StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Technology Evaluation and Recommendation - Essay Example

Cite this document
Summary
Technology Evaluation and Recommendation (Name) (University) (Date) Technology Evaluation and Recommendation Security Threats The peer-to-peer (P2P) file sharing application allows users to share video, music, games, and documents and facilitate online telephone conversations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Technology Evaluation and Recommendation
Read Text Preview

Extract of sample "Technology Evaluation and Recommendation"

Technology Evaluation and Recommendation Technology Evaluation and Recommendation Security Threats The peer-to-peer (P2P) file sharing application allows users to share video, music, games, and documents and facilitate online telephone conversations. As described in the Bureau of Consumer Protection website, this application enables other computers using similar P2P programs to create a network and thereby to share digital files with other computers through this network. P2P file sharing applications are able to set the drives and folders from which digital files can be shared with others on the network.

Sometimes employees who use P2P file sharing software may accidently share files or folders which contain sensitive client information, or they may save a confidential file or folder to a shared drive by mistake. As a result of these issues, confidential customer information will be made available to others (Bureau of Consumer Protection). An organization always needs to securely store a variety of sensitive client information including passwords, system registry, file backups, and other data.

Many of the organizations have developed local area networks to improve employee access to information within the organizational environment and thereby to enhance the firm’s operational efficiency. Therefore, if an employee installs an unsecure application in his computer, the security of the overall network would be compromised. In addition, today many employees connect their smarphones to company networks to browse internet. Those unfair employee practices may cause to spread malwares and viruses across the company network and this situation in turn would threaten the security of sensitive client information.

Similarly, computer hacking is one of the major information security threats associated with P2P file sharing because professional hacker can create fictitious file sharing pages that are capable of trapping sensitive client information. The organization also faces many security threats during the process of information collection because of the fraudulent practices like phishing, vishing, and smishing. Technology Based Solutions In order to enhance the security of sensitive client data, it is necessary for organizations to minimize the use of P2P file sharing applications.

The organization can strictly monitor and regulate the traffic associated with unapproved P2P file sharing programs using network firewalls. In addition, it is also better to train employees about the security risks and vulnerabilities associated with using P2P file sharing software. URF filtering and patch management are some potential technology based solutions to address malware and virus attacks and Trojan horse programs. Through URL filtering, an organization can effectively categorize the websites and prevent its employees from opening unwanted websites that might become a threat to the confidentiality of the client information.

As Ciampa (2013) notes, a patch can be simply defined as a software designed to deal with updating a computer program or to deal with security vulnerabilities. Patch management is an effective tool to improve the performance of information security systems (p.89). Similarly, effective System Update Administration can play a significant role in fighting security failures associated with P2P file sharing and open source applications. By regularly updating anti-virus and spyware protections, the organization can improve its vulnerability to those security risks.

As Scarfone and Mell (2007) describe, intrusion prevention systems (IPS) are network security tools that continuously monitor the company network and system activities to detect malicious activities; and intrusion prevention systems are classified into four different types such as network-based intrusion prevention systems (NIPS), wireless intrusion prevention systems (WIPS), network behavior analysis (NBA), and host-based intrusion prevention systems (HIPS). Recommendations Among the different technology based solutions discussed, host-based intrusion prevention systems (HIPS) are more recommendable for providing effective protection measures because they greatly minimize the risk of confidential data loss associated with using P2P file sharing applications and other open sources.

Many technical experts opine that HIPS can be very effective to monitor systems and to check for anomalous behavior. More precisely, HIPS can play a crucial role in detecting applications that are attempting to be installed, non-standard events, and user escalation. The HIPS is an installed software package that analyzes events occurring in a particular host in order to detect suspicious activities (Scarfone, K & Mell). This system is able to ensure that only authorized IT professionals have access to sensitive client information.

What Is the Risk or Vulnerability? What Needs to Be Protected? (e.g., passwords, data, file backups, system registry) Candidate Technology Solution How the Technology Solution Works Effectiveness (High, Medium, Low)  P2P file sharing application  Passwords and browsing history  URL filtering  This technique categorizes websites and prevents employees from opening unwanted and insecure websites.  Low  Employees’ personal use of company network  Credit card details and other financial data  Patch management  It uses software to fix security vulnerabilities and to update computer programs.

Medium  Computer hacking  Purchase details and file backups  Host based intrusion prevention systems (HIPS)  This tools monitors systems and checks for different anomalous behavior within a specific host. High References Bureau of Consumer Protection Business Center. Peer-to-Peer File Sharing: A Guide for Business. Retrieved from http://business.ftc.gov/documents/bus46-peer-peer-file-sharing-guide-business Ciampa, M. (2013). Security Awareness: Applying Practical Security in Your World. US: Cengage Learning.

Scarfone, K & Mell, P. (2007). National Institute of Standards and Security. Guide to Intrusion Detection and Prevention Systems (IDPS): Recommendations of the National Institute of Standards and Technology. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Technology Evaluation and Recommendation Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1484207-technology-evaluation-and-recommendation
(Technology Evaluation and Recommendation Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1484207-technology-evaluation-and-recommendation.
“Technology Evaluation and Recommendation Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1484207-technology-evaluation-and-recommendation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Technology Evaluation and Recommendation

Assistive Technology: Evaluation

evaluation of Assistive Technology Name University evaluation of Assistive Technology Beard, Carpenter, and Johnston (2011) effectively state that, “Assistive technology, like education, should not be approached with a ‘one size fits all' mentality'” (p.... Just as teachers should not teaching to only one learning style in a classroom, assistive technology should not be expected to work the same way in every situation.... Even when a particular piece of equipment is useful for multiple students within a school, the ways in which that technology is utilized may vary dramatically from one student to another....
5 Pages (1250 words) Assignment

Technological Evaluation and Recommendation

Technological evaluation and recommendation Name: Tutor: Course: Institution: Date: Executive Summary This paper focuses on evaluating and identifying ways through which issues of data leaks can be addressed in order to avoid exposure to financial looses and damages of reputation.... Besides, the paper will also make a recommendation for the best fit technology-based solution for solving and mitigating the problem cause by data leaks.... The paper will entail a matrix section which will focus on categorizing and assessing the risks related with data leaks, and three technology based solution will be provided and discussed as effective protection measures....
5 Pages (1250 words) Research Paper

The Tampa Clubs System Evaluation

TimeXone Technologies Memo To: Chief Executive Officer (CEO), The Tampa Club From: [Write Your Name] Cc: Chief Technology Officer, TimeXone Technologies Date: 22nd September 2013 Re: The Tampa Club's System evaluation and recommendation Kindly refer to your request for evaluating and furnishing recommendations for the Transaction Processing System (TPS) to be implemented in the ‘The Tampa Club'.... TimeXone Technologies Memo Chief Executive Officer (CEO), The Tampa Club [Write Cc: Chief Technology Officer, TimeXone Technologies Date: 22nd September 2013 Re: The Tampa Club's System evaluation and recommendation Kindly refer to your request for evaluating and furnishing recommendations for the Transaction Processing System (TPS) to be implemented in the ‘The Tampa Club'....
2 Pages (500 words) Essay

Project Involving the Evaluation of a Website

First, will be the introduction of the website in regards to the 7Cs of website evaluation.... It is essential that evaluation of website meets the standard criteria.... evaluation is a process of assessing the subject in accordance to set of rules that are applicable.... Introduction Evaluating IKKS website involve assessment of the website in regard to e-business evaluation criteria.... IKKS evaluation involves the assessments of context, content, community, customization, communication, connection and commerce....
16 Pages (4000 words) Coursework

Formative and Sumative Evaluations

eacher evaluation is a very important practice that helps ensure this development among teachers.... It is very important so that ineffective teacher evaluation systems are seen to be more costly than effective ones.... However, formal teacher's evaluation was traced to have begun at the turn of the 20th century to about 1980 (Robert F.... With this change in the phase and face of life, one thing that should be able to cope with it so religiously is the scope of education. … Teachers and schools administrators are challenged to adapt and enjoy the fruits that technology has given us-such as computers, personal digital assistant (PDA) and other electronic gadgets....
20 Pages (5000 words) Essay

Evaluation of Learner Performance

imilarly, approaches to evaluation and even associated models are covered in depth.... The reporter states that evaluation plays a vital role in models of instruction.... evaluation methodologies and tools help to determine general effective of instruction methods.... Part of this explanation inclines on the fact that the evaluation in itself is a complex activity.... The purposes entail the evaluation of instructional materials, student learning, the return of investment, transfer of training and many other factors....
4 Pages (1000 words) Assignment

Tornado-Evacuation 2012 - Operation Based Exercise Development

Part of the Strategy is the provision of a Controller and Evaluator Guide, an evaluation Guide, a Master Scenario Event List (MSEL).... Part of the Strategy is the provision of a Controller and Evaluator Guide, an evaluation Guide, a Master Scenario Event List (MSEL), and specific briefings for all those who are to be prepared for such emergency situations in Oklahoma City....
34 Pages (8500 words) Essay

Technology Failure in Business

This tool revolves around three steps, namely “activity analysis, value analysis, as well as evaluation and planning” (Gunzenhauser & Bongulielmi, 2008, p.... Such a recommendation will increase the project's value and also reduce goal differences between what may be of value to customers and what the agent may actually want to implement.... The evaluation of the implementation process should be done by the principal and the agent/vendor to achieve project success....
3 Pages (750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us