Security and Ethics in a Networked World

 

Save your time – Order a paper now!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Order Paper here

Networking is the process of bringing people who share a specific objective together by computer connectivity enhanced by internet (Barrie, 2011). Networking brings forth various advantages. It has dramatically boosted information sharing among the managers at the headquarters and the branch office managers in Special salmon. Communication on the pounds of fish sold and their prices are appropriately articulated to the managers. Networking has favored Special salmon to be connected thus enabling in the utilization of an opportunity.

When the demand for a specific type is high of fish is high in a particular restaurant, the organization takes advantage and supplies the required fish type. Connections through the systems help in knowing the current trends prices of specific fish. Networking enhances data sharing (Kozierok, 2009). Since the computers are updated, data sharing is enhanced. For instance, the computer at the branch offices captured the inventory of the fish arriving and sold then transmits the information to the headquarters. Networking also improves the credibility of Special salmon, and probably that is why several restaurants want to establish communication links with it.

Data communications linkages assist in delivering the right information at the required time (Naff, 2013). The linkages between the headquarters and the fishing boats give Special Salmon a competitive advantage over the other fishing companies. The systems at the headquarters sense the areas with a large number of specific fish and alert the fishing boat personnel to capture in those areas. The caught fish are then delivered to various restaurants. Communication linkages form the basis of data on the amount of fish obtained by certain fishing boats. This data is then computed to generate the total daily fish pounds acquired.

Cloud computing is “an emerging IT development, deployed and delivery model, enabling real team delivery of products, services and solutions over the internet” (Slabeva, Wozniak & Ristol, 2014). Cloud computing would impart benefits to Special Salmon. Efficiency in the fish market would be boosted since marketing applications will be used which are faster than the normal marketing strategies. Cloud has automatic software updates thus system maintenance is self-induced. This would save on the cost of upgrades incurred after three years. Increased collaboration will be experienced on use of cloud computing since the managers at various points can edit and share crucial information through the cloud-based file sharing. Since cloud computing is an innovative technology, it will also enhance competitiveness over other fishing companies. Flexibility is experienced with the use of cloud as services can be customized to serve the intended purpose.

System security is important to protect the data from alteration by hackers and other software-based threats like viruses (Yan, Molva, Mazurczyk & Kantola, 2017). Restricting users of the mainframe computer at Special Salmon would help minimize the chances of data distortion. Data encryption protects the computers from unauthorized persons. Installing anti-malware programs on all the computers would secure the systems from malware. Files backed up in the cloud should be erased upon the final use since people with bad intention may use the information to defame the organization. Firewalls would also work to prevent the systems from damage by malicious programs like spyware. Use of different passwords at different places would help prevention some systems in case of unknown hacking success. For example, systems in the headquarters should bear different passwords with those at the ports.

 

References

Stanoevska-Slabeva, K., Wozniak, T., & Ristol, S. (2014). Grid and Cloud Computing: A Business Perspective on Technology and Applications. Berlin: Springer Berlin.

Barrie, J. (2011). The little fish guide to networking: How to make word-of-mouth marketing work for you. Beckenham: Comms Plus.

Kozierok, C. M. (2009). The TCP/IP-Guide: A comprehensive, illustrated Internet protocols reference. San Francisco Calif: No Starch Press.

Yan, Z., Molva, R., Mazurczyk, W., & Kantola, R. (2017). Network and System Security: 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings. Cham: Springer International Publishing

NATO Advanced Research Workshop on Managing Environmental Degradation: Dialogue, Cooperation, Data Sharing, & Naff, T. (1999). Data sharing for international water resource management: Eastern Europe, Russia, and the CIS. Dordrecht: Kluwer Academic Publishers.

 

 

Get a similar assignment here  https://gpatargeter.com/order/

 

 

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!":

Get started