Wednesday, May 6, 2020

Information And Communication Technology â€Myassignmenthelp.Com

Question: Discuss About The Communication Technology And Information? Answer: Introduction The organisation in the case study is a small software development company which is situated in Melbourne. The organisation was established less than 5years ago. The main working concept of the organisation is that it develops and customizes application in the specialization field of network security area and information. The client of the organisation is mainly situated in major cities of Australia and medium to small organisation. At the present time, the organisation undertakes project in order to develop applications mainly in house or to customize off the shelf software in agreement with the prospective of larger vendors. The different implementation of the technology has emerged with the concept of securing the information and network security. This factor can be estimated to be a very important factor due to the direct involvement of the security issue. On the other hand the improved security feature would incurs addition of more cost when related to small organisations who do not involve in big budget (Perlman, Kaufman and Speciner 2016). The overall scope of the organisation is limited to development of application. The company now is trying to expand its exposure into different fields in the time tenure of next five years. This expansions is mainly in the field within information and communication technology (ICT). One of the future options that is liable of implementation is that diversifying the business in providing ongoing information and security services which are related to network to service which has a presence online. These aspects would directly provide security of the organisations with it security of the client database and websites related to it. The report puts direct emphasis on the concept of information and network security. An analysis is provided on the information. Bringing into account the problems related to the implementation of the issue and the rectification dealing with the issues. Network security Network security refers to any activity which is mainly designed to provide protection in the field of integrity and usability. It can be termed as a distributed function. There are many application which may utilize the management of security that may include emails, electronic commerce, detection of intrusion and access control application. The security management aspect faces the same problem as other distributed functions face. It can be state that security management would require human presence with regards to every security device and evaluation which is done manually of all the significant events (Perlman, Kaufman and Speciner 2016). Information and network applications and its use There are mainly two types of network application softwares that are highly used. The category are pure network applications and standalone network application. Pure network applications These applications are mainly used in network areas, using the concept of pure network application on a single computer does not make much of a sense. The main motive behind the concept is that it helps in transfer data and achieve communication within a network. These applications mainly have a different, separate and a distinct interface of the user. Email program The concept of emails helps the user to write a message and communicate with each other. The message are usually written in the local node and the send across to someone on the network access area. It can be considered as the fastest and most reliable source of communication from one computer to another computer. Few example of electronic mail program (Client) can be: Outlook express Fox mail Pegasus mail Opera Poca mail File transfer protocol ( FTP) The main functionality of the protocol is the transfer of files from one computer to another for example from a client to server. There are mainly two processes involved in the protocol of file transfer Downloading: this can be stated as a process of obtaining files from the server to a workstation or can be termed as a client. The most common example is when a user download a program or a music from the server Uploading: this process can be stated as a process of obtaining files from the workstation to the server. An example of such a process is when a user attach a document file and upload it to the server, the most common example is uploading files or a photo to Facebook (Perlman, Kaufman and Speciner 2016). Standalone applications These applications runs on the stand alone computer (computer which are not connected to any other). In order to improve their activity and expand their activity they are mainly build to run on network environment for example word processors, data base management system, project management etc. they perform their desired function even when the computer is offline. Success or failure The concepts of the application can be justified with the term success as they have brought the computer communicating aspect into a whole new era. Expansion with the implementation The implementation of the above stated technology would defiantly improve the overall presentation of the business in the five years plan of advancement. The following points gives a overview of the concept Communication The overall aspects of the internet technology have been considered very much crucial for all business bodies. These concepts can be termed as a life line in order to stay in touch weather in road and responding to the customer with the customers query which should be conducted in a timely manner. Emails, social networking and text messaging are few of the field in the communication era that keeps the business running all the time Marketing The approach of reaching the business to new as well as existing customers had been very much hectic before the innovation of these technologies. Information marketing can range from a simple form of website to a search engine advertising; to online sales product. Email marketing is considered as one of the most effective and low cost related method in order to reach a large group of people in a small amount of time. Mobile marketing is a relatively new frontier that reaches the people through the aspect of text messaging (Beberlein et al. 2016). Telecommunicating Many organisation can expend their approach to proper scenario of business by enforcing telecommuting and flex time benefits. The different personals who are related to the business stay in contact from anywhere around the world. This can be achieved from the approach of emails, collaboration tools which are available over the internet and mobile computing devices. Recommendation with the organisation Recommendation 1: communication should be clear about the human resource aspects that is needed in order to deal with the customers. The human resource body is mainly who incorporates different aspect of the technology and their proper working and can also be related to the staff who use the information technology tools in order to achieve benefit from the technology Recommendation 2: development of the work and the technology do not always involve same quantity of requirement (Nevo, Nevo and Pinsonneault 2016). It can be considered as a very fundamental aspect that to take into account the fundamentals of all the requirement related to the information technology. Recommendation 3: when it comes with the concept of implementing a specie technology for a specific context it should not be taken into consideration how easy the technology is. The security management aspect faces the same problem as other distributed functions face. It can be state that security management would require human presence with regards to every security device and evaluation which is done manually of all the significant events (Perlman, Kaufman and Speciner 2016). Technology capacity, user interface, familiarity aspect regarding tools and the systems have a major impact on the use of the tools with the technology. Recommendation 4: the information technology changes very rapidly with every innovation. It has to take into account that the latest invention in a technology should be known so that lagging behind the technology is not done (German 2017). Recommendation 5: One of the future options that is liable of implementation is that diversifying the business in providing ongoing information and security services which are related to network to service which has a presence online. These aspects would directly provide security of the organisations with it security of the client database and websites related to it. Advantage or disadvantage In every sphere of technology with the predefined advantage that can be achieved from the implementation some disadvantage aspects also comes into play. Few advantage of the implementations are: Enhancing of communication and availability with the information The networking concept epically when allowed to access the internet completely, allow the means of communication that would be merely not possible if the development was not made (Trantopoulos et al . 2016). Instant message aspect can allow the users to talk with each other and create a means of medium where they can transfer files in an efficient and secured manner Highly Flexible The technology is termed as flexible because it gives the user an opportunity to explore everything around the world which are according to the user essential, such as software without affecting the overall working of the functionality concerned in the aspect (Brown 2016). On the other hand the people have the access to all the information they need to have knowledge about and need to share (Beberlein et al. 2016). Disadvantage Independence lack The process or the task that are done are on the computer, this states that the user relies more on the computer work rather than exerting their own effort on the task which is at their own hand (Nevo, Nevo and Pinsonneault 2016). On the other hand the user will be fully dependent on the main server, it means that if the system somehow breaks done the entire system would be useless (Reddy et al. 2016). Lack of robustness As stated above if the serer breaks down the entire system would be useless, also if the bridging device or the central linking server fails the entire system would come to a standstill situation and no operation can be conducted through it. There might be many illegal activities that can occur which has to be taken care of and the user should be aware of it. Security difficulties As the number of user who are using the computer network in order to get the files and share the files over the internet is enormous, a certain users security aspect would always be at a risk factor which is very much crucial. Ones the data of an individual is in the hand of any other than the intended recipient it can possess a security threat (Meurant 2016). Risk management The risk management mainly attempts to identify, control threat and access the threat objectives that can play a dominating role in the sphere of computer internet. Due to the factor of the details related to the user is very much crucial from the point of view of the customer as well as the service providers (Meurant 2016). The security aspects must take into consideration about all the steps that can be initiated in order to maintain the data. Three process can be involved in a risk management procurement: Risk assessment and analysis This can be considered as the first step in the risk management process. It mainly deals with accessing the risk that can generated from any scenario. It can impact the daily day to day activity concerned in the organisation. Affective assessment of the different aspects can considerably decrease the overall impact that the risk can create in the organisation. Risk evaluation After the analysis of the risk the risk evaluation factor is taken into account. A risk evaluation technique estimates the risk against criteria that the organisation which have been already unestablished in the above process (Ooi, K.B. and G.W.H 2016). Risk treatment and response The last step involved in the risk management is the risk treatment and the response which has to be in that context. Risk treatment is mainly the implementation of the procedures and the policies that will directly help minimizing the risk and avoid them. Risk treatment also can extend to the transfer of the risk and the financing of the risk (Beberlein et al. 2016). It is very much important to take into consideration that the risk assessment or the risk management is a continuous process. It should not be that ones the risk is identified and the rectification process is being enforced and the effect of the risk is minimized, the risk assessment or the risk management is omitted. A risk management policies of each and every organisation should be redefined in order to access the risk which are liable in the near future and necessary actions should be implemented so that the effect of the risk is minimized in the process (Meurant 2016). Conclusion Understanding of the emerging technology is a very important concept when dealing with the concepts regarding to the implementation. The result of the above report states that how different technological aspects can be used in the field of organisation, taking into account the advantages and the disadvantage that are in the concerned implementation. Recommendation is provided with the intention for providing a basic scenario which would directly affect the overall business prospective and it would sustain in the near future. One of the future options that is liable of implementation is that diversifying the business in providing ongoing information and security services which are related to network to service which has a presence online. These aspects would directly provide security of the organisations with it security of the client database and websites related to it. Recommendation Recommendation 1: communication should be clear about the human resource aspects that is needed in order to deal with the customers. The human resource body is mainly who incorporates different aspect of the technology and their proper working and can also be related to the staff who use the information technology tools in order to achieve benefit from the technology Recommendation 2: development of the work and the technology do not always involve same quantity of requirement. It can be considered as a very fundamental aspect that to take into account the fundamentals of all the requirement related to the information technology. Recommendation 3: when it comes with the concept of implementing a specific technology for a specific context it should not be taken into consideration how easy the technology is. Technology capacity, user interface, familiarity aspect regarding tools and the systems have a major impact on the use of the tools with the technology. Recommendation 4: the information technology changes very rapidly with every innovation. It has to take into account that the latest invention in a technology should be known so that lagging behind the technology is not done (German 2017). Recommendation 5: One of the future options that is liable of implementation is that diversifying the business in providing ongoing information and security services which are related to network to service which has a presence online. These aspects would directly provide security of the organisations with it security of the client database and websites related to it References Beberlein, L.T., Dias, G., Levitt, K.N., Mukherjee, B. and Wood, J., 2017. Network attacks and an Ethernet-based network security monitor. Bica, I., Naccache, D. and Simion, E., 2016. Innovative Security Solutions for Information Technology and Communications. Brown, R.S., 2016. Protocol for the Isolation and Rapid Characterization of Foreign Debris in Pharmaceutical Products Using Light and Electron Microscopy. Microscopy and Microanalysis, 22(S3), pp.1088-1089. ifti, N.P. and Delialio?lu, ., 2016. Supporting students knowledge and skills in information technology security through a security portal. Information Development, 32(5), pp.1417-1427. Diatmika, I.W.B., Irianto, G. and Baridwan, Z., 2016. Determinants of Behavior Intention Of Accounting Information Systems Based Information Technology Acceptance. Imperial Journal of Interdisciplinary Research, 2(8). Dworkin, M.J., 2016. Recommendation for block cipher modes of operation: The CMAC mode for authentication. Special Publication (NIST SP)-800-38B. German, P., 2017. Organisations have latched on to the need to secure SIP trunking solutions by implementing a Session Border Controller (SBC). The problem is that the vast majority of SBCs are considered not just one-off investments but also one-off deployments. Yet from denial of service attacks to toll fraud, SIP trunking is not only inherently vulnerable, that vulnerability continues to change and escalate. Few... Network Security, 2017(1), pp.14-16. Hemphill, T.A. and Longstreet, P., 2016. Financial data breaches in the US retail economy: Restoring confidence in information technology security standards. Technology in Society, 44, pp.30-38. Lloyd, I., 2017. Information technology law. Oxford University Press. Lloyd, I., 2017. Information technology law. Oxford University Press. Lundberg, E., 2017. How to compete effectively with self-service technologies: The impact of technology readiness and the technology acceptance model on self-scanning. Meurant, G., 2016. KERMIT: a file transfer protocol. Elsevier. Nevo, S., Nevo, D. and Pinsonneault, A., 2016. A Temporally Situated Self-Agency Theory of Information Technology Reinvention. Mis Quarterly, 40(1). Ooi, K.B. and Tan, G.W.H., 2016. Mobile technology acceptance model: An investigation using mobile users to explore smartphone credit card. Expert Systems with Applications, 59, pp.33-46. Orlikowski, W.J., Walsham, G., Jones, M.R. and DeGross, J. eds., 2016. Information technology and changes in organizational work. Springer. Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private communication in a public world. Pearson Education India. Reddy, N., Patrick, R. and Sridharan, D.K., Qualcomm Incorporated, 2016. Systems and methods for improved trivial file transfer protocol. U.S. Patent Application 15/167,789. Teo, T., 2016. Modelling Facebook usage among university students in Thailand: the role of emotional attachment in an extended technology acceptance model. Interactive Learning Environments, 24(4), pp.745-757. Trantopoulos, K., von Krogh, G., Wallin, M.W. and Woerter, M., 2017. External Knowledge and Information Technology: Implications for Process Innovation Performance. MIS Quarterly, 41(1), pp.287-300.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.