as well as new threats, phishing attacks, network attacks as well as spam. It contains a protection component that is able to handle all types of threats. This report also explained about the advantages and disadvantages of using these applications. Strong security policies will help the organization to prevent and mitigate the security risks and threats.
Use of vendor applications: The organization must purchase information and security applications from the vendors. This will help the company to save the maintenance cost. There will not be any wastage of time due to maintenance. The vendors will take care of the maintenance of the applications. The organization will be able to concentrate in other areas and improve its efficiency as well as productivity. The vendors will have expertise knowledge about the applications and will give correct advice to the organization regarding any type of problem. The vendors will also look after the regular updates of the applications.
Backup plan: The organization must have a proper backup strategy for being on the safe side. The organization must engage in regular backup programs. This will help the firm to retain useful and important information. The backup data must be stored in a different storage location so that there is no issue regarding loss of information.
Firewall Security: Firewall is considered to be a device that is known for blocking certain types of traffic over the network. It acts like a barrier or wall between the private and the public network. The private network is the trusted network and the external or public network is considered to be the non trusted network. The organization can implement firewall so that there is no external intrusion into the private or internal network. Firewall implementation can be either software or hardware. This provides security to the organizations. The firewall has certain sets of conditions in it. If the conditions are met then the firewall allows the external traffic to enter the internal network. If the conditions are not met then the firewall will stop the entry of the external traffic. The organization mentioned in the case study must implement firewalls in order to expand and grow its business.
Encryption: In the process of encryption, plain texts are converted in the form of cipher texts. The organization must focus on encrypting the sensitive data so that there is no data breach or loss in the future. This will help the organization to save and protect the sensitive information from the unauthorized users.
References
Cardona, M., Kretschmer, T., & Strobel, T. (2013). ICT and productivity: conclusions from the empirical literature. Information Economics and Policy, 25(3), 109-125.
Ciampa, M. (2012). Security+ guide to network security fundamentals. Cengage Learning.
Day, A., Paquet, S., Scott, N., & Hambley, L. (2012). Perceived information and communication technology (ICT) demands on employee outcomes: The moderating effect of organizational ICT support. Journal of Occupational Health Psychology, 17(4), 473.
Grech, A., Chartrand-Miller, K., Erftemeijer, P., Fonseca, M., McKenzie, L., Rasheed, M., … & Coles, R. (2012). A comparison of threats, vulnerabilities and management approaches in global seagrass bioregions. Environmental Research Letters, 7(2), 024006.
Gudkova, D., Kulikova, T., Kalimanova, K., & Bronnikova, D. (2013). Kaspersky security bulletin. Spam Evolution.
Kahate, A. (2013). Cryptography and network security. Tata McGraw-Hill Education.
Keller, J., & Heiko, A. (2014). The influence of information and communication technology (ICT) on future foresight processes—Results from a Delphi survey. Technological Forecasting and Social Change, 85, 81-92.
Kotelnikov, V. (2014). Small and medium enterprises and ICT.
Luiijf, E. (2012). Understanding cyber threats and vulnerabilities. In Critical Infrastructure Protection (pp. 52-67). Springer Berlin Heidelberg.
Min, B., Varadharajan, V., Tupakula, U., & Hitchens, M. (2014). Antivirus security: naked during updates. Software: Practice and Experience, 44(10), 1201-1222.
Pavel, C. (2013). Bitdefender®, the award-winning provider of innovative antivirus solutions. Romanian Distribution Committee Magazine, 4(1), 20-24.
Shiravi, H., Shiravi, A., & Ghorbani, A. A. (2012). A survey of visualization systems for network security. IEEE Transactions on visualization and computer graphics, 18(8), 1313-1329.
Sikorski, M., & Honig, A. (2012). Practical malware analysis: the hands-on guide to dissecting malicious software. no starch press.
Skopik, F., Ma, Z., Bleier, T., & Grüneis, H. (2012). A survey on threats and vulnerabilities in smart metering infrastructures. International Journal of Smart Grid and Clean Energy, 1(1), 22-28.
Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: principles and practice (Vol. 6). London: Pearson.
Suh, M., Park, S. H., Lee, B., & Yang, S. (2014, February). Building firewall over the software-defined network controller. In Advanced Communication Technology (ICACT), 2014 16th International Conference on (pp. 744-748). IEEE.
Vaishnavi, V. K., & Kuechler, W. (2015). Design science research methods and patterns: innovating information and communication technology. Crc Press.
Verlinde, E., & Verlinde, H. (2013). Passing through the firewall. arXiv preprint arXiv:1306.0515.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download