StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security Plan in 3D Media Company Ltd - Case Study Example

Summary
The paper "Information Security Plan in 3D Media Company Ltd" is a great example of a case study on marketing. 3D media comm. Ltd is a Western Australian based company that market products through social media, it mainly focuses on the small scale business enterprise to sell their product…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful

Extract of sample "Information Security Plan in 3D Media Company Ltd"

CS12102- INFORMATION SECURITY Student Name Institution Affiliation Date Submitted Table of Contents Table of Contents………………………………………………………………………………………………….1 Figures 3 1.0 Executive Summary 4 1.1 Introduction 5 2.0 The Information about the new product. 5 2.1 The marketing of the new product 6 2.1.1 The company clients 7 3.0 Information Classification Scheme 8 3.1 Vulnerabilities 9 3.1. 1 Countermeasures for the vulnerabilities 10 3.1.1 The Administrative Controls to Counter the Vulnerabilities 10 3.1.2 The technical control measures 11 3.1.3 Use of physical control measures 11 4.0 Information Security plan 13 Confidential information 14 Regulated data 14 Internal use 14 Public 15 5.0 Recommendations 15 6.0 Conclusion 16 References 16 Figures Fig 1.0 Shows information classification scheme……………………………………. Fig 2.0. Information security plan……………………………………………………. 1.0 Executive Summary 3D media comm. Ltd is Western Australian based company that market products through social media, it mainly focus on the small scale business enterprise to sell their product. The 3D Media communication company has been facing some threshold in acquiring its market share. Therefore, it is in the process to launch some of its new product with an aim to increase the impact of social media marketing using both mobile app and desktop program that will enable its clients to access their account and manage the same accounts respectively. Even though the company has not yet launched the product its competitors, social media market and some of its customers are very keen to find out the information concerning the development of their new product (Mangold, 2009). Therefore, this report has clearly outlined the information about the product to be launched. And so, the product to be launched will involve the use of apps and desktop program for the clients to access more information and able to market their product using 3D media company. The software will either be installed on their smartphones or desktop. Furthermore, the product will be sold using Facebook, Twitter what Sapp and also advertisement to attract more customers. The product will target both investors; medium and small companies that have not fully developed not able to run its media related marketing activities (Scott, 2010). However, there is some vulnerability that may come up before the launch of the product, for instance, software vulnerabilities, misconfiguration of some software and incompetent personnel as explained in the report. Even though, there is some countermeasures to overcome these weaknesses, for instance, physical controls using passwords to protect an unauthorized person from accessing the information and also use of biometric machines to detect an individual if they have the right to access a certain place that is more restricted to only specific people. Finally, there is information security plan intended to be followed by the launch of the product, which involves, maintaining confidentiality that is ensuring there is no disclosure of the information, restriction of data from access, internal use of the information and finally revealing the information to the public (Reid, 2010). 1.1 Introduction The 3D Media Communication Ltd has been expanding its business over the last five years despite being a competitive market for marketing on a social media platform. Even though it is trying to gain some market share that may be a threat to its business. This development will improve its marketing strategies and act as a way to challenge its competitors. Even though some of its targets is to use social media platforms like Facebook, Instagram, Twitter as a way of marketing its client product (Siegler, 2008). The 3D Media marketing company targets the small scale business 2.0 The Information about the new product. The new product that is to be launched by the 3D media Comm Ltd is mobile app and desktop program. Therefore, Mobile app is software that is intended to run on the mobile like smartphones and some computer tablets. The majority of these apps are ended with some devices as pre-installed software like website browser, emailing, calendar and many more other apps. Most of the pre – installed app can be detached by uninstalling process found in the device. The client will have to access their smartphones for them to use this app (Yetisen, 2017). The app will be found in the app store whereby it shall be downloaded for the customers to get the information they need. The app will be free and will not be bought by the client as they will use the app to get the information they want. As this will be one of the ways for the 3D media communication to expand its market. The information in the App will be clear as it will be easier for the clients to retrieve their information after using the app. Some of the features that are related to this app will include; it will be able to detect the location and on how to use it. The app will be designed in a way that it will attract customers and make it easy to be used.This app will have some added features that will make it easier to market product for companies Whereas, the desktop program will entail accessing some products using your desktop computer, it will easily enable the client to just click on their computer desktop to get the information they need. It will be advantageous to very many clients as they can share information among them and easily available. The software will be installed on their desktop to minimize any data cost that may be incurred while downloading the app (Lontos, 2009). Furthermore, the desktop program will be used by a variety of people because it accommodates a high number of clients at the same time it is easy to accessible. The new product will be as a way to improve the current products. 2.1 The marketing of the new product The products to be launched will use social media as its marketing strategy. The mobile app and the desktop program will make it accessible for the Facebook, Telegram, Instagram and What Sapp client to access anything they want so long as they have the web. This will enable the company owners to engage with its consumers in a free and fair way to market its product. Since it won't cost money and furthermore, it will be a fast and easy way to promote and create awareness about the 3D media company. They will also market it using advertisement in the media as this will create awareness to the general public, and those who have no smartphones and desktop program about the existence of the product (Poque, 2009). Some of its marketing will involve sourcing for bloggers, and some journalist that will write a competitive and compelling business idea about the product and the followers will like, comment while others share on their walls as a strategy in marketing the product. It will also be one of the ways to interact with your clients and create a mutual relationship between the company and its customers. 2.1.1 The company clients After the new product is launched, it will target different clients all from prominent firms and some institutions that value their customer and can create new ways to learn more about our product. Furthermore, some customers will be small to medium size companies that lack the experience to run social media to market their products. In other words, the companies will range from newly formed business or businesses that have not been fully into operations as a way of marketing them to their intended clients. The new product will also target people in the financial sectors, tourism agencies and some nonprofit organization (Siegler,2008). 3.0 Information Classification Scheme It is very crucial to understand in detail some of the weaknesses that may come up before the release of a product. Therefore, the figure below will show the information classification scheme that has been adopted for the new product Fig 1.0 shows information classification scheme. 3.1 Vulnerabilities According to Marjamäki &Svensson (2008), vulnerability refers to a weakness in programmed structures in a security measures about information that can be manipulated by a threat to achieve unapproved access to data of a particular company. Some of the vulnerabilities include software, which involves lack of testing the software to be used in the app. Through testing, the 3D media comm Ltd will be in a position to know if the device is good for working and therefore may not necessarily cause unanticipated problem to the client. Also, if the organization is using unprotected network that is having communication lines can be a threat and therefore can alter the communication network Another weakness that may arise is incompetent personnel; this involves people who are not well trained regarding the use of devices. It can also be as a result of lack of creating security awareness regarding protection of data. If the organization has incompetent people they may interfere with the information and therefore cause a lot of harm to the business and to some extend may decrease the sales of that particular company. Pogue & David (2009) further explains that an organization need to have trained their employees well regarding the security measure and how to ensure the data is not exploited by any other person. The people to handle the devices should be well trained and have more information about the product. However, if organization does not carry regular audits of its devices, and rectify any other problem that may arise and therefore harmful to the business. They can do this through proper planning to ensure that proper audit is done to the equipment (Thornhill, 2009), finally vulnerability is the physical site, which is presence of undependable source of power that can result in incomplete work done. If there is unreliable source of power to transmit information, it can cause further damage to the use of the devices and therefore some information might not be readily available. 3.1. 1 Countermeasures for the vulnerabilities Some of the measures that can be taken to overcome these vulnerabilities include, Administrative controls Some technical controls Physical measures 3.1.1 The Administrative Controls to Counter the Vulnerabilities This involves processes that are largely driven by human. The controls involves in this process include; training people on the security awareness. This involves training people on how they protect the use of apps and the desktop programs, also by ensuring you have competent and well trained people on the security measures so that they can handle information in a professional manner (Pogue & David, 2009) . Then security policies and standards in place to ensure people don’t interfere with the system in place and instead to comply with the set guidelines (Ludwig, 2012). Finally, hiring the competent people to manage the app and the desktop program, this involves when a business has put in very strict measures that need device testing and doing some background checks about their employees. So with the competent people who a have verse knowledge about the social media there will be likely reduced number of some security problems (Whittington, 2009). 3.1.2 The technical control measures According to, Harrington & Kizer (2010), this technical controls are very vital to ensure the security of information is protected. Furthermore, appropriate configuration and well maintenance of these measures will considerably develop the security of information. For instance the use of biometric for information verification, as it will prevent any other illegal person from accessing information that are very confidential Halligan & Shah, (2010) further mention some of the technical ways to ensure the information is secure, and this include; Using firewalls Using a onetime password on your devices Biometric verification devices System Admission Control (SAC) Use of Routers with ACLs 3.1.3 Use of physical control measures The physica measures ensure there is proper design, execution and ensuring there is measures that ensure organization resources are maintained. When it comes to security control using physical methods, it is very important to lock the door from reaching the data centre (Bainage & Fill 2011). The examples of physical measures include use of walls and doors, At some point the information safety may be compromised by ensuring there is a structure and wall that may not interfere with the information. Therefore, if high end walls are building, they will provide a safety security and prevent an intruder and prevent any fire related activities. Additionally, entrances that may enable unauthorized person to get access to prohibited area need to be assessed. The use of locks on mobile phones also help in securing data, which entails using a pin so that no one can access the mobile phone or desktop computer without your authorization. Even though, it varies in different smartphones, it is one of the effective ways to protect your information from loss or accessibility by another person (Kaplan, 2010).According to John & Sons (2010), some of the physical measure to ensure the safety of information include; Intruder recognition systems Safety protectors Use of Locks/pins on mobile phones Frameworks Uninterruptible power supplies (UPS) Fire dominance systems Constructive air-flow systems Therefore, when expertise examines in detail some of safety requirement for information, they should put into consideration the human life too. For that reason, a comprehensive planning is required in order to bring the balance between security issues of a human being and the security of information (Perez & Sarah, 2012). For instance, when trying to prevent illegal access that may protect a person from evading in case of a fire breakdown. Whereas, preventive measures are always designed to keep away specific challenges that may minimize accident relate issues or device breakdown (Kaplan, 2010). 4.0 Information Security plan The figure below will show the information classification scheme that has been adopted for the new product. These plans are very crucial as they help the manager the kind of process information will follow before the launch of the product. Figure 2.0 . Information security plan Confidential information It has a very substantial impact on the security of information. And if the information concerning the new product is disclosed can damage the reputation of the business, as people might get false information regarding the product. Access must be approved for an individual to get more information regarding the new product to be launched. The information relating to the new device can only be made accessible after its inception (John & Sons, 2010). Regulated data Information can be restricted and only for the top managers to access, as they are policy makers regarding the information of the company. This information should be held in a way that it does not allow any unapproved person from getting access to any data concerning the new product to be launched by the 3D media Comm Ltd (Halmstad, 2010). This involves the system that will need a legal and suitable user to login in before one is granted access to the website. Internal use This includes appropriate use of the available information for the owners, some shareholders, and other people. And the people intended to use the information are therefore not allowed to interchange or disclose the company information about the product to be launched soon. As some people may use the information to their advantage, that may end up costly to the 3D social media marketing company in case legal action is taken against them by their competitors. Whereas the information may be now accessible to everyone in the business, it’s still very important to emphasize on confidentiality since the product has not been lunched (Goldner, 2010) Public The information therefore regarding 3D social media marketing company launching some of its new product is now in public. The information can be spread without any restrictions about the new product to be launched (Alvesson & Sköldberg, 2000). The exposure and spreading of information should not violate any laws about marketing, for example, the privacy laws. Alteration of any information should be restricted to any other person that may interfere with information about the new product. But instead, the information should be authenticated to prevent modification by anyone except the approved people. The organization can still use passwords to prevent some unauthorized people from accessing the website without verification (Fill, 2006), 5.0 Recommendations The 3D Media Comm Ltd should further carry out more research on its product before it's launched. They should engage the general public to get more information that will assist the company to come up with a comprehensive and a good product. Furthermore, the company can do research using other strategies so that they can be aware in some areas they need to improve on regarding the current product they are marketing. It is, therefore, through people's opinion correctly client that the company will get a general feedback regarding their marketing methods and how they can improve. Furthermore, 3D media Comm ltd should have policies and security measures in place to protect their confidential information from disclosure. 6.0 Conclusion The strategy 3D media Comm LTD is in the process to launch its new product to increase its market share which is critical in any business arena. Creating new products improves some of the company operations and therefore can act as the competitive advantage over its competitors. However, security measures are very critical especially when in the process to launch a new product because if the information is leaked to the unintended people, it might cause an organization and at times may reduce its level of sales to its clients. Therefore if the company will implement the above, then it will be advantageous to the future of the enterprise References Alvesson M & Sköldberg K (2000), Reflexive Methodology – New Vistas for Qualitative Research, SAGE Publications, Great Britain. Baines P, Fill C & Page K (2011), Marketing, 2nd edition, Oxford University Press, Italy. Fill C (2006), Simply Marketing Communications, Pearson Education Limited, Spain. Goldner S(2010). "Take the A-path to Social Media Success." E-Content Magazine, December 2010: 20-21. Halmstad Ramsay M, (2010). "Social Media Etiquette: A Guide and Checklist to the Benefits and Perils of Social Marketing." Database Marketing & Customer Strategy Management Vol. 17, 3/4: 257-261. Halligan B & Shah, D (2010), Inbound marketing – get found using Google, social media, and blogs, Harrington C, Kizer L. E., (2010). "The Lasting Effects Of Social Media Trends On ." Journal of Business & Economics Research, Vol 8, Nr. 11: 73-80. John Wiley & Sons, D (2010), The social media marketing book, O'Reilly Media Inc., Canada Kaplan A.M., Haenlein M (2010). "Users of the world, unite! The challenges and opportunities of Social Media". Business Horizons 53: 59–68. Ludwig, Sean. December 5, 2012. venturebeat.com, study: "Mobile app usage grows 35%, TV & the web not so much." Lontos P, and Ramirez M (Sep/Oct 2009)."The top mistakes of Social Media Marketing". Agency Sales. Mangold, G. W., Faulds D. J. (2009). "Social Media: The new hybrid element of the promotion mix." Business Horizons 52: 357-365. Marjamäki T, and Svensson H (2008) Social media - a link between producer and consumer, Högskolan Perez, Sarah. July 2, 2012. "comScore: In U.S. Mobile Market, Samsung, Android Top The Charts; Apps Overtake Web Browsing." techcrunch.com Pogue, David (November 4, 2009). "A Place to Put Your Apps." New York Times. Retrieved January 22, 2013. Reid C. K, (2010). "Should Business Embrace Social Networking." EContent Magazine, June 2009: 34-39. Research-Technology Management (2010) "The Revolution Will Be Shared: Social Media and Innovation." Vol. 54, Issue: 1, Jan-Feb 2011: 64-66 Siegler, MG (June 11, 2008). "Analyst: There's a great future in iPhone apps." Venture Beat. Scott D.M (2010), The new rules of marketing & PR – how to use social media, blogs, newreleases, online video, and viral marketing to reach buyers directly, 2nd edition Thornhill A (2009), Research Methods for Business Students, 5th edition, Pearson Education, Italy Yetisen, A. K.; Martinez-Hurtado, J. L.; et al. (2017). "The regulation of mobile medical applications." Lab on a Chip. 14 (5): 833–840. doi:10.1039/C3LC51235E. Whittington C, (2009). "Social Media: Taming the Future of Marketing." Junior Composition. Wright E, Khanfar N. M., Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us