服务承诺





51Due提供Essay,Paper,Report,Assignment等学科作业的代写与辅导,同时涵盖Personal Statement,转学申请等留学文书代写。




私人订制你的未来职场 世界名企,高端行业岗位等 在新的起点上实现更高水平的发展




企业先进的信息管理技术--悉尼Assignment代写范文
2016-12-22 来源: 51Due教员组 类别: 更多范文
悉尼Assignment代写范文:“企业先进的信息管理技术”,这篇论文主要描述的是在现代的商业环境当中,企业需要采用现金的信息管理技术,来保护企业信息系统的安全,减少间谍软件对企业信息安全的威胁,间谍软件会自动记录和监控用户的数据,如果不进行预防,那么企业的数据和私隐将可能遭到侵犯,当然间谍软件也并不是没有积极作用,间谍软件也能够促进企业的发展。
1.0 Executive Summary执行摘要
The purpose of this report is to introduce the spyware and its relevance with modern business. Spyware involves programs that could furtively record and monitor the user’s data.
The spyware could undermine the performance of a business through external invasion. It might comprise company data, invasion of privacy, interfere with marketing process, remove primary freeware, and cause bandwidth consumption. Nonetheless, the spyware could also play a positive role in the growth of a business. It would facilitate the communication between the company and its consumers.
All in all, on the one hand, modern organizations could take some effective measures to avoid the attack of spyware. On the other hand, when employing spyware, organizations should pay attention to the privacy issues, as well as balance the invasion of privacy and their employees’ performance.
2.0 Definition of Spyware 间谍软件的定制
The increasing hazards faced by Internet users are problems of security and privacy. Different from direct attacks of viruses, these threats are indirect penetration of monitoring programs installed without users’ knowledge (Stafford and Urbaczewski, 2004). Spyware is defined as programs that (1) supervise the activities of a computer user, (2) capture data related to the user, as well as (3) store the information and divulge it to a third party (Ames, 2004). It involves Adware, Key Loggers as well as Trojan Horses (Stafford and Urbaczewski, 2004). According to a report from Microsoft (2004), it affected over 50% of Windows operating system failures. Furthermore, Moshchuk et al. (2005) found out that spyware existed in 13.4% of the 21,200 executables in their study, and ‘drive-by download’ attacks took up 5.9% of the Web pages. However, some companies introduce spyware to the commercial use. It not only plays a critical role in the interpretation of their customers, but also can supervise the behaviors of their employees. Therefore, although it is a newly emerging phenomenon, spyware exerts immediate and extensive influence on the Internet community, whether threatening security or facilitating business functions.
3.0 Overview of Spyware 间谍软件的概述
Spyware was first found around the late 1990s. The term ‘spyware’ came out in October 1995, and were referred as tiny, hidden cameras (Lava Soft, n.d.). Elf Bowling was one of the early programs of spyware. It first appeared during the Christmas holiday in 1999, in the form of a silly free game. However, it actually stole and reported personal information to its developers (Tuneup Adviser, n.d.). In the same year, Steven Gibson detected suspicious advertising software on his computer and developed the first ant-spyware, OptOut. Since then, more types of spyware emerged, with more complex forms and leading to more complex solutions.
Individuals or organizations use spyware to find out the computing habit of another individual. According to Ames (2004), there are three levels of spyware. The first level concerns basic cookies. They allow the site to identify the user when he/she revisit, and they also permit an association between the user and data he/she provided before. Since these cookies would be convenient for users, they are considered as low risky ones. The second level involves associated cookies. They track users’ activity and note down users’ interaction with their member sites. These data would be shared with a third party, while users would be unaware of the whole process. The third level of spyware is on the basis of application, which will cause severe security problems and risk. Users generally fail to limit application-based spyware. It can implement upgrades, install other applications and produce advertising without the authorization of users. As a result, the last two levels of spyware would cause security issues.
Spyware can be adopted for commercial destinations. Business can apply it to gather consumer data (Foster, 2002), which is especially prevalent in the e-commerce circles. Some business can recommend new software features by offering an active spyware-like application on consumer computers (Anonymous, 2004). However, hackers use spyware to realize their attacks and deliver deferred spam (Stafford and Urbaczewski, 2004). In addition, they would employ spyware to steal information of identity. The illegal application of spyware would infringe privacy and appropriate personal information furtively. Worse more, spyware combined backdoor Trojan spammers would attack a computer or web server, and make it to deliver e-mail for them (Hinde, 2004).
4.0 Relevance to the Modern Business 与现代企业的相关性
As for modern business, there are contrast views on the commercial use of spyware. One stand is to view spyware as an extensive variety of computer programs installed on consumers’ computers and covertly link to external web sites to report private information to third parties (Berman, 2004). These programs lack transparency and do not respect user’s right to manage their own computer and Internet links. Nonetheless, the opposite view stands that spyware issues are on the behavioral level rather than on the technological level (Holleyman, 2004). Based on this view, spyware becomes tools for business to provide more effective service to consumers.
Microsoft Windows Update? process is the type of spyware seeking to provide better service. It endeavors to ameliorate diverse Microsoft applications through an Internet link to Microsoft servers. However, users would not aware of the communication between their computers and Microsoft servers until the message of ‘update available’ appears. Since this process openly seeks authorization for installation, it is different from the malevolent spyware applications. Besides, many companies adopt reporting software to obtain users habit. A typical example is Google, who successfully exploits user data for commercial goals (Wildstrom, 2004). The Google Toolbar? involves an installation of reporting function. It would record users’ Internet browsing, assisting it to offer a more individualized service.
Besides, some companies employ spyware to monitor their employees’ online behaviors. The SAT serves as a typical example. As documented in the TSA contract, to prevent an internal threat, this company requires technology to supervise and attain visibility into employees’ actions (Watson, 2012). It installs an enterprise insider threat software package to monitor their employees through emails, history URLs, and even the trace of keystrokes. Its active spy on its own employees would lead to the infringement of employees’ privacy. Despite of such furtive spying, some company adopts the spyware with notifying their employees. VANCL, a fast fashion retailer in China, employ openly spyware on its employees. By doing so, it wants to regulate the employees’ behavior and make them more focus on their work.
Apart from its function for commercial use, spyware also stands for a security threat to modern businesses. It could comprise company data, invasion of privacy, interfere with marketing process, remove primary freeware, and cause bandwidth consumption (Shaw, 2003). From the link to the Internet, the confidential data of a company is vulnerable for spyware attacks. Possibility is that employees can attain private information from other colleagues or management. URLs on the organization’s Intranet might be reported to the Internet, divulging the company’s key information such as passwords. Spyware could uncover private information of employees, leading to awkward situation for these individuals. Spyware might negatively influence the marketing of a paying advertiser through the surreptitious displacement of its ads by its rivals. Accordingly, the advertising expenditure of the victim is stolen, and the victim cannot ban such behavior since it is covered by the spyware. Moreover, spyware could remove some component necessary free software without the permission of the organization. Although freeware is generally not the core application, such removal might interrupt the business, leading to great loss of the victim organization. Beside, spyware can communicate with a parent websites on the Internet. The data load during the communication would inevitably affect the bandwidth of the organization.
5.0 Conclusions and Recommendations 结论和建议
5.1 Conclusions
Organization should employ technology to control technology, managing and securing computing environment through technology. As such, security will be mirrors of technologies adopted and risk vulnerability of an organization (Hinde, 2004). Many measures can be adopted so that organizations can minimize risk to the threats of spyware. Besides, spyware could also bring advantage to organizations. Using spyware related applications, companies could communicate with their customers and take control of their employees.
51due留学教育原创版权郑重声明:原创留学生作业代写范文源自编辑创作,未经官方许可,网站谢绝转载。对于侵权行为,未经同意的情况下,51Due有权追究法律责任。
51due为留学生提供最好的悉尼Assignment代写服务,亲们可以进入主页了解和获取更多assignment代写范文 提供美国作业代写服务,详情可以咨询我们的客服QQ:800020041哟。-xz
