The organization is a small software company that is based out of Melbourne, Australia and was set up four years back. The business domain that the organization works in includes information and network security. The company works in the development along with the customization of the applications in the area of information security and network security. The clients of the company are primarily based out of Australia and are the small and medium scale firms and business units. The company carries out the in-house development of the applications and also customizes the off-the-shelf applications and packages.
The organization is now expanding its business activities and operations and is set to target new customers. It aims to provide online security services to its existing and new customers. The new set of clients may include pharmaceutical organizations, online gambling organizations and hospitality industry organizations.
There are a lot many developments that are being done in the field of network and information security with each passing day. There are many applications that have been developed in these areas to make sure that the associated risks and attacks are avoided. The report covers the details of such applications along with their features, advantages and disadvantages. The organization is looking to expand in the coming years and the utility of these applications in the expansion phase has also been covered in the report (Abomhara & Koien, 2015).
The primary aim of the report is to cover the latest developments that have been done in the area of information and network security. The report covers three of such applications along with their details. The expansion plan in terms of these applications has also been covered. There are recommendations and findings that have been included at the end to make sure that a complete clarity is provided and the organization makes use of the best available options.
Information Security refers to the discipline that includes the measures that are taken by a user or an organization to protect the information from the security risks and attacks. There are three primary properties of the information that are required to be protected viz. confidentiality, integrity and availability. There are numerous information security risks that have been created to cause damage to these properties of information. Information security provides the technical, administrative and physical security measures to prevent and detect these attacks.
The networking infrastructure that is being used in the applications, systems and organizations of the present times are exposed to a number of security threats and risks. Network Security is the domain that provides the physical and logical measures that may be taken to avoid such issues. There are also administrative checks and controls that are applied to ensure that the network security risks are avoided.
There are various information and network security attacks that are being executed by the attackers. The information and network security applications that the organization develops and customizes must make sure that the following security issues are targeted.
There are countermeasures that are being developed for every new security risk and attack. There are developments that are being done in the areas of information security as well as network security to deal with the security issues.
Some of the popular areas of research and development include Cryptography, malware protection, intrusion detection and prevention, network monitoring and database security.
There are several applications that have been developed and are present in the market for dealing with information and network security attacks.
There are various security packages that are now available in the market that provide an integrated security solution using latest measures and steps.
One such package is the Comodo Advanced Equipment that is a low-cost security solution which will be apt for the organization as it is in its expansion phase (Strom, 2016).
The application has been designed using Default Deny Platform that allows the good/clean files that are known and blocked the bad files that are known. The files that are not known are executed using the patent -pending container. There are several features that are provided by this application, such as, automatic prevention of the malware from taking entry into the network. It also provides the protection from viruses and includes free/paid SSL certificates. Internet security along with mobile device management is integrated in the application with additional features such as firewall protection and many more.
Business Intelligence and Big Data tools are being used by the organizations in the current times in terms of the latest elements of technology. Comodo Advanced Endpoint application also makes use of these technologies for behavior analysis and recognizing the patterns that are used for the execution of the attack. There are intrusion detection services that are included in the application that also make use of analytical tools for understanding the patterns that are used by the intruders to gain entry to the system.
The organization will be able to use the features of the tool to develop an application as per the specifications of the client or may also customize the same as per the customer expectations and requirements.
The advantages of the application are as listed below:
There are certain drawbacks that are also associated with the application as:
Malicious codes and programs that are commonly known as malware are the primary reason forms of security attacks that adversely damage the information as well as network security.
There is a lot of work that is being done in the area of malware protection and there are many applications that are also available in the market to offer the customers with the same. One such application is the Bitdefender Antivirus Plus (Pcmag, 2016).
The application includes the following set of features and advantages:
There are also a few drawbacks that are associated with the application.
Encryption is one of the advanced and most useful mechanisms that can be used for the information and network security.
There are tools that are available in the market that can be used for the advanced encryption of the files and information. One such tool is VeraCrypt.
VeraCrypt is an application that is open source in nature and has been provided by IDRIX. It is a disk encryption application that encrypts the files and makes sure that the risks such as data thefts and leakages are avoided (Fearn, 2017).
The application comes with the following set of features and advantages:
There are also a few drawbacks that are associated with the application.
The research that has been done on the latest developments in the areas of information security and network security have provided the results that the organization must make use of the applications that are available in the market to strengthen its area of expertise.
The applications that have been discussed above will provide the organization with the ability to understand the client expectations and demands from such a solution. The same can then be used in the in-house development of the application to provide an enhanced version to the users to make sure that the security of their systems and applications is maintained and ensured.
The customization of the off-the-shelf applications can also be done and it will require the organization to undertake a deeper analysis of the client requirements and expectations.
The organization will be required to carry out a planned approach for a successful expansion. There are the following key terms and features that shall be included in the process.
Expansion of the organization must also include the setting up of a research team that shall carry out research and analysis activities to keep a track of the latest developments being done in the areas of information and network security. In such a manner, the organization will be able to reach out to the targeted customers.
Conclusion
Information security and network security are the primary areas of research in the current time. The organization also deals in the same and there are efforts that are being done to make sure that the expansion of the organization is done to reach out to maximum number of clients (Allen, 2012).
There are various developments and applications that have been discussed in the report in these areas. Comodo Advanced Endpoint is a security application that provides numerous features, such as, automatic prevention of the malware from taking entry into the network. It also provides the protection from viruses and includes free/paid SSL certificates. Internet security along with mobile device management is integrated in the application with additional features such as firewall protection and many more. The report also covers the malware tool as Bitdefender Plus that provides advanced malware protection and services. VeraCrypt is an application that is open source in nature and has been provided by IDRIX. It is a disk encryption application that encrypts the files and makes sure that the risks such as data thefts and leakages are avoided.
These applications will allow the organization to understand the security requirements from such a solution and will enable it to have an enhanced in-house application development. The customization process will also be made easy with the aid of the same.
The objectives of the report were to cover the details of these applications and to provide the organization with the guidelines to carry out successful expansion.
The same has been achieved in the report as the organization will now have clarity on the applications that it may make use of. It will also provide them with the ability to understand the major research areas and the focus points as well. An overview of the expansion plan has also been successfully covered.
The primary area of research for the organization shall include technologies such as business intelligence and Big Data tools for the enhancement of network and information security. These tools will allow the organization to develop the latest security measures to be offered to the customers (Hagen, 2013). The next recommendation is the use of cryptographic solutions and algorithms such as advanced encryption and hashing so that the security solutions that are designed are as per the latest security requirements. Cryptography is being extensively researched and the damage that is caused by many of the security risks can be prevented using the same. Network security can be enhanced by making use of advanced intrusion detection and prevention applications (Brecht, 2012).
The organization must focus upon the in-house development of the applications by gaining knowledge on the latest security requirements and mechanisms. The customization can also be done in certain cases wherein the requirements are clearly known and there is a work environment that is provided by the client (Zanoon, Albdour, Hamatta & Al-Tarawneh, 2015).
There shall be efforts that must be done in the areas of the research and analysis to understand the changing nature of security and the latest advancements that are being done.
References
Abomhara, M., & Koien, G. (2015). Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. Retrieved 6 September 2017, from https://www.riverpublishers.com/journal/journal_articles/RP_Journal_2245-1439_414.pdf
Allen, J. (2012). Deriving Software Security Measures from Information Security Standards of Practice. Retrieved 6 September 2017, from https://www.sei.cmu.edu/library/assets/whitepapers/derivingsecuritymeasures.pdf
Bajwa, M. (2014). Wireless Network Security Threats and Mitigation—A Survey. Retrieved 7 September 2017, from https://file.scirp.org/pdf/_2014091813425297.pdf
Bendovschi, A. (2015). Cyber-Attacks – Trends, Patterns and Security Countermeasures – ScienceDirect. Sciencedirect.com. Retrieved 6 September 2017, from https://www.sciencedirect.com/science/article/pii/S2212567115010771
Brecht, M. (2012). A Closer Look at Information Security Costs Working Paper. Retrieved 6 September 2017, from https://www.econinfosec.org/archive/weis2012/papers/Brecht_WEIS2012.pdf
Comodo. (2016). Comodo Launches Advanced Endpoint Protection Solution. comodo.com. Retrieved 6 September 2017, from https://www.comodo.com/news/press_releases/2016/02/comodo-launches-advanced-endpoint-protection.html
Fearn, N. (2017). Top 5 best encryption tools of 2017. TechRadar. Retrieved 6 September 2017, from https://www.techradar.com/news/top-5-best-encryption-tools
Hagen, J. (2013). Effectiveness of Organisational Information security measures. Retrieved 6 September 2017, from https://www.frisc.no/wp-content/uploads/2013/02/finse2013-hagen.pdf
Lippmann, R., & Riordan, J. (2016). Threat-Based Risk Assessment for Enterprise Networks. Retrieved 7 September 2017, from https://ll.mit.edu/publications/journal/pdf/vol22_no1/22_1_3_Lippmann.pdf
Pcmag. (2016). Bitdefender Antivirus Plus. PCMag India. Retrieved 6 September 2017, from https://in.pcmag.com/bitdefender-antivirus-plus-2015/52300/review/bitdefender-antivirus-plus
PCMag. (2017). VeraCrypt. PCMag Business Software Index. Retrieved 6 September 2017, from https://www.pcmag.com/business/directory/encryption/1671-veracrypt
Scaife, N. (2016). CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data. Retrieved 6 September 2017, from https://www.cise.ufl.edu/~traynor/papers/scaife-icdcs16.pdf
Spruit, M., & Wester, W. (2013). RFID Security and Privacy: Threats and Countermeasures. Retrieved 6 September 2017, from https://www.cs.uu.nl/research/techreps/repo/CS-2013/2013-001.pdf
Stephenson, P. (2017). Comodo Advanced Endpoint Protection product review | SC Media UK. Scmagazineuk.com. Retrieved 6 September 2017, from https://www.scmagazineuk.com/comodo-advanced-endpoint-protection/review/9393/
Strom, D. (2016). 10 cutting-edge tools that take endpoint security to a new level. Network World. Retrieved 6 September 2017, from https://www.networkworld.com/article/3089361/endpoint-protection/10-cutting-edge-tools-that-take-endpoint-security-to-a-new-level.html
Veracrypt. (2017). VeraCrypt. CodePlex. Retrieved 6 September 2017, from https://veracrypt.codeplex.com/
Zanoon, N., Albdour, N., Hamatta, H., & Al-Tarawneh, R. (2015). Security Challenges as a Factor Affecting the Security of Manet: Attacks, and Security Solutions. Retrieved 6 September 2017, from https://airccse.org/journal/nsa/7315nsa01.pdf
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download