Monday 12 June 2017

IT Security and Threats in the Modern World

IT Security and Threats in the Modern World Assignment Help

Today the business of IT sectors increase rapidly in the world and it also a key driver of global economic growth. The main function of an information technology is to develop the software and hardware basically based on computer (Chepkoech, 2017). The other main function of the IT sectors is design, development and implementation of the Information technology and management system. The IT industry also helps the other servicing and manufacturing sectors to grow.
Objective of the Project
The main objective of the project is to control and prevent the hacker and maintain the proper security. There are more than 100,000 known viruses present in the cyber world and these viruses are able to delete and transfer all the data or information in a small time from one computer to other. The information is the main asset of the company. Without any information the companies feel a blank with a view to the documentation (Chepkoech, 2017). Most of the companies, banks, marketing sectors are stored their data or information in the virtual memory or a software that why the companies need to maintain the hard securities in the software. The other main objective is to prevent the sudden breakdown of the computer website. The breakdown of the website also hampers the update of notice and other issues that also affect the customer of the company.

Identification of IT networking related Problems

There are different types of issues and problems arise in the Information Technology (IT) industries are: 1) the crashing or breakdown of the company website and 2) the hacking of the total company software (Thangamani et al., 2017).
The Crashing or Breakdown of the Company Website
Most of the major website is not accessible to people across the world because the internet’s infrastructure said that it was under attack. Now the cyber attack is one of the major problems in the world. All the economy and balance of data can be hampered for the crashing of website (Corrigan, 2017).
There are different steps that can also prevent the hackers and to maintain the company website. The company needs to keep the daily backup of the documents and keep all the software up to date. The company should need a daily basic check on the server.
Types of Customer in Cognizant
Cognizant is one of the biggest IT Company in the world. The Cognizant has different types of clients. The main work of that company is to design, build and scale meaningful experience and that company also provides the digital operation of the business and simplifies, modernize and secure the work of the clients (Roberson, Buonocore and Yearwood, 2017). The Cognizant serves the top clients across the different sectors such as Banking, insurance, healthcare, financial services, manufacturing, life sciences, retails, information, media and entertainment, etc.
Understand the Customer Specific Needs
To start an IT business the company should know the customer needs. The good customer research is needed to convince the customer about the product and further customer research also helps to develop a more detailed picture of your customer. There are different types of problem facing by the worker regarding customer (Folta, Lockton and Bowden, 2017). Sometimes the customer is not satisfied with the services or products of the company. The system administrator of information technology sectors are works in diverse environment including internet service provider, network operation centers and data centers. When a customer will see that the software of Cognizant is hacked by the hackers the clients will perform a negative reaction to the company (Potter, 2016). They will be tensed about their valuable information stored in the cloud.
Services offered by the Cognizant
There are different services offered by the Cognizant are-1) Digital business solutions.  
2)  Managing the business with Digital Operations and 3) Simplifying, modernizing and securing the IT structure and application that are the main component of the clients business (Potter, 2016).
Digital Business Solutions
The Cognizant digital business solutions also help the client company to engage the customer by innovative plans and projects of the business. This company also gives the strategies to maintain the business and to generate new growth and real economic value (Roberson, Buonocore and Yearwood, 2017). This company also begins with data science and knowledge of your industries most important processes and also collaborates with the clients to inspire intelligent products, better strategies to engaging more customers in the company.
Managing the Business with Digital Operations
The cognizant also offer the digital software by which a manager of a company can execute all the business plans from the software digitally. The back office process closure to the customer with the help of cloud based platforms that employ business process as a service solution (Potter, 2016). This digital process also helps to the companies to differentiate their brands from the other companies.
Simplifying, Modernizing and Securing the IT Structure and Application
Digitization is creating swift and better changes across the all industries. The processing of business through the digital application is also easier for the employees of the organization (Folta, Lockton and Bowden, 2017). The modernizing of the application, platforms and websites also helps the clients to keep their data up to date. The data securities are the more important for every company. The Cognizant also helps the client to maintain the proper security in the private cloud storage as well as it also help to prevent the cyber threats.
Services That Don’t Offered by Cognizant
The Cognizant cannot offer any protection against the Ransomware or other updated malware. The Cognizant can’t give any lost documents if the Client shares the password with the others. The cognizant do not provide any financial support to the clients in case the lost of any documents (Folta, Lockton and Bowden, 2017).
Legislation That Make a Customer Aware
The consumer legislation covers the warranties and the condition of sell (Talbot, 2016). That law also covers the product and product safety standard, Provision of accurate information to the consumers. There is different legislation that make the company aware are- 
Security of Data or Information
The company knows that how much data is essential for the client they can offer commensurate value in return of the data. Making the exchange transparent also help to maintain a good relation between company and clients (Talbot, 2016). The client should keep all the data keep safely with the password. The client should not share the password or usernames with other.
Transparency and Trust
All the confidential documents and information should be stored in the locked file only accessible for those who have the business. All electronic confidential data or information should be protected by the encryption, firewall and password (Talbot, 2016). These processes also make a customer aware.
Cognizant’s Professional Knowledge to Help the Clients
 There are thousands of professional people are attached with the Cognizant that also help their client to share their knowledge and other benefits (Prasad, 2016). The professional employees of Cognizant also give the client a second choice for the security of their valuable information.
Information Used By the Cognizant to Help the Client
There are different types of information is used the Cognizant to help their clients. Cognizant also give the digitalized business opportunity as well as all the presentation, outline diagram or project of a company. There are so many resource person work at cognizant they help to gather the information from the different various sources (Lopez et al., 2016).
Dealing the Unsatisfied Customer
There are different ways to deal the unsatisfied customer. At first the company listen the whole problems of the customer. Then they take them seriously and verify the problems during verify the problems they stay calm. The calming approach also helps the client stay calm too. Then the employees solve the problems of the client (Fakharany, Company and Jodar, 2016). If the cognizant unable to solve the problem they apologize gracefully.
Solving the Customer’s Problems within the Organization Expertise
If there is an expertise people present in the Cognizant who can easily solve the problem. The Company will fix the problems of the clients as soon as possible by using its resources (Prasad, 2016)
Solving the Customer’s Problems outside the Organization’s Expertise
I there is no expertise people present I the company to fix a problem showed by the customer then Cognizant hire the expertise people or consultancy to fix this problem as soon as possible to satisfy the customer (Fakharany, Company and Jodar, 2016). The Cognizant will also appoint some expertise staffs to fix the similar problems in future.
How to Know That the Provided Information Is Up To Date and Accurate
The Cognizant always keep the information and software up to date and the company always use the best tools or kits to fix the problems. The company also reviews the information before giving it to the clients (Lopez et al., 2016).
Hacking of Software or Spread Ransomware
Ransomware is one kind of malware software that block the access of data or serious information and giving threat to publish the information in public or delete the data until the ransom or money is paid. The lost of information also hamper the economy of the company as well as it will hamper the customer satisfaction (Corrigan, 2017). Not only the companies the customer are equally affected by the hackers. Some of the ATM card holders also lost their money by sharing their ATM card numbers with the unknown person and the other personal information (Corrigan, 2017).
Customer specific needs regarding website breakdown
A customer wants to minimize the single points of failure and broken hardware is replaced as soon as possible (Gudipati, et al., 2013). On the other hand they also want if, it is possible to connect servers to multiple switches as it helps to replace a broken switch with another which has a the same configuration and to set up a spare switch with an appropriate basic configuration in advance to simply replace the hardware to restore connectivity. To maintain power issues as it is important to have to components to provide backup for each other connected to different power circuits, so that if one circuit goes down, the other will back up (Gudipati, et al., 2013). Moreover using of same vendor and software version for everything will omit additional complexity. On the other hand customers’ data should be encrypted during making payments or other transactions made through e-commerce site (Garimella et al., 2015).
Services offered to the customers to avoid website breakdown
There should be clear sense of what the company is offering because consumers will not contact the company directly for the missing product information rather they will directly move on to the competitor (Garimella et al., 2015). Similarly, contact information, including a phone number and physical location because some of the customers prefer to do all of their business online either publishing their address or phone number while those who are operating from home rather than work place are also worried in giving a street address or hometown which will somehow hinder them (Garimella et al., 2015). On the other hand, third party validation is also preferred as because sometime, they want to know with whom they are doing business and what are the customers current experience regarding the matters. Similarly, SSL is also important as it helps to protect the privacy of data exchange between customers and the website. On the other hand use of navigation also matters a lot because the things that can’t be found will be easier for the customers to navigate and find the required information they are willing to (Garimella et al., 2015).
Services that would not be offered to the customers
The company should avoid or rectify faults, errors or discards in network devices. The configuration of devices should be change, there should be no operational human errors and omit out mismanagement of devices. Similarly, there should be regular checks on link failure that are caused due to fiber cable cuts or network congestion (Garimella et al., 2015). On the other hand, there must be sufficient power supply to avoid power outages as well as maintenance in server hardware failure. There should be proper restrictions in gateway to block security attacks, such as denial of service (DoS). There must be process, in avoiding failed software and firmware upgrade or patches. On the other hand, incompatibility between firmware and hardware devices must be rectified (Garimella et al., 2015).
Legislation made for the customers tom make them aware and the affect of this to the customers
Account and registration Details: Customers should agree upon the information provided by the company upon registration and all other times will be true, accurate, current and complete. On the other hand, customers should also agree that they will ensure that the information is kept accurate and up-to-date all the times they proceed (Sasidharan and Chandra, 2014). Similarly, if they have any reason to believe that the account is no longer secure, in case of loss, theft or unauthorized use, then customers agree to notify Infosys for the breakdown cause. This will help customers to rely on the company as well as trust which will make them to merge with the company (Sasidharan and Chandra, 2014).
How Infosys would use their professional knowledge to help customers to make their best choice. If more than one option is prescribed then options would be described
Marketing would be the first step to be focused, because a trained and professional marketing graduate can identify customers’ behaviours and their needs (Gupta et al, 2016). Features could be converted into benefits, because it is easy to identify features, as they are written on the packaging or on the product itself. Similarly, there must be add on for the customers as, it gives product details and knowledge that are offered by the company, and it also increase the net profit to a high margin (Gupta et al, 2016).
How information will be used by Infosys and how they got the information to determine what would be the best option for their customers
Email and customer contact forms is one of the most valuable ways to gather customer feedback. Moreover there are lots of ways to improve the way customers react out through email to maximize the channel effectiveness, and all these will make a better experience for customers too. Introduction of “we will get back to you soon” will run for a long way to get customers feedback. Similarly, when customer logs in via email will be a better chance for the company to inquire what problems they are struggling with via auto reply mail on behalf of the company (Gupta et al, 2016).
What steps should be followed by the company, if customers are unhappy with the set legislation
If customers are unhappy with the companies’ legislation, then they will be notified by the organization that if any loss or theft occurred regarding their password, emails, privacy and payments made through them will not covered any kind of return or refundable (Sasidharan and Chandra, 2014). Moreover the company is not liable for any misshapenness with the customers. Similarly if any legislation is hampering their aspect, then company will revise their policies and further modifications will be done without breaking the companies’ rules and aspects in any field (Gupta et al, 2016).
Steps and actions are listed below which should be followed if customer wants to fix their problems outside company’s expertise but within the organizations expertise
Step 01: If customer demands to change the protocol of the website which is in companies’ expertise but outside organization expertise.
Step 02: If they want a change in the system process, then company will hire expertise from outside to resolve those matters. As, it comes under outside company expertise.
Step 03: If any changes to be made based on the feedback of the customers, which does not comes under company expertise, then its the duty of the managing board to manage expertise from other recourse to solve the queries as soon as possible (Sasidharan and Chandra, 2014).
Steps and actions are listed below which should be followed if customer wants to fix their problems inside company’s expertise but outside the organizations expertise
With regards on behalf of the company, if problems faced by the customers are within the company’s expertise, then it would be resolved as soon as possible. On the other hand if the problems are outside companies expertise, then company is liable to hire or intent expert from outside source to solve problems faced by the customers (Garimella et al., 2015).

Conclusion


The companies and banks also need to develop their software and maintain the securities of the software to keep all the account related documents safe. A good antivirus or total securities should be installed in the every professional computer to keep the all document clean. The people should avoid the hyperlinks added in the social network or other websites so the people should think twice before the clicking hyperlinks