Tuesday, December 10, 2019
Homeland Security and Governmental Affairs -Myassignmenthelp.Com
Question: Discuss About The Homeland Security And Governmental Affairs? Answer: Introduction Hal R. Varian in the New York Times describes the internet as a lab experiment that got loose (New York Times, June 2000). He argues out that internet came into existence in an enclosed environment under the umbrella of network researchers who familiarised and trusted each other. It, however, escaped from a sheltered place and ended up in a hostile environment which is unmanageable. This argument is logical since, with the inception of the internet, the world has been turned into a fragile place where privacy is easily interrupted by the intrusion. Currently, the world is facing major challenges due to cyber attacks. Basing on our case study, our company (XYZ Technology) is exposed to risks such as unauthorized access of information of clients, for example, financial and login details, ransomware and other malware attacks. To manage this vice, XYZ Technology Company should invest in internet security to protect clients information as well as its network security. Strategically, devel oping applications that operate online platforms on the company's website and client database would work for the good of the enterprise. Internet safety is a protection mechanism by which authorization of access to data is controlled by the network administrator. Users choose or are assigned an identification and password to authenticate their information and programs within their authority. Majorly, this approach targets to guard users against attacks over the internet. Practically, the internet is insecure for information exchange leading to high intrusion risks. The report establishes a workable plan to leverage technology-based companies from the risk of attack and data manipulation. This paper deals with recently developed information/ network security approaches, challenges associated with presently used information/ network security approaches, theoretical approach, framework, workable business process models for XYZ Technologies, proposed software applications, business anal ysis strategy, ethical, social and legal considerations, recommendations, and conclusion. This study established that for positive growth, XYZ management had to change its mode of operation regarding data protection software, framework, and models. The findings supported the descriptive economic theory of innovation, a knowledge-based technology framework, clicks and bricks, and customer loyal process models of business. It equally advocated for open office and MYQL software applications as major components for heightening internet/ information security. Further, the researcher recommended installation of enterprise resource planning software to help in management functions, customer management software to measure the level of growth and customers' satisfaction levels, and password management system to allow easy memorization of passwords. This report is essential in implementing processes and designs within XYZ Tech. Company for efficiency, cost management, and growth. It would also help mitigate online crimes to the general public. Business analysis strategy 3.1.1.Strengths. The company enjoys a huge customer base since most businesses and homes are heavily investing in innovation and technology. Therefore, it runs on a higher expansion probability due to supportive software, widespread internet cables and new technologies such as smartphones and WIFI networks. Additionally, the Company works in agreement with larger vendors hence a wider market base. Wider market base offers the company more opportunities to exploit and make more profits in the market. Higher profits made give the company an edge of enhancing sustainability and development in the market. As a result, the company has a high probability of gaining and maintaining a competitive advantage over its rivals. 3.1.2 Weakness. The current XYZ Technology Company business scope is limited to development of applications. This limits it regarding customer tastes and preferences on available choices of application. The differences in customers tastes and preferences force the company to incur more costs when doing market research. Another weakness is that due to the limitation of software development scope, more resources are required to advance these cases. 3.1.3 Threats. XYZ Technology runs highly sensitive customer information that requires high security to run. It exposes customers to the risk of manipulation, unauthorized access of information of clients, for example, financial and login details, ransom ware, and other malware attacks. Equally, being an application based company; XYZ Technology runs high intrusion risks. There is also high competition in the market from other players, and this is a major threat to XYZ technology. 3.1.4 Opportunity.XYZ Technology Company has an upper hand of diversifying its products and services to attract potential client organizations for this new line of business including online gambling organizations as well as small pharmaceutical and hospitality industry organizations. Additionally, the organization can monitor the system through internet security enabled applications to minimize cases of intrusion. Opportunity to expand and enlarge its market base over the globe. Recently developed information/network security approaches 4.1 Database security Munir (2017) argues that computers and other online devices are prone to malware such as viruses that may harm the data. Data management software applications such as cloud and goggle drive have been developed to allow the end users to safeguard their important documents and information as well (Basta, Zgola, Bullaboy, 2012). This assures them a safer storage for easy retrieval in the event of loss. Equally, installation of malware protection software such as Kaspersky, Norton, Ad-Aware, McAfee antivirus software and others is done to prevent harm on gadgets and data as well. Furthermore, data is protected from unwanted access and intrusion via password protection. Creating strong passwords using creative spellings, acronyms, personalised quotes and phrases biff up internet security measures ("Internet Technologies," n.d.). 4.2 Access control mechanism Devices such as mobile phones, computers, and applications among others are protected by owners against risks of exposure to hackers. In addition, end consumers perspectives such as privacy, multimedia content sharing and trustworthy are applied to avoid being susceptible to online attack (FCCS 2012, Jin, Lin, 2012). 4.3 Intrusion detection Most internet sites such as Gmail, Yahoo, facebook and others have heightened security measures by detecting intrusion attempts (Chakravarthi Veluru, 2014).Such sites send a notification text or email to the end user notifying them that their accounts have been logged in from suspicious sources. Account owners are advised to report in case the attempted move is not from their end. For example, when several attempts or new devices log into someone's facebook account without success due to wrong password, security options such as secret question, identification and other techniques are used to establish the authenticity of the owner (United States, 2016). Challenges associated with presently used information/ network security approaches Though several attempts and measures have been put across to mitigate internet attack, XYZ Tech. Company has not been able to face out cyber crimes and related risks to the latter. The Company has witnessed various challenges amidst them being, high implementation costs, high ignorance rate on the end-users, online system failure, ransomware and other malware attacks, and tainted organizational image. 5.1 High program implementation costs XYZ Tech Company incurs high costs in its attempt to implement information and internet security operations. These expenses range from large system development, application installation, labor, training costs, operational costs and other factors. I a way, this has sabotaged the managements efforts in implementing effective programs to support the implementation program as well as offering technical help to clients ("The Financial Costs," n.d). 5.2 Online system failure The unpredictable nature of machines and other online applications has failed in various occasion exposing the end user to risks of online security. In an event of failure, clients lack technical support and experience delayed feedback from the system administrators thus disadvantaging them (Abu-Samah, Shahzad, Zamai, 2017). 5.3 Image tainting In instances where end-users accounts are hacked, most end up shifting the blame on the service providers neglecting their contribution in the risk. They develop negative perceptions of the system administrators and tarnish the corporate image of the company. 5.4 High end-user negligence In most cases, the online risks are a product of errors created by the end users. Despite various training programs on database security and access to control risk management strategies such as use of password to secure files, documents and data, turning off gadgets, most neglect these minor but key approaches to safeguard them against internet security risks. Most therefore become victims of their own mistakes and suffer data loss, malware problems, privacy infringement, and other issues related to internet crimes. Theoretical approach 6.1 Descriptive economic theory of innovation Since XYZ Tech. Company is targeting to diversify its business through different target segments such as online gambling organisations, small pharmaceutical and hospitality industry organisations, the disruptive economic theory of innovation would be applicable. This theory assumes the use of simple products to win a huge customer base. The management is therefore tasked with the duty of ensuring there is a systematic development of applications for faster service delivery (Kudic, 2015). Ideally, the marketing department would be called upon to engage the clients through research programs to establish their expectations. Framework With the changing trends in the market and high competition, XYZ's success lies in the adoption of a knowledge-based technology framework with highly mechanized effects. Technology has made it easy to integrate tasks such as self-service, mental processes, segmentation, enhancing systems, tapping innovative ideas, and creativity. Being a tech-based company; XYZ should move with swift and diversify its operations with the new trends such as online banking for business owners and marketing services such as online booking of rooms for hospitality industries among others in mind (Knowledge Technology Week (Conference), Lukose, Ahmad, Suliman, 2012). Business process models This model fits well in XYZ Tech. Company since it allows clients to access XYZ services online through internet. As a development strategy, the company should secure its operations through extensive logistic and supply chains. In doing so, the customers will have strong brand recognition and a range of products at their exposition to choose from (Laudon Traver, 2013). 8.2 Customer loyalty model The model shall aim at retaining clients and evaluating their satisfaction levels with regards to the products and services rendered by XYZ ("How Customer Participation Builds Loyalty," 2014). Additionally, quality will be maintained creating a strong customer relations and commitment ("Customer Loyalty: Easy Does It," 2014). Proposed software applications to heighten internet/ information security Open office is a software application that supports normal word functions such as typing and data analysis via spreadsheet. This software is readily available thus allowing efficient problem solving. Additionally, it updates data frequently and fixes any problematic issues. Further, this application is compatible with other software programs such as Mac and Linux. Moreover, open office allows end-users to save files in PDF format avoiding replication and reproduction of data without the consent of the owner. However, this application is linked to limitations such as program slow down due to high space utilization by the Central Processing Unit (CPU), it has few font varieties. Open office has no user support therefore limited to Google search engine since it is not channeled to a toll-free number for help or inquiry (Marmel, 2013). This software application connects the user to the system administrator via internet. It is linked with high security and password system since it works on the basis of host verification. Additionally, the database servers provide a big amount of space for the system to operate. It supports high-performance speed compared to open office and traffic website. Basically, it is the best software for XYZ Tech. Company. Consequently, it is associated with minor setbacks such as less functionality, incompatibility with other databases, and slow response to many commands. Conclusion Concisely, this report has adequately discussed a workable plan that suits XYZ Tech. Company as far as diversification and information/ internet security is concerned. To begin with, the researcher has addressed the issue of internet security by establishing the current developed approaches such as database security, access control mechanism, and intrusion detection. Second, the report created challenges associated with the outlined procedures ranging from high program implementation costs, online system failure, image tainting, and great end-user negligence. Additionally, the paper discussed the current position of XYZ Tech. Company by conducting a SWOT Analysis to measure strengths, weaknesses, Opportunities and Threats. Further, this report has achieved in highlighting the descriptive economic theory of innovation that bases on simplicity as effective one towards the success of XYZ. It adds that the Company should use knowledge-based technology framework with highly mechanized eff ects to remain relevant. Business process models such as clicks and bricks which help clients to access services online, and the customer loyalty model that supports customer retention and brand recognition have also been featured. Moreover, open office and MYQL software applications have singled out as major components for heightening internet/ information security (Marmel, 2013). Finally, the report recommended installation of Enterprise resource planning software to help in management functions, customer management software to measure the level of growth and customers' satisfaction levels, and password management system to allow easy memorization of passwords. Significantly, this report is important in implementing processes and designs within XYZ Tech. Company for efficiency, cost management, and growth. The discussed proponents are measures of growth to any technology-based business. The report is equally of significant to online users since it gives possible solutions as far a s cyber crimes such as risk of manipulation, unauthorised access of information of clients for example financial and login details, ransomware, intrusion risks, and other malware attacks. Recommendations Managing online risks focuses on heightening online security systems and applications to minimize potential harm. These harms may be manifested in terms of data loss, intrusion of private information, copyright infringement behaviours, such as illicit copying, unauthorized usage, and free sharing of copyright-protected digital contents, and malicious distribution. To manage such risks, the following approaches are workable. 11.1 Customer management software Installing this software will help the management to reflect on its performance in terms of services rendered to their clients and range itself against other competitors. The components of measure under this system would include email reminders, tasks and event reports, follow-up addresses and contacts, testimonials, feedback schedules, and email correspondences (Blokdijk, 2012). 11.2 Password management system XYZ system administrator should create a high-tech system that can allow users to recall their passwords for a range of accounts across the web and different devices as the user surfs the internet (Monk Wagner, 2013). 11.3 Enterprise resource planning software This is a management tool that would help managers to integrate various functions ranging from collecting, managing, and interpretation of other databases and links tied to the business. This will help in planning on costs, service delivery to clients, marketing the organization, check payments and enhance sells. This technology move will aggregate daily business operations using a common database to handle cash transactions, business commitments and payrolls as per the demands and share the data across legalized systems within XYZ Tech. Company (Monk Wagner, 2013). References Abu-Samah, A., Shahzad, M., Zamai, E. (2017). Bayesian-based methodology for the extraction and validation of time-bound failure signatures for online failure prediction. Reliability Engineering System Safety, 167, 616-628. doi:10.1016/j.ress.2017.04.016 Basta,A., Zgola,M., Bullaboy,D. (2012). Database security. Blokdijk,G. (2012). CRM 100 Success Secrets - 100 Most Asked Questions on Customer Relationship Management Software, Solutions, Systems, Applications, and Services: 100 Most Asked Questions on Customer Relationship Management Software, Solutions, Systems, Applications, and Services. Dayboro: Emereo Publishing. Chakravarthi, S. S., Veluru, S. (2014). A Review of Intrusion Detection Techniques and Intrusion Detection Systems in MANETs. 2014 International Conference on Computational Intelligence and Communication Networks. doi:10.1109/cicn.2014.159 Customer Loyalty: Easy Does It. (2014). doi:10.13007/345 FCCS 2012, Jin,D., Lin,S. (2012). Advances in future computer and control systems: Volume 2. (Advances in future computer and control systems.) Berlin: Springer. Hal R. Varian. (2000, June 1). Managing online security risks. New York Times [New York]. How Customer Participation Builds Loyalty. (2014). doi:10.13007/364 In Munir,K. (2017). Security management in mobile cloud computing. Internet Technologies. (n.d.). Practical Internet Security, 3-26. doi:10.1007/978-0-387-29844-3_1 Knowledge Technology Week (Conference), Lukose,D., Ahmad,A.R., Suliman,A. (2012). Knowledge technology: Third Knowledge Technology Week, KTW 2011, Kajang, Malaysia, July 18-22, 2011. Revised selected papers. Berlin: Springer. Kudic,M. (2015). Innovation Networks in the German Laser Industry: Evolutionary Change, Strategic Positioning, and Firm Innovativeness. (Innovation networks in the german laser industry.) Cham: Springer. Laudon,K.C., Traver,C.G. (2013). E-commerce: Business, technology, society. Marmel,E. (2013). Office 2013 Simplified. Hoboken: Wiley. Monk,E.F., Wagner,B.J. (2013). Concepts in enterprise resource planning. New York: Cengage Learning. The Financial Costs. (n.d.). The European Recovery Program. doi:10.4159/harvard.9780674598966.c14 The United States. (2016). Federal Cybersecurity Enhancement Act of 2015: Report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 1869, to improve federal network security and authorize and enhance an existing intrusion detection and prevention system for civilian federal networks.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment