This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Information technology Risk

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Information technology Risk

Name of the student

Name of the university

Student ID

2.1.1 Executive summary 

DirectToCust is a Countrywide online trading company, and its specialty is that it sells products directly to the customers without any middlemen based in Cape Town. It currently faces some problems like theft of personal products, network policy, corrupted employees, and issues with providers, managing employees and clients or customers, the ability of IT support team and higher management authority, and a financial problem. A new IT support manager with more experience and ability is necessary for a new start to resolve the problem.

Table of Contents

2.1.1 Executive summary

2.1.2 Background

2.1.3 Development of proposed solution

2.1.4 The role of IT manager

2.1.5 Methods of combating network-based attack

2.1.6 Impact of social engineering

2.1.7 Appropriate mechanism in implanting network access

2.1.8 Implementation of best strategy

2.1.9 Appropriate location and strategy for DMZ and firewall

2.1.10 Conclusion

2.1.11 Reference

 

2.1.2 Background

The main issues regarding IT service are that the IT support team operates without IT administration’s concern, which denotes a communication gap between the employees. The cloud service provider team of any company plays a vital role in any company’s overall growth. Still, there is also a communication gap between the team’s also the last couple of months, they are facing some firewall problems, and the company’s official website gets hacked, and the IT team took too much time to restore the website.

2.1.3 Development of proposed solution 

To solve all the problems, the company needs a strong, critically managed higher management authority. Appointing a new IT to support a more qualified and experienced manager is a wise choice though some consequences. A company with a stable management author is the key to the company’s overall growth. Managing employees is a critically designed workspace, and fix the communication gap is the base requirement regarding all the ongoing issues.

2.1.4 The role of IT manager 

An IT manager plays an overall role to secure any network service and its protocols. To stop unauthorized access or threats that can damage the server, IT professionals need to build a healthy physical environment that can keep the server safe and borrow some extra times (Dawber, 2019).  And the IT support team has to perform an assessment every second to identify any risks to the sensitive data, and it is one of the duties of the IT manager to monitor this process.

2.1.5 Methods of combating the network-based attack 

The best way of combating network-based attacks is mainly to systematize all the security protocols regarding IT services. It is also essential to monitor and keep it updated with time to time and stay aware of all the threats (Goyal et al., 2018).  Also, using modern intelligent security technologies is a good habit to follow, and to monitor the network, a monitoring tool must be installed. It is the employees’ ability and awareness, which keeps it secure.

2.1.6 Impact of social engineering 

So the impact of social engineering on the field of network security, as well as in the case of the corporate world, is described as the Art of Deception (Conteh and Schmick, 2016).  in this case of network security, any malicious node first targets the server’s weakest link to perform or start the process. However, social engineering helps to deliver or update new techniques or technologies that would target virtual attacks and keep the network secure by providing so many wide varieties of techniques.

2.1.7 Appropriate mechanism in implanting network access

2.1.8 Implementation of the best strategy 

2.1.9 Appropriate location and strategy for DMZ and firewall 

(Wei and Xiao, 2020)

2.1.10 Conclusion 

2.1.11 Reference 

Conteh, N.Y. and Schmick, P.J., 2016. Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research6(23), p.31. https://www.researchgate.net/profile/Nabie_Conteh/publication/294421084_Cybersecurityrisks_vulnerabilities_and_countermeasures_to_prevent_social_engineering_attacks/links/56e2733408aebc9edb19eebc.pdf

Dawber, T., 2019. The Manager as Coach and Facilitator of Development for Employees in Information Technology (IT). International Journal of Evidence Based Coaching and Mentoring, (S13), pp.32-48. https://radar.brookes.ac.uk/radar/items/dec8fb83-73cf-4a7a-beeb-904a057d6017/1/

Goyal, P., Hossain, K.S.M., Deb, A., Tavabi, N., Bartley, N., Abeliuk, A.E., Ferrara, E. and Lerman, K., 2018. Discovering signals from web sources to predict cyber attacks. arXiv preprint arXiv:1806.03342https://arxiv.org/abs/1806.03342

Wei, H. and Xiao, N., 2020, August. Security Protection Scheme of Brain-Like System Based on Cloud Computing Platform. In Journal of Physics: Conference Series (Vol. 1621, No. 1, p. 012096). IOP Publishing. https://iopscience.iop.org/article/10.1088/1742-6596/1621/1/012096/meta

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask