Monday, October 21, 2019

Technology Business Plan Proposal Essays

Technology Business Plan Proposal Essays Technology Business Plan Proposal Essay Technology Business Plan Proposal Essay Technology Business Plan Proposal Name: Course: Date: Technology Business Plan Proposal Statement of the Problem The entity could use various technology products, which enable remote access to the internet. Such are usually in the form of software, which have advanced settings enabling authenticated access to an entity’s database. The employees usually carry bulk equipment to enable them access the entity’s database without accruing security risks to the database of the organization (Steffen, 2010). Requirements The entity needs a product that would ensure easy and prompt access to the client database. Such should also have security measures, which ensure that the database is secure from malicious software (Jaligama, Goyal, 2011). In addition, there is also need for harmonization in the use of a similar networking system to link all employees and management to one database. Accessibility is an issue for the entity. The users need a product that would ensure easy access into the database to execute the various tasks delegated. In addition, the entity is in need of a secure network, which ensures authenticated access into the database, which in essence enhances security of the database. Technology solutions Various technological solutions are available. The main solution is the use of a Virtual Private Network (VPN), which would ensure the presence of secure and reliable access to the network database. Such products include the Cisco AnyConnect Secure Mobility Client. This could result in the development of an individual network. On the other hand, the entity could also develop a virtual network, which comprises of site-to-site connections of the two entities’ database to result in a single network. Such would save the entity costs of setting up a new network (Steffen, 2010). Project Steps Setting up a Virtual Private Network for the employees would enable them to roam across the various data networks available, given that they currently do not have fixed IP addresses. The new software would enable remote authorized user access to the database via laptops, smartphones using the Microsoft Windows 7 Operating Systems. VPN enables access through the creation of encrypted tunnels between a computer and a VPN server (Feeney Wireless, 2012). The set up process would be initiated by the connection of the two networks to result in a site-to-site connection. The Cisco AnyConnect is considered as a modern day VPN enabling access by using the Datagram Transport Layer Security (DLTS) protocol. DTLS aids in the provision of optimized connections in latency sensitive traffic, such as the Voice over IP (VoIP) and others, such as the TCP based user applications access. This is configured within the system and is defined as Cisco AnyConnect Secure Mobility solution, which enhances mobile access security for the user (Burton, 2000). (City University of Hong Kong, 2012). Issues and Security risks Remote access networks enable employees to access the entity network from any position in the country or world. The ability to access the network form any position could pose a threat to the entity’s network. Security risks such as privacy invasions are usually common scenarios for employees working outside of the premises of an organization or essentially in remote locations. Computer viruses found on the internet could pose a security threat to the information as well as the entire network of an organization. Infection with viruses could be aimed at disrupting or stealing vital information from the database of the organization. Invasion of privacy is also a crucial issue accrued form the use of VPN by organizations. In addition, the network could be sung operating systems, which are inadequate in terms of security thus enabling access to hackers posing as legitimate users of the VPN. This essentially translates to the loss of vital information for the organization to hackers who are bent on stealing information and disruption of entity operations. Other risks associated with VPN are the presence of unnecessary network traffic. Remote access could result in use of the network for non-work related issues such as entertainment and individual work. This results in reduction of the entity’s bandwidth resulting in wastage of resources. It also reduces the employee productivity as they are focused in non-work related activities. Remote access platforms are usually considered as unreliable in various aspects. The aspect of reliability is because of the use of different lines in comparison to local access networks, which use direct lines making them reliable. Requirements for Security The product comprises of features such as enabling built in web security features and malicious software. Such is possible despite the presence of encryptions and authentication of access. It becomes easy for the employees using remote access, to access sensitive information from the database of the organization, which could be used for individual purposes. A penetration test is essential to establish the reliability in terms of security of a network or computer system. This will assume the use of malicious software from remote access to test the ability of access of the software in the network of the organization. This assumes two approaches, malicious insiders and malicious outsiders (Scarfone, Souppaya, 2007). Malicious outsiders are software, which could be used external of the organization whereas the malicious insiders are softwares used by individuals inside the organization. This is essentially used to evaluate the vulnerabilities present within a system. Such involves active analysis of the system configurations, which if are inadequate, could pose a significant risk to the database of the organization. It also includes analysis of the present software and hardware present in all the network computers and their respective weaknesses and strengths. Other weaknesses such as operational inadequacies could be evaluated and rectified to ensure that the organization develops appropriate countermeasures to curb such weakness of eliminate the weaknesses (Scarfone, Souppaya, 2007). Reference Burton, W. (2000). Remote access for Cisco networks. New York: McGraw-Hill. City University of Hong Kong. (2012). â€Å"Virtual Private Network† Computer Services Centre. cityu.edu.hk/csc/deptweb/facilities/ctnet/vpn/vpn.htm Feeney Wireless. (2012). Field Service Solutions. Retrieved from http//www. feeneywireless.com/solutions/field_service/. Jaligama, P., Goyal, A. (2011). Enterprise Application Imperatives in Mergers Acquisitions. Retrieved from www.infosys.com/consulting/packaged-application-services/white-papers/documents/ea-imperatives-mergers-acquisitions.pdf. Scarfone, K., Souppaya, M. (2007). User’s Guide to Securing External Devices for Telework and Remote Access. Retrieved from www. csrc.nist.gov/publications/nistpubs/800-114/SP800-114.pdf. Steffen, D. (2010, January 19). A Recipe for Success When Companies – and Their Data – Merge. Retrieved from www.information-management.com/issues/20_1/a_recipe_for_success_when_companies_merge-10016950-1.html.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.