Technology Management Framework – Gregory’s Five-Process Model

The Gregory’s five-process frame work is an important technology management model, which has been proposed in 1995 by M. J. Gregory. This process has been built based on previous work on technology management. There are several elements have been identified previously link to the technology management within organizations. Competence and capability are important to be analyzed within the organization to understand the strength and weakness. They also reflect how well the organization can satisfy the customers and how fast the organization may response the market. According to this analysis, the company can identify the suitable technology strategy. Organization learning is also widely used concept in technology management. R&D development and new product introduction are the processes which technology is applied in. Innovation activities are taken to deliver the customer satisfaction. However, there is no agreed framework for technology management has been proposed. Based on the literature research on previous workContinue reading

What is Cryptography and Its Types?

Cryptography is defined as hiding the message to make it secret using scrambled codes. It allows the date to be changed into a code that is not legal for not permitted person and it needs to be converted back to its original message for it to become readable. Encryption and decryption are the process of cryptography. Encryption is when the readable text is converted into coded text while the decryption is where the coded text is converted into readable text. There are numerous types of cryptography but the symmetric and asymmetric key cryptography is the most used technique. 1. Symmetric-key Cryptography Symmetric-key Cryptography is also known as the private key cryptography. It is the oldest and well-known technique of cryptography. This method is simple which only requires each computer that has a code that will be encrypted by an encryption software into packets of data before it is sent acrossContinue reading

Disaster Recovery Plan (DRP) in Business

Fire, flood, earthquake and accidental deletion of data are all acts that can cause disastrous consequences on data. Such disasters can prevent the network from operating normally, which in turn can hamper the organisation’s business. These disasters can be classified into man-made disasters and environmental disasters. Man-made disasters are intentionally or unintentionally caused by humans. For example, a user accidentally deletes the data, virus and malicious programs can damage data and various other events can cause data loss and downtime. Environmental disasters are non-preventive but can be reduced if appropriate precautions are taken. Environmental disasters include fire, flood, earthquake, tornado and hurricane. Disaster recovery deals with recovery of data that is damaged due to destructive activities. The time required to recover from a disaster depends on the disaster recovery plan implemented by the organisation. A good disaster recovery plan can prevent an organisation from any type of disruption. Disaster RecoveryContinue reading

Security Issues of Cloud Computing and Countermeasures

Along with the rapid development of information technology, all the organizations are seeking unique ways of driving their businesses forward, and the responsibility to manage these increasing demands is now placed on computer networks to provide a competitive edge and create new opportunities at reduced cost with efficient service. This has accelerated all the business and technological initiatives that promise to provide these services at the comparably low infrastructure and operating costs. A fine example of this scenario is the rapid growth of cloud computing. Cloud Computing, often referred to as simply “the cloud”, is a distributed architecture that centralizes server resources on a scalable platform, enabling ubiquitous access to configurable resources and services. It provides storage and access for data over the internet instead of our computer’s hard drive. Leveraging the Internet, it provides unparalleled and distributed services based on virtualization and service-oriented architecture. Cloud is not another recentContinue reading

Classification of Security Threats in Information Systems

As use of internet and related telecommunications technologies and systems has become pervasive, use of these networks now creates a new vulnerability for organizations or companies. These networks can be infiltrated or subverted a number of ways. As a result, organizations or companies will faced threats that affect and vulnerable to information system security. Threats to information system can come from a variety of places inside and external to an organizations or companies. In order to secure system and information, each company or organization should analyze the types of threats that will be faced and how the threats affect information system security. Examples of threats such as unauthorized access (hacker and cracker), computer viruses, theft, sabotage, vandalism and accidents. Unauthorized Access (Hacker and Cracker): One of the most common security risks in relation to computerized information systems is the danger of unauthorized access to confidential data. The main concern comesContinue reading

The Five Phases of Ethical Hacking

It is debatable, if hacking can be ethical or not, the term “Hacking” over time has been associated with destructive activity. These are some of the terms used in the context of hacking which provides better clarity, Hacker is somebody who enjoys learning hacking for a defensive purpose; an ethical hacker is the security professional who exercises his skills for a defensive purpose. The term Cracker refers to a person who uses his hacking skills for destructive purpose. The ethical question here is in regard to the physical activity of hacking which is sometimes hard to differentiate from cracking. The main difference being, Ethical hacker just identifies vulnerabilities and does not exploit them unlike a cracker. Ethical hacking is the process adopted by ethical hackers to discover the vulnerabilities existing in information systems operating environments. With the growth of internet, computer security has become a major concern for business. OrganizationsContinue reading