This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

BAB_SUSH_SATH_REPLIES

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

 

 

 

 

 

 

 

 

 

 

BAB_SUSH_SATH_REPLIES

Name:

Date:

Institution:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Reply to Surbhi

The arguments by Surbhi are entirely true; the author emphasizes the importance of digital information security just as much as physical security. Further, the author argues that in order to ensure proper digital security, different digital resources would require customized treatment according to their individual needs. These individual needs are useful to break down frameworks and different resources that are to be ensured and ought to be set, and it will be defended dependent on this need. Most importantly, I agree to a larger extent with the author that in the context of an organization, it is necessary to prepare the users and employees about digital security and what to do in case of breaches (Sun et al.,  2019). Additionally, an IT director within an organization should ensure proper tools, technologies, human resources, and policies that will be able to help provide digital security.

 

Reply to Vijay

Vijay makes very interesting arguments about cybersecurity risk management. According to the other, just like in any risk management process, cybersecurity risk management should include identification of risks, vulnerabilities, administration actions, solutions, and to ensure digital security. The aspects of continuous monitoring and considering cybersecurity risks as any other business risks are important. Additionally, employing the latest technology, tools, human resources, and appropriate policies will ensure that the business IT infrastructure and sensitive information are well protected from breaches (Sun et al.,  2019). Further, Vijay asserts that a good manager should ensure that the users are well educated and informed n regard to the threat set and the remedial measures incase an attempt or a breach is detected.

 

Reply to Megha

I would concur with Megha about the ever-evolving enterprise networks that the technologies, including the internet of things (IoT), location-based services, and cloud computing, are critical. IoT technology is important for the interconnectivity of devices in an organization conveniently without geographical limits. Some corporations depend on on-location services for delivery of goods or pickup and the dropping of consumers. Cloud computing, on the other hand, helped organizations in choosing the best from a myriad of services available on the cloud as per their needs. However, it is important to note that cloud computing technology helps reduce overheads as companies save on hardware, human resource, and software expenses (Ray,  2018).

 

Reply to Shreeya

Indeed as Shreeya argues, the global trend has witnessed an evolution of networking and hardware. New concepts like machine learning (ML), artificial intelligence (AI), WI-FI 6, and AAA security framework are key to deploying the enterprise network. I couldn’t agree with Shreeya more that the triple-A concept of Authentication, Authorization, and Accounting model is considerably significant in enterprise design following a hierarchical architecture. Also, AI and ML have been instrumental for data prediction based on gathered data from the intelligent actions within the network. I also concur that Wi-Fi will be the next big thing as it will increase the speed of the current Wi-Fi. In this regard, these technologies will help revolutionize enterprise networks.

 

Reply to Shiv

Indeed the customer relationship management (CRM) is a powerful tool, as argued by the author. The Customer Relationship Management software that integrates customer databases into specific folders that describe the customers affiliated to a company. CRM allows a company to categorize their customers based on defining professional characteristics. For example, companies can describe clients’ purchasing power from their past trends, demographics, tastes, preferences, and communication with the customers. Another important software is the network is the collaborative and messaging app. I agree with Shiv that this technology would ne important employees often communicate with each other

Reply to Mamatha

Manatha makes an important assertion concerning how the business world can leverage emerging technologies to enhance its operation. For instance, the mention of machine learning electronic commerce will be useful in business production. The concept of IoT is also essential; as mentioned, it is important in connecting the physical and the digital business world. Another important argument is on the role of video gaming. I agree about the use of this technology by companies for marketing and advertising purpose to help the company gain insight bout customer need and preferences.

Further, touch commerce is also very useful. In the age of mobile phones, consumers can shop and purchase products online. These technologies, therefore, are relevant in improving productivity and enhance sales making businesses more competitive in the market (Ray, 2018)

 

 

Reply to Tanuj

Tanuj’s arguments are factual. The author stresses the need to protect the company against cyberattacks because it could cripple operations leading to extensive damages (Cherdantseva et al., 2018). The company can employ a raft of activities, including educating users in regard to awareness of the cyber attacks as well as the measures taken under such circumstances. Second, the systems. Hardware, as well as software, should be well protected using the latest technology and tool. Where updates or patching are necessary, it is important to carry out such activities without delay. An important point o add is that it is imperative to escalate an attempt or an attack as soon as it is noticed for appropriate urgent action (Cherdantseva et al., 2018).

Reply to Priyanka

This post delves into the process of risk assessment in relation to the cybersecurity risk process. I could not agree with more with the fact that risk assessment approaches can be used to manage cybersecurity risks. The arguments regarding the risk assessment process is entirely true. Risk management constitutes risk assessment and evaluation. These activities can be performed either qualitatively or quantitatively (Badwan et al., 2017). As argued by the author, the qualitative approach offers recommendations of the risk. Quantitative approaches, on the other hand, deals with numerical values which form a basis for cost-benefit analysis, just like Risk Management helps in minimizing the loss that can occur due to a potential problem that occurs. Cyber Security assessment and evaluation involved th use of tools and technology for detecting, preventing, and monitoring various threats ( Aazam, Zeadally, & Harras, 2018).

 

Reply to Manasa

The roles of high-speed internet and cloud computing to corporations is critical. According to the author, cloud computing will help companies access data and application conveniently without the need to purchase. Further, the action also points out that, contrarily, Cyber Security is the use of tools and technology for detecting, preventing, and monitoring various threats (Cherdantseva et al., 2018).

 

Reply to Kiran

Kiram demonstrates the changing landscape in regard t software, and software products show that there is a shift from hardware (Millán, 2020). According to the development of software development. With technologies like high-speed WI-FI, SD_WAN, cloud computing. I agree that cloud computing resources are useful in availing of the needed technological reducing hardware and software expenses (Gordeychik et al., 2016). The SD-WAN offers the future networks a hope by allowing the customization of the bandwidth and connectivity. Another fact is that High-speed wifi like 5G will be able to connect devices across all network nodes. Important to mention should be the danders of these technologies.

 

 

 

References

 

Aazam, M., Zeadally, S., & Harris, K. A. (2018). Fog computing architecture, evaluation, and future research directions. IEEE Communications Magazine, 56(5), 46-52.

 

Badwan, J. J., Al Shobaki, M. J., Naser, S. S. A., & Amuna, Y. M. A. (2017). Adopting technology for customer relationship management in higher educational institutions.

 

Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016). A review of cybersecurity risk assessment methods for SCADA systems. Computers & Security, 56, 1-27.

 

Gordeychik, S., Kolegov, D., & Nikolaev, A. (2018). SD-WAN Internet Census. arXiv preprint arXiv:1808.09027.

 

 

Millán, V. M. L. (2020). Software-Defined Networking: An Architectural Enabler for the IoT. In Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (pp. 1-27). IGI Global.

 

Sun, N., Zhang, J., Rimba, P., Gao, S., Zhang, L. Y., & Xiang, Y. (2018). Data-driven cybersecurity incident prediction: A survey. IEEE Communications Surveys & Tutorials, 21(2), 1744-1772.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask