IT Security and Threats in the Modern World Assignment Help
Today the business of IT sectors increase rapidly in the
world and it also a key driver of global economic growth. The main function of
an information technology is to develop the software and hardware basically
based on computer (Chepkoech, 2017). The other main function of the IT sectors
is design, development and implementation of the Information technology and
management system. The IT industry also helps the other servicing and manufacturing
sectors to grow.
Objective
of the Project
The main objective of the project is to control and prevent
the hacker and maintain the proper security. There are more than 100,000 known
viruses present in the cyber world and these viruses are able to delete and
transfer all the data or information in a small time from one computer to other.
The information is the main asset of the company. Without any information the
companies feel a blank with a view to the documentation (Chepkoech, 2017). Most
of the companies, banks, marketing sectors are stored their data or information
in the virtual memory or a software that why the companies need to maintain the
hard securities in the software. The other main objective is to prevent the
sudden breakdown of the computer website. The breakdown of the website also
hampers the update of notice and other issues that also affect the customer of
the company.
Identification of IT networking related Problems
There are different types of issues and problems arise in the
Information Technology (IT) industries are: 1) the crashing or breakdown of the
company website and 2) the hacking of the total company software (Thangamani et
al., 2017).
The
Crashing or Breakdown of the Company Website
Most of the major website is not accessible to people across
the world because the internet’s infrastructure said that it was under attack.
Now the cyber attack is one of the major problems in the world. All the economy
and balance of data can be hampered for the crashing of website (Corrigan, 2017).
There are different steps that can also prevent the hackers
and to maintain the company website. The company needs to keep the daily backup
of the documents and keep all the software up to date. The company should need
a daily basic check on the server.
Types
of Customer in Cognizant
Cognizant is one of the biggest IT Company in the world. The
Cognizant has different types of clients. The main work of that company is to
design, build and scale meaningful experience and that company also provides
the digital operation of the business and simplifies, modernize and secure the work
of the clients (Roberson,
Buonocore and Yearwood, 2017). The Cognizant serves the top clients across
the different sectors such as Banking, insurance, healthcare, financial services,
manufacturing, life sciences, retails, information, media and entertainment,
etc.
Understand
the Customer Specific Needs
To start an IT business the company should know the customer
needs. The good customer research is needed to convince the customer about the
product and further customer research also helps to develop a more detailed
picture of your customer. There are different types of problem facing by the
worker regarding customer (Folta,
Lockton and Bowden, 2017). Sometimes the customer is not satisfied with
the services or products of the company. The system administrator of
information technology sectors are works in diverse environment including
internet service provider, network operation centers and data centers. When a
customer will see that the software of Cognizant is hacked by the hackers the
clients will perform a negative reaction to the company (Potter, 2016). They will be tensed about
their valuable information stored in the cloud.
Services
offered by the Cognizant
There are different services offered by the Cognizant are-1)
Digital business solutions.
2) Managing the business with Digital Operations and 3) Simplifying, modernizing and securing the IT structure and application that are the main component of the clients business (Potter, 2016).
2) Managing the business with Digital Operations and 3) Simplifying, modernizing and securing the IT structure and application that are the main component of the clients business (Potter, 2016).
Digital
Business Solutions
The Cognizant digital business solutions also help the client
company to engage the customer by innovative plans and projects of the
business. This company also gives the strategies to maintain the business and
to generate new growth and real economic value (Roberson, Buonocore and Yearwood, 2017). This company
also begins with data science and knowledge of your industries most important
processes and also collaborates with the clients to inspire intelligent
products, better strategies to engaging more customers in the company.
Managing
the Business with Digital Operations
The cognizant also offer the digital software by which a
manager of a company can execute all the business plans from the software
digitally. The back office process closure to the customer with the help of
cloud based platforms that employ business process as a service solution (Potter, 2016). This digital
process also helps to the companies to differentiate their brands from the
other companies.
Simplifying,
Modernizing and Securing the IT Structure and Application
Digitization is creating swift and better changes across the
all industries. The processing of business through the digital application is
also easier for the employees of the organization (Folta, Lockton and Bowden, 2017). The modernizing of
the application, platforms and websites also helps the clients to keep their
data up to date. The data securities are the more important for every company.
The Cognizant also helps the client to maintain the proper security in the
private cloud storage as well as it also help to prevent the cyber threats.
Services
That Don’t Offered by Cognizant
The Cognizant cannot offer any protection against the
Ransomware or other updated malware. The Cognizant can’t give any lost
documents if the Client shares the password with the others. The cognizant do
not provide any financial support to the clients in case the lost of any
documents (Folta, Lockton and
Bowden, 2017).
Legislation
That Make a Customer Aware
The consumer legislation covers the warranties and the
condition of sell (Talbot, 2016).
That law also covers the product and product safety standard, Provision of
accurate information to the consumers. There is different legislation that make
the company aware are-
Security
of Data or Information
The company knows that how much data is essential for the
client they can offer commensurate value in return of the data. Making the
exchange transparent also help to maintain a good relation between company and
clients (Talbot, 2016). The
client should keep all the data keep safely with the password. The client
should not share the password or usernames with other.
Transparency
and Trust
All the confidential documents and information should be
stored in the locked file only accessible for those who have the business. All
electronic confidential data or information should be protected by the
encryption, firewall and password (Talbot,
2016). These processes also make a customer aware.
Cognizant’s
Professional Knowledge to Help the Clients
There are thousands of
professional people are attached with the Cognizant that also help their client
to share their knowledge and other benefits (Prasad, 2016). The professional employees of
Cognizant also give the client a second choice for the security of their
valuable information.
Information
Used By the Cognizant to Help the Client
There are different types of information is used the
Cognizant to help their clients. Cognizant also give the digitalized business
opportunity as well as all the presentation, outline diagram or project of a
company. There are so many resource person work at cognizant they help to
gather the information from the different various sources (Lopez et al., 2016).
Dealing
the Unsatisfied Customer
There are different ways to deal the unsatisfied customer. At
first the company listen the whole problems of the customer. Then they take
them seriously and verify the problems during verify the problems they stay
calm. The calming approach also helps the client stay calm too. Then the
employees solve the problems of the client (Fakharany, Company and Jodar, 2016). If the cognizant
unable to solve the problem they apologize gracefully.
Solving
the Customer’s Problems within the Organization Expertise
If there is an expertise people present in the Cognizant who
can easily solve the problem. The Company will fix the problems of the clients
as soon as possible by using its resources (Prasad, 2016).
Solving
the Customer’s Problems outside the Organization’s Expertise
I there is no expertise people present I the company to fix a
problem showed by the customer then Cognizant hire the expertise people or
consultancy to fix this problem as soon as possible to satisfy the customer (Fakharany, Company and Jodar, 2016).
The Cognizant will also appoint some expertise staffs to fix the similar
problems in future.
How
to Know That the Provided Information Is Up To Date and Accurate
The Cognizant always keep the information and software up to
date and the company always use the best tools or kits to fix the problems. The
company also reviews the information before giving it to the clients (Lopez et al., 2016).
Hacking
of Software or Spread Ransomware
Ransomware is one kind of malware software that block the
access of data or serious information and giving threat to publish the
information in public or delete the data until the ransom or money is paid. The
lost of information also hamper the economy of the company as well as it will
hamper the customer satisfaction (Corrigan, 2017). Not only the companies the
customer are equally affected by the hackers. Some of the ATM card holders also
lost their money by sharing their ATM card numbers with the unknown person and
the other personal information (Corrigan, 2017).
Customer specific needs
regarding website breakdown
A customer wants to minimize the single
points of failure and broken hardware is replaced as soon as possible (Gudipati, et al., 2013). On the other hand they also want if, it is possible to connect
servers to multiple switches as it helps to replace a broken switch with
another which has a the same configuration and to set up a spare switch with an
appropriate basic configuration in advance to simply replace the hardware to
restore connectivity. To maintain power issues as it is important to have to
components to provide backup for each other connected to different power
circuits, so that if one circuit goes down, the other will back up (Gudipati, et al., 2013). Moreover using of same vendor and software version for everything
will omit additional complexity. On the other hand customers’ data should be
encrypted during making payments or other transactions made through e-commerce
site (Garimella et al., 2015).
Services
offered to the customers to avoid website breakdown
There should be clear sense of what the
company is offering because consumers will not contact the company directly for
the missing product information rather they will directly move on to the
competitor (Garimella et al., 2015).
Similarly, contact information, including a phone number and physical location
because some of the customers prefer to do all of their business online either
publishing their address or phone number while those who are operating from
home rather than work place are also worried in giving a street address or
hometown which will somehow hinder them (Garimella et al., 2015). On the other hand, third party
validation is also preferred as because sometime, they want to know with whom
they are doing business and what are the customers current experience regarding
the matters. Similarly, SSL is also important as it helps to protect the
privacy of data exchange between customers and the website. On the other hand
use of navigation also matters a lot because the things that can’t be found
will be easier for the customers to navigate and find the required information
they are willing to (Garimella et
al., 2015).
Services
that would not be offered to the customers
The company should avoid or rectify faults,
errors or discards in network devices. The configuration of devices should be
change, there should be no operational human errors and omit out mismanagement
of devices. Similarly, there should be regular checks on link failure that are
caused due to fiber cable cuts or network congestion (Garimella et al., 2015). On
the other hand, there must be sufficient power supply to avoid power outages as
well as maintenance in server hardware failure. There should be proper
restrictions in gateway to block security attacks, such as denial of service
(DoS). There must be process, in avoiding failed software and firmware upgrade
or patches. On the other hand, incompatibility between firmware and hardware
devices must be rectified (Garimella
et al., 2015).
Legislation
made for the customers tom make them aware and the affect of this to the
customers
Account and registration Details: Customers
should agree upon the information provided by the company upon registration and
all other times will be true, accurate, current and complete. On the other
hand, customers should also agree that they will ensure that the information is
kept accurate and up-to-date all the times they proceed (Sasidharan and Chandra, 2014). Similarly, if they have any reason to believe that the account is no
longer secure, in case of loss, theft or unauthorized use, then customers agree
to notify Infosys for the breakdown cause. This will help customers to rely on
the company as well as trust which will make them to merge with the company (Sasidharan and Chandra, 2014).
How
Infosys would use their professional knowledge to help customers to make their
best choice. If more than one option is prescribed then options would be
described
Marketing would be the first step to be
focused, because a trained and professional marketing graduate can identify
customers’ behaviours and their needs (Gupta et
al, 2016). Features could be converted into
benefits, because it is easy to identify features, as they are written on the
packaging or on the product itself. Similarly, there must be add on for the
customers as, it gives product details and knowledge that are offered by the
company, and it also increase the net profit to a high margin (Gupta et al, 2016).
How
information will be used by Infosys and how they got the information to
determine what would be the best option for their customers
Email and customer contact forms is one of
the most valuable ways to gather customer feedback. Moreover there are lots of
ways to improve the way customers react out through email to maximize the
channel effectiveness, and all these will make a better experience for
customers too. Introduction of “we will get back to you soon” will run for a
long way to get customers feedback. Similarly, when customer logs in via email
will be a better chance for the company to inquire what problems they are
struggling with via auto reply mail on behalf of the company (Gupta et al, 2016).
What
steps should be followed by the company, if customers are unhappy with the set
legislation
If customers are unhappy with the
companies’ legislation, then they will be notified by the organization that if
any loss or theft occurred regarding their password, emails, privacy and
payments made through them will not covered any kind of return or refundable (Sasidharan and Chandra, 2014). Moreover the company is not liable for any misshapenness with the
customers. Similarly if any legislation is hampering their aspect, then company
will revise their policies and further modifications will be done without
breaking the companies’ rules and aspects in any field (Gupta et al, 2016).
Steps
and actions are listed below which should be followed if customer wants to fix
their problems outside company’s expertise but within the organizations
expertise
Step 01: If customer demands to change the
protocol of the website which is in companies’ expertise but outside
organization expertise.
Step 02: If they want a change in the
system process, then company will hire expertise from outside to resolve those
matters. As, it comes under outside company expertise.
Step 03: If any changes to be made based on
the feedback of the customers, which does not comes under company expertise,
then its the duty of the managing board to manage expertise from other recourse
to solve the queries as soon as possible (Sasidharan and Chandra, 2014).
Steps
and actions are listed below which should be followed if customer wants to fix
their problems inside company’s expertise but outside the organizations
expertise
With regards on behalf of the company, if
problems faced by the customers are within the company’s expertise, then it
would be resolved as soon as possible. On the other hand if the problems are
outside companies expertise, then company is liable to hire or intent expert
from outside source to solve problems faced by the customers (Garimella et al., 2015).
Conclusion
The companies and banks also need to develop their software
and maintain the securities of the software to keep all the account related
documents safe. A good antivirus or total securities should be installed in the
every professional computer to keep the all document clean. The people should
avoid the hyperlinks added in the social network or other websites so the
people should think twice before the clicking hyperlinks
No comments:
Post a Comment