StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Risks Associated with the Internet as Part of a Business Solution - Essay Example

Cite this document
Summary
In the essay “Risks Associated with the Internet as Part of a Business Solution,” the author analyzes the Internet has turned out to be the most important tool that business organizations use to run and improve their businesses…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Risks Associated with the Internet as Part of a Business Solution
Read Text Preview

Extract of sample "Risks Associated with the Internet as Part of a Business Solution"

Risks Associated with the Internet as Part of a Business Solution In the past few years, the use of the Internet for carrying out business activities has raised to a massive extent. In fact, the Internet has turned out to be the most important tool that business organizations use to run and improve their businesses. Without a doubt, the substantial growth of the Internet and additional technology enhancements provide the business organizations with a variety of advantages and opportunities as well as allow them to perform their business transactions and processes without any limitations and restrictions of the borders. On the other hand, with frequently growing dependence on the Internet, this technology turns out to be the central infrastructure for the majority of necessary business tasks, as a result making them more susceptible to considerable Internet disturbances. Without a doubt, a variety of security threats and risks exist in all areas of the Internet, and the business processes that make use of the Internet. In this scenario, some of the probable risks and security challenges can comprise disruptions caused by coding error, malicious code, natural disasters that have significant impacts on fundamental Internet routers and hubs, and security attacks and threats posed by terrorists or other attackers. In case of ING business, their important accounting data would be transmitted through the Internet which can be hacked by a hacker and misused later on (Business RoundTable, 2007; Cisco, 2013). The World Economic Forum has estimated that in the coming few years, there would be a 10% to 20% probability of an interruption of the serious information infrastructure that is one of the probably risks it researched. In addition, the global economic cost that the World Economic forum has estimated goes beyond $250 billion, which is surely one of the biggest cost assessments of the risks examined. On the other hand, these financial flow impacts of an Internet problem or threat can cause a wide variety of challenges and problems for the business organizations. In this scenario, some of the problems can include lower incomes, decrease in efficiency, stock market crashes, reduced spending, a decline in consumer self-confidence and a possible liquidity disaster (Business RoundTable, 2007; Cisco, 2013). Analyze ING’s solution for providing security to determine if the solution is adequate or inadequate. Provide a rationale for your answer. Without a doubt, the business of ING Group heavily relies on the information technology and IT is being used in every region of ING Group. According to the case study, the ING Group takes the IT governance responsibility very seriously to make better use of the technology to support their stakeholders. These perspectives clearly appear in their strategies. For instance, the management is strongly committed with the implication of IT with respect to various important aspects such as providing balance sheets and income statement. Without a doubt, the ING Group is serious in securing the data and information of their clients. For this reason they spend more $2.5 billion every year to improve their IT capabilities. In order to run and manage its IT operations effectively, ING Group employs a staff of more than 15,000 staff members, as well as spends more than $1 billion on IT-enabled capital programmes. In addition, the process established by ING Group for the medium-term planning (MTP) consists of an IT unit in which both chief information officer and business owner work in cooperation and perform the role of a chief investment officer. In this scenario, chief information officer works as manager of the corporate investment fund who sensibly balances risk and arrival in the portfolio of IT-enabled business investments. It is clear from the case study that ING Group has successfully established and maintained an IT governance structure that provides an excellent support for active IT investment portfolio management. In order to deal with security challenges and risks, ING Group has implemented a The IT Leadership Council, which comprises a number of chief information officers from different business sectors as well as from the major geographies who offer their feedback and guidance to the IT and Procurement Policy Board on a variety of recent and expected security risks and challenges. Basically, this relationship between the policy board and leadership council is significant, for the reason that, it is the members of the leadership council who are primarily responsible for the execution and implementation of the IT policy accepted as well as guided by the policy board (ValIT, 2006). Critique the extranet solution and recommend one (1) change to the solution to provide better connectivity to brokers. The current solution is based on the extranet, which is basically a private network that makes use of the Internet technology and the public telecommunication system to securely distribute and receive business's information or operations with vendors, suppliers, partners, other businesses or customers. In this scenario, an extranet is believed to be a part of a business intranet that is extended to users outside the firm. However, extranets cannot always be useful for the communication of precious data and information for the reason that these networks use the Internet. In this scenario, the security of the extranets is critical when dealing with critical information. In addition, the company should control and check the system access to make sure that data and information are going into the correct hands. Hence, these networks require extensive security and privacy. In order to make sure the security of these networks, ING Group should implement a mixture of a variety of security techniques such as firewall server management, encryption of messages, the issuance and use of digital certificates or similar means of user authentication and the use of virtual private networks (VPNs) that tunnel through the public network (Rouse, 2007). References Business RoundTable. (2007). Growing Business Dependence on the Internet: New Risks Require CEO Action. Washington, DC: Business RoundTable. Cisco. (2013). Data Leakage Worldwide: Common Risks and Mistakes Employees Make. Retrieved from http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-499060.html Rouse, M. (2007, April). Extranet. Retrieved from TechTarget.com: http://searchenterprisewan.techtarget.com/definition/extranet ValIT. (2006). ENTERPRISEVALUE: GOVERNANCE OF IT INVESTMENTS: The ING Case Study. Rolling Meadows, IL: IT Governance Institute. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Risks Associated with the Internet as Part of a Business Solution Essay”, n.d.)
Risks Associated with the Internet as Part of a Business Solution Essay. Retrieved from https://studentshare.org/information-technology/1625892-case-study-2-ing-life
(Risks Associated With the Internet As Part of a Business Solution Essay)
Risks Associated With the Internet As Part of a Business Solution Essay. https://studentshare.org/information-technology/1625892-case-study-2-ing-life.
“Risks Associated With the Internet As Part of a Business Solution Essay”, n.d. https://studentshare.org/information-technology/1625892-case-study-2-ing-life.
  • Cited: 0 times

CHECK THESE SAMPLES OF Risks Associated with the Internet as Part of a Business Solution

Improving Third Party Service Integration The Cloud, SAAS, BPO

There are several risks that are associated with the integration of third-party BPO and SaaS services into clients businesses.... Managing business continuity and security risks associated with adoption of cloud services from various third-party application vendors.... The paper tells that Software-as-a-Service is both an application delivery model and a business model.... SaaS is both an application delivery and a business model thus giving cloud service consumers the ability to access and use various applications on a pay-as-you-use basis without having to install it and run it on their own hardware....
9 Pages (2250 words) Essay

Cloud Services Supporting Business Intelligence

This review ''Cloud Services Supporting business Intelligence'' shows, that the future of cloud-based BI remains viable and presents vast opportunities for effectively and efficiently making business decisions.... nbsp;Researchers argue that cloud computing presents future benefits for business intelligence, BI.... nbsp;… The cloud computing technology presents a cost effective, efficient and quick computing platform on which BI technology rides to gain insight, reduce cost and enhance speed and quality of business decisions....
10 Pages (2500 words) Literature review

ERP Systems in the Business Environment Through Solutions

Importance of ERP Systems for its Success in the business Environment through Solutions By [Name of student] [Presented to] [Name of institution] [Date] ACKNOWLEDGEMENT Knowledge is in the end based on acknowledgement- Ludwig Wittgenstein The success of any effort is dependent on the level of individual enthusiasm and support and cooperation offered by others.... The literature review helped in investigating the elements of the ERP along with exploring its benefits and risks in the competitive business environment....
59 Pages (14750 words) Dissertation

Discuss how security requirements can be linked to business requirements

The organization has to analyze all the possibilities and provide the solution that is technological stable and cost-effective, to implement, maintain and modify in future.... This Trend has imbibed various technologies that improvise the life style and business aspects of every individual in accordance with technology.... As, every event or technique has a better impact and a worse impact, the technologies that speed up the business processes are also prone to increase risks of computer intrusion, fraud, disruption and many more....
15 Pages (3750 words) Essay

Security Risks Associated With VoIP Implementation

hellip; Chapter 2 will cover the secondary research that supports the knowledge of the topic and builds credibility of the topic of security risks associated with VoIP implementation.... These benefits go a long way in enhancing a business' competence and offers market leadership and dominance.... In a business these resources are categorized into information, physical, human and financial resources.... The value of the information resource can also play a role in providing a business with a significant competitive advantage....
17 Pages (4250 words) Research Paper

Information Security Issues

The organization has to analyze all the possibilities and provide the solution that is technological stable and cost-effective, to implement, maintain and modify in future.... This Trend has imbibed various technologies that improvise the life style and business aspects of every individual in accordance with technology.... As, every event or technique has various technologies involved that speed up the business processes there are also prone to increase risks of computer intrusion, fraud, disruption and many more....
11 Pages (2750 words) Essay

Company Analysis on eFax

Even with the advent of internet, fax traffic continued to grow during the later part of 1990s and early 2000s against the predictions of the industrial experts.... om basing on this strong technology emphasizing the internet applications for the domestic transmission and software expertise.... The company provided millions of professionals a revolution in their document communications reducing the clutter of paper work and making faxing easy and accessible (business Wire)....
16 Pages (4000 words) Essay

Management Solutions in Practice

Cloud computing is learned to be different from the traditional services as it makes obtainable the IT resources on the internet instead of managing and obtaining them locally.... It provides resolutions by way of software services that are let out on the internet.... The company makes their solution software available on the internet which eliminates the requirement of purchasing or making a significant amount of expenses related to hardware as well as software systems along with time-consuming procedure of installing those locally on the corporate computers....
12 Pages (3000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us