Wednesday, May 6, 2020
Rational Argument
Question: Choose one of the media articles or case studies listed by the lecturer in Interact. Use the title of the article/case study provided in interact as the title of your essay, so that the lecturer knows which article you are analysing. Undertake further research about your chosen case, to assist you in analysing and discussing it in your essay. Answer: Introduction Information and information resources system should be restricted. To restrict information system a main key element is to secure se information system. This process is controlled with the help of high security concepts. An information system is a process where the major and important informations are transferring from one user to another user. During this transmission time both the user do not want to share this data with third party. So they must maintain a proper communication path by which their information is secured and reliable (Trajkovik Mishev, 2014). There are so many information data which need not to secure as they are not reliable or important. Now a days Security is essential for ICT management system. Several threats and viruses are avoided with the help of the security policies. Security also refers a confidential process for an ICT organization where the important informations are transferred from one system organization to another system organization. The confident ially is a process, by which an information is released only to the authorized parties. Information system needs to be secured during the transmission time in between two systems. An ICT security is process which guides small network securities during a proper data transmission from one system to another system. Finally an ICT security is a critical consideration which maintains the major activities during proper information sharing among two communication systems. Step 1 Security is essential for ICT communication system, which provide a safe data transmission Security is the main challenge faced by organizational information system A security policy generally explains the main mechanism of a security system for a safe data transmission The security of an encryption process is guaranteed by secret keys and never by algorithm keys Cyber crime is a major crime that involves computer network due to poor network security Step 2 Security is a major problem to ICT information system during their data transmission. ICT is the main communication provider which provides important data and information from one channel to another channel. To process this system ICT maintain some protocol to transfer information among their main servers (Rhee, 2003). As communication path is the main transaction path for ICT system so each and every system must provide some data or information which is required during a transmission process. This information system should provide a protection key that the third part cannot able to trace the communication path. So ICT communication system must provide a safe and successful data transmission over internet system by maintain the major security protocols. With the help of these protocols communication system can provide a safe data transmission among their entire system. From the above argument it can be concluded that Security system is the main key which provides a safe transaction p rocess for an ICT communication system. In an organization to process a successful information transaction security is the main challenge faced by the particular organization (Quigley, 2011). In an organizational information system the information structure is the key element for the organization. Human factors are the basic requirements for an information process to make the main communication path among their entire servers. With the help of the human factors the security culture of an information system can be significantly enhanced. The organizational informational structure is totally based on public network or internet system. So security is an essential issue for an organizational information system. To process a safe data transmission some security policies are maintained which cover up the entire security mechanism. Encryption is a process to transform data or information from source to destination (Oppliger, 1998). During this process the third party cannot access data or information. Authentication is a security mechanism which is necessary to check about clients authorization to perform the particular action. This process is used to verify the client and server information or authentication with their basic requirements to perform the particular transmission. So encryption and authentication is the main security mechanism to transform data from one system to another system. Auditing is a server toll to trace the clients address against the security threats. With the help of auditing process all threats of server protocol can be avoided during a successful data transmission. So finally it can be concluded that security policy causes a safe data transmission process (Kocarev, 2012). In an encryption process secret key is the main element to protect the entire encryption process. Encryption among two servers refers the entire data transmission process among them without any overlapping or interference. During an encryption process cryptography is the main algorithm to manage the entire process. So to process a safe and secure data transmission encryption is the main secret key to cover up the security policy. The algorithms are not responsible for a secure encryption. Secret key is the main intermediate term to process a secure encryption (Jahankhani, 2010). Now a days cyber crime is a major crime which involves computers information and the entire network due to poor network security. Generally cyber crime can be protected with the help of strong network security policy (Faber Behnsen, 2013). Network security is an essential part to prevent the entire cyber crime. During an online transmission data are not secure due to poor network, which may cause a hacking process in the network. By managing a strong network it can defend the hacking process. So the network security can prevent the entire cyber crime by maintaining a strong network authentication. Conclusion ICT represent a security management process which describes the risk factors of the entire network management system over the internet system. The report concludes that ICT security system is co operating the policy development process including a strong network authentication. Information sharing will also enhance a critical thinking of the organization including critical infrastructure to prevent the major cyber threats. Public Private Corporation is attached with ICT to secure their network by maintaining their flexibility and rapid information sharing. Encryption is the major security process to enable the security policy during an online data transfer from one channel to another channel (Dunsmore, Brown, Cross Cunningham, 2001). Recommendation To process a safe and secure data transmission among the entire ICT servers the cryptography must maintain some protocol which control entire risk management of the system. The ICT revolutions are driven from global environment to enhance their security policy by maintain a strong network security. Some software is used to secure this network to maintain a successful supply chain. The information is secured with a server key during the data transmission that no other party can access this information. After a successful transaction of data transfer the source and destination can able to retransmit the entire pro0cess without any overlapping or interferences. ICT should develop their web application by organizing a strong secure policy which co-operates the flexibility of information sharing. The operating system should be strong to keep the original data during the communication path from source to desti9nation by providing a strong security mechanism (Chapman Zwicky, 1995) References Chapman, D., Zwicky, E. (1995).Building Internet firewalls. Sebastopol, CA: O'Reilly Associates. Dunsmore, B., Brown, J., Cross, M., Cunningham, S. (2001).Mission critical!. Rockland, MA: Syngress. Faber, E., Behnsen, W. (2013).Secure ICT service provisioning for cloud, mobile and beyond. Wiesbaden: Springer Vieweg. Jahankhani, H. (2010).Handbook of electronic security and digital forensics. New Jersey: World Scientific. Kocarev, L. (2012).ICT Innovations 2011. Berlin: Springer. Oppliger, R. (1998).Internet and Intranet security. Boston: Artech House. Quigley, M. (2011).ICT ethics and security in the 21st century. Hershey, PA: Information Science Reference. Rhee, M. (2003).Internet security. Chichester, West Sussex, England: J. Wiley. Trajkovik, V., Mishev, A. (2014).ICT innovations 2013. Cham: Springer.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.