Tuesday, May 5, 2020

Advent Of Internet In Business Organization †MyAssignmenthelp.com

Question: Discuss about the Advent Of Internet In Business. Answer: Introduction The advent of Internet has brought in a revolution in the working of any business organization. The digitalization of the business has brought in innovation and made the business even more convenient. However, along with the extensive use of the Internet technology, various risks in the use of the ICT have been witnesses. The need for security and protection of the information has become essential. In order to ensure the successful use of the Internet and ICT, the confidentiality and privacy protection of the collected information needs to be ensured. This assignment highlights the need for network security in a Melbourne based small business organization. As given in the case study, the business organization operates in development and customization of various Internet based application. The business organization also operates in information and network security. The company has clients from the major cities of Australia and provides a range of services to small and large companies of Australia. However, the company now wishes to explore other options for the expansion of the business, to all parts of Australia, as well as overseas. One of the future options that the company might consider providing is the information and network security (Beberlein et al., 2017). The company might consider venturing into managing online databases and websites of the clients. Moreover, as mentioned in the case study, the potential clients might range from gambling organizations to small pharmaceutical companies or hospitality industry. This report explores the various network and security applications that are prevalent in the present business scenario (Perlman, Kaufman Speciner, 2016). The advantages and disadvantages of the various applications have been discussed, along with the recommendations for the company that could be used successfully for the expansion of the business. Body Network security refers to the applications that are designed in order to protect the integrity and usability of the Internet network and the information that is stored and used. The network security ensures confidentiality and privacy of the information, along with restricting access of unauthorised users (Asati et al., 2014). Effective network security ensures that various kinds of internal as well as external threats are prevented from entering the system, as well as spreading all over the network (Pierson DeHaan, 2015). A variety of network security are available. These are as follows: Access control: One of the very basic network securities that are available includes the access control. Controlling the access of all the users and ensuring that only authorised people use the network has a key role to play in the business organizations (Dumas Bennett, 2015). This will ensure that only authorised personnel have valid login ids and passwords, in order to access information (Perlman, Kaufman Speciner, 2016). This process is known as the Network Access Control (NAC). Antivirus and antimalware software: One of the major threats that computer networks face is the attack of the Malwares or malicious software that attacks the computers, and gain access to the confidential information (Williams et al., 2014). This software often deletes and tampers data, thus, causing harm to the confidentiality of the business organization. Anti-virus protects the computer network from the attack of malware and virus. Application security: Business organizations use various kinds of application software, in order to conduct their business successfully (Beberlein et al., 2017). Whether the company itself builds the software or it buys it from any vendor, it is important that the application is secure. The Applications that are used by any business organization includes hardware, software and other network elements (Li et al., 2016). Thus, the vulnerabilities of these applications have to be made secured, such that the vulnerabilities cannot be exploited. Behavioural analytics: This kind of security is used in order to detect abnormal behaviour in the network traffic (Perlman, Kaufman Speciner, 2016). For example, if an intruder is trying to crack the login id and password, several failed login will be detected, thus abnormal behaviour and traffic is detected (Dangovas Kuliesius, 2014). The security team is able to track these indicators and detect abnormal system behaviour. Email security: Emails are a major gateway through which security breaches and threats take place. Hackers and attackers often use personal information and social engineering, in order to send various exploits through emails (Asati et al., 2014). The attachments in an email often contain malicious links and as soon as the user clicks, they are directed to phishing sites. These websites resemble the real websites and hence the users are often deceived (Vaishnavi Kuechler, 2015). Firewalls: A firewall is a virtual barrier between a trusted internal network and un-trusted external network. The firewall uses a set of protocols that blocks the external traffic. Firewall could be both software and hardware (Hashim, 2015). Firewalls ensure that malicious external traffic do not cause harm to the internal flow of information, within the trusted network (Beberlein et al., 2017). Intrusion prevention system: An intrusion prevention system is a network traffic scanner that actively blocks the attackers (Dangovas Kuliesius, 2014). They track the various activities of the network traffic and blocks, in case they find unusual activities (Mullick et al., 2014). This helps in the prevention of the intrusion and thus protects the network systems, thus ensuring safety. Network segmentation: Network segmentation software puts the network traffic into different categories, thus enforcing security policies. The traffic classifications are done on the basis of endpoint identifies. A person, under this system can gain access rights in the network based one location, role and designation, thus ensuring privacy (Hashim, 2015). Virtual private network: The virtual private network encrypts the connection from an endpoint of a network, thus creating a virtual private network, over the Internet. A remote access VPN uses IPSec or Secure Socket Layers, in order to authenticate the communication that takes place between network and the communication devices (Bloom et al., 2014). In order to ensure that the company is able to expand its business, the company might venture into providing access control, virtual private network and include firewall services. The advantages of providing access control include prevention of unauthorised access in the database as well as in the network systems (Beberlein et al., 2017). However, one of the major disadvantages of using the access control network security is that each employee who are eligible for gaining the access, has to give login ids and passwords. In case of any emergency, without the approval of the admin, no employee can access the databases and information (Mullick et al., 2014). Thus, the company has to ensure that the access control security systems are successfully implemented. The company could develop the firewall and expand its business successfully. The advantages of using a firewall include the prevention of unwanted traffic from entering the secured network, thus protecting the clients system from various attacks. However, there are certain disadvantages as well (Asati et al., 2014). The disadvantages include the restriction of the legitimate users. The firewalls are designed to restrict unauthorised information; however, the strict protocols of firewall might prevent the legitimate users as well. However, the company should ensure that the vulnerabilities of the firewall are handled with care (Hashim, 2015). If the employees use backdoors heavily, due to the strict protocols used by the firewall, then the vulnerabilities of the backdoor could be exploited as well. Thus, the company needs to ensure that the vulnerabilities of firewall are not exploited (Williams et al., 2014). The Virtual Private Network services could also be provided by the business organization. The VPN ensures that an encrypted channel of communication is carried out over the Internet, through a privatised channel (Perlman, Kaufman Speciner, 2016). A private network of communication is carried out virtually, thus ensuring secure communication, even within the public Internet. Thus, the virtual private network ensures that a private network is created in the public network preventing intruders to eavesdrop into the conversation or exchange of information that is taking place in the private network. This is effective in ensuring confidentiality and data protection along with providing network security to the business organisations. It is essential that the ethical, social and legal considerations be given adequate importance, in order to ensure sustainable and feasible business. The ethical considerations that the business needs to abide by include the data protection and maintenance of privacy. The developers of the software might know the vulnerabilities of the network security. However, the employees need to refrain from exploiting the vulnerabilities (Asati et al., 2014). The backdoor systems should not be exploited by the business organization (Perlman, Kaufman Speciner, 2016). Moreover, since the company mentioned in the case study are service providers of network security, hence the confidential information of the clients is readily available (Bloom et al., 2014). However, in order to abide by the ethical considerations, the data protection and confidentiality should be maintained (Beberlein et al., 2017). Moreover, the social considerations are also important to be considered by the business organizati on. The social conditions include the tech shrewdness of the clients along with their affordability (Lafuente, 2015). If the network securities are provided to the clients at a very high cost, that is unaffordable by them, then it becomes ineffective. Another social consideration that needs to be taken care is the extent of technical advancements in the network security (Perlman, Kaufman Speciner, 2016). The company needs to ensure that the network security solutions that are provided to the customers and clients matches with the technical advancements of the clients (Shokhor Shigapov, 2013). If the client company is not technically advanced as that of the application, hence the social conditions, need to be considered and implemented effectively (Stallings Tahiliani, 2014). The legislative considerations have to be ensured by the business organization. The legislation of the Australia has to be abided by the company, before they develop applications for the clients. The legislat ion of any country has certain codes of conduct to ensure the privacy and protection of the network of the business organizations (Pucer, Trobec Zvanut, 2014). It is important that the IT codes of practice be followed, while the network securities are designed. As mentioned in the case study, in the next few years, the business organization wishes to expand its business all over Australia as well as overseas (Bloom et al., 2014). Thus, it is important that the network security applications that are designed are appropriate for the business requirements of Australia (Perlman, Kaufman Speciner, 2016). It is important that the risks that are faced by the business organization need to be mitigated. While implementation of the network security applications for the clients, various issues and implementation risks could arise (Lafuente, 2015). The network security applications need to be designed, such that the vulnerabilities are not exploited. Moreover, it is essential that the network traffic over the Internet is monitored and unusual activities are carried out successfully. Lack of monitoring will result in increase in the chances of exploitations and attacks. Thus, the company needs to ensure that the various vulnerabilities of VPN, access c ontrol and firewalls are taken care by the company (Perlman, Kaufman Speciner, 2016). Moreover since these applications will be developed by the company, hence it is likely that the exploitation of the vulnerabilities will be known to the company. However in order to ensure that the company continues their business ethically, the vulnerabilities should not be exploited (Perlman, Kaufman Speciner, 2016). Moreover the confidential information of the client that might be accessible to the company should not be exploited or misused. Conclusion The advent of the Internet, has introduced a new era for the business organizations. With the increase in the use of Internet, network security issues and risks arise. However, it is important that the risks are mitigated. The various risks include the lack of the technical awareness of the clients regarding the installed network securities. Moreover, lack of monitoring of the activities that take place on the network needs to be ensured. The company could expand their business by providing VPN network, access control as well as firewall services. The development and deploy of these services are effective and will ensure that their business witnesses considerable expansion all over Australia, as well as overseas. The access control security system has a key role to play, since it helps in restricting the access of unauthorised users to access the confidential information. Moreover, the unauthorised access could be easily tracked in order to detect unusual activities in the network. M oreover, the use of the VPN is important, such that a virtual private network could ensure secure communication in the open network. This assignment highlights a business of Melbourne that aspires to grow and expand successfully all over Australia as well as overseas. With the increase in the use of the Internet, the importance of network security has increased and thus, in order to ensure that the business organizations are able to work without their privacy being compromised. Since with the increase in the use of Internet in business, the need for network security and protection has also increased, hence,expansion of the company in this sector is likely to be profitable. Recommendations In order to ensure that the company, as given in the case study reaches the heights of success in the next few years, it is important that few recommendations be suggested. The company needs to expand their products in the domain of network security, such that it can expand its business in various parts of Australia and overseas. Moreover, it is also recommended that the technical feasibility and financial feasibility of the company be judged, before new ventures are made (Perlman, Kaufman Speciner, 2016). The vulnerabilities of the network security applications needs to be successfully taken care and fixes, such that the vulnerabilities are not exploited anymore (Pucer, Trobec Zvanut, 2014). The requirements of the clients have to be met successfully with the installation of the network security applications (Lafuente, 2015). It is also recommended that the after sales services needs to be given efficiently, such that the clients are satisfied with the kind of services being provi ded to them (Perlman, Kaufman Speciner, 2016). The time-to-time up gradation of the system has to be done, so that the clients are able to upgrade their securities as well. Thus, the company, with the expansion in the business in the virtual private network, as well as access control and installation of the firewall, will be able to succeed in their business. References Asati, R., Khalid, M., Cherukuri, S., Durazzo, K. A., Murthy, S. (2014).U.S. Patent No. 8,650,618. Washington, DC: U.S. Patent and Trademark Office. Beberlein, L. T., Dias, G., Levitt, K. N., Mukherjee, B., Wood, J. (2017). Network attacks and an Ethernet-based network security monitor. Bloom, N., Garicano, L., Sadun, R., Van Reenen, J. (2014). The distinct effects of information technology and communication technology on firm organization. Management Science,60(12), 2859-2885. Dangovas, V., Kuliesius, F. (2014). SDN-driven authentication and access control system. InThe International Conference on Digital Information, Networking, and Wireless Communications (DINWC)(p. 20). Society of Digital Information and Wireless Communication. Dumas, P. C., Bennett, T. (2015).U.S. Patent No. 9,057,210. Washington, DC: U.S. Patent and Trademark Office. Hashim, J. (2015). Information communication technology (ICT) adoption among SME owners in Malaysia.International Journal of Business and Information,2(2). Lafuente, G. (2015). The big data security challenge.Network security,2015(1), 12-14. Li, Q., Ma, J., Li, R., Liu, X., Xiong, J., Chen, D. (2016). Secure, efficient and revocable multi-authority access control system in cloud storage.Computers Security,59, 45-59. Mullick, A., Venkatraman, C., Nanjundaswamy, S., He, J., Soni, A. (2014).U.S. Patent No. 8,904,475. Washington, DC: U.S. Patent and Trademark Office. Perlman, R., Kaufman, C., Speciner, M. (2016).Network security: private communication in a public world. Pearson Education India. Pierson, G., DeHaan, J. (2015).U.S. Patent No. 9,203,837. Washington, DC: U.S. Patent and Trademark Office. Pucer, P., Trobec, I., Ã… ½vanut, B. (2014). An information communication technology based approach for the acquisition of critical thinking skills.Nurse education today,34(6), 964-970. Shokhor, S., Shigapov, A. (2013).U.S. Patent No. 8,560,709. Washington, DC: U.S. Patent and Trademark Office. Stallings, W., Tahiliani, M. P. (2014).Cryptography and network security: principles and practice(Vol. 6). London: Pearson. Vaishnavi, V. K., Kuechler, W. (2015).Design science research methods and patterns: innovating information and communication technology and Management. Crc Press. Williams, B. O., Lohner, M. K., Harmon, K., Bower, J. (2014).U.S. Patent Application No. 14/558,536.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.