Need to send the assessement file

1 answer below »
Need to send the assessement file

Answered Same DayDec 27, 2021

Answer To: Need to send the assessement file

David answered on Dec 27 2021
126 Votes
1

Assignment
On
Network and information security technology
Student Name:-
Student Number:-
Email Address:-
Campus Tutor:-
Assessment due date:-
Unit Coordinator:-
2

Executive Summary:-
Internet is one of the vast interconnected networks which can be used to share information or data
through online platform with flexibility of data exchange. Establishing secured network is the
primary concern for exchanging data over internet. Since the introduction of internet till now it has
grown its roots and become a mandatory
process of establishing any business of information
technology and services. Information and communication technology which is extension of
telecommunication of signal and information interchange with the help of required software and
hardware equipments.
Due to internet facility data exchange has become an easy process but it also generated so many
threats, hacking activities which are sufficient to destroy any company architecture and business. In
this assignment we will discuss the information and network security for the IT Company which is
fully dependent on internet and communication medium for providing product and services to the
customers and clients. Various threats in maintaining security of data as well as its protection
method will be discussed in this assignment with support of case study and practical demonstration
in a company.
Table of Contents
Executive Summary:- .............................................................................................................................. 2
Introduction: - ......................................................................................................................................... 2
Description:-1700 .................................................................................... Error! Bookmark not defined.
Network security:- .............................................................................................................................. 3
Information security:- ......................................................................................................................... 9
Conclusion: - 300 .................................................................................................................................... 9
Recommendation: - 200 ........................................................................... Error! Bookmark not defined.
Reference:- .............................................................................................................................................. 9
Introduction: -
Armpet is a company in Australia which is specialized for transportation services in different region
of Australia. The company has developed e-commerce website for taking user request for the
delivery of their goods. Currently company has one physical location and wants to expand to five 5
different region in Australia. Company wants to do the necessary hardware and software changes so
that information can be protected as well as there can be a single chain for connection all five
regional centre through internet and communication medium. Being a transport company some
time company has heavy wok loads and they feel difficulty in managing all the work with current
manpower. CEO of the company wants to expand the network with same manpower and more
artificial intelligence and intelligent software.
3

There are two aim of doing this dissertation project. Primary aim is to create, develop,
design, and evaluate a software system which runs on web server to differentiate between
real vs fake user based on the comments, suggestion, likes, dislikes provided on the
company website.
Benefit:-
Day by day technology is growing faster due to this there has been significant increase in the
threat activities which can destroy the complete business. In order to protect the web
server of the company it has decided to develop software which can be used to stop the
threat activities by the user who get into the web server through any medium.
IT artefact:-
Criteria used to differentiate real vs. fake users:-
Although it is very difficult to pull up all the social connections associated to any email
address without prior permission, but if the software is designed with correct coding and
clear instruction about the work it can perform better. Software interface will be connected
from the link of four different social connections, so that if any email address is fed to the
system it will fetch all the social connections associated with that account (while checking
prior permission was given or not).
Literature Survey
Fake users are the people who claim that the account which they have used while sharing
their suggestions belongs to them. But in real this is not fact they create the account with fake
names, location, details with some aim. For example if they want to do unauthorized access
to the site, or if they want to abuse the company names for product or services, or they just
4

want to intentionally destroy the web server with their corrupted coding skills. This creates
dilemma in the believe of social network as well as end users. This should be avoided in
order to create a secured and threat free platform on internet.
People creating fake profiles can have these three aims,
(1) Online abusing of a company or users.
If a person wants to create bad impression of organization or independent person then they
take support of fake accounts.
(2) Misuse of social engineering
It is the art of securing secrets and keeps it...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here