ITC540 – IT Infrastructure Management : Solution Essays

Question:

1.Ceylon Escapes has many strengths to set up their goals to maintain their position in the high level and achieve a high standard with more investments in IT infrastructure. Using their experienced guides Ceylon Escapes can plan for many excursions targeting Sri Lankan cultural festivals also they can advance the excursions with multiple days providing hotel booking services.

With the strength of many followers and good reputation Ceylon Escapes can plan for a marketing campaign for local customers through social media to attract different target markets. Youth generation is so interest about new vehicles and they can market their 35 vehicles to earn more profit in the industry. With marketing they will be able to run all 35 vehicles everyday with hiring more guides as the demand.

 

2.Business organisations are targeting different target markets to promote the businesses and it is important to identify the purpose of using social media marketing as one of the marketing tools in a company. Without knowing the purpose it is not possible to plan business and marketing plans to work. Some products might need a basic marketing plan that doesn’t need to spend but some product and services might need advanced methods to reach more customers.

Raising the brand awareness is one of the purposes of running a social media campaign and brand is becoming available to potential consumers can enhance the customer’s attention as well. Through social media posting about the product or the brand targeting relevant questions or issues customers might face will be a good way of connecting with customers. Using SMART goals can enhance the techniques of social marketing. SMART describes specific, measurable, achievable, realistic and timely goals.

Enhancing public relations means responding to customers issues or complains in a sensible routine will build the trust between customers and the organizations. This is one of the purposes of using social media marketing. Responding quickly to individually will build the trust and the brand loyalty. Unified social inbox is one of the tools that can be used to engage to improve relationship with customers.  Building community supporters can be done using social media effectively because when organisations have community supporters as followers, they take pictures and videos and share on social media for other users see. This promotes the business and expose to many consumers in real time.   Another most important goals is to increase the traffic for the website. Building links with social media helps to search engine optimization and is it important to have more traffic when selling online.

Answer:

1.Security of data is fundamental part of every organisation thus it is important to keep the data safe and assure the business continues to work normally even after disaster hit the system.  Business depends on the information stored online thus it is necessary to protect the web from all the attacks (Buczak and Guven, 2016).
This includes ensuring the information resources of a business and keeping the data available, confidential and integrated. Business continuity plan helps in bring the system back to the normal condition. Briefly discussing all the three terms.

Cyber security is basically a protection used to protect the hardware and software from various malicious attacks. Cyber is related to group of computers that are connected to form a network via internet these computers store important data and files that need to be secured. Cyber security is protection of these computer networks and the data stored in these computers against hackers (Digitalguardian, 2018).

Cyber security is incomplete without end users. Cyber security is very important to protect the digital data and protecting the data from hackers. Cyber security protects data from unauthorized access and unauthorized modification to maintain integrity and confidentiality. Cyber security is essential for each organisation as it uses set of strategies to maintain the privacy of information. Cyber security acts as a shield for information so that it does not get access by invalid user (Furfaro, et. al, 2016). The fast development of innovation in the market has expanded the danger of cyber security. In an organisation cyber security is vital to ensure the systems which contain private data inside them are protected (Yuasa, et. al, 2017).

2.Business continuity plan guarantees that even after a specific attack business proceeds. It incorporates all conditions that can happen and cause dangers for an organization so making a protective arrangement is necessary (Safa, Solms and Furnell, 2016). Speed of recovery from the misfortune is likewise vital and it depends upon the type of server weather it is hot site or a warm site. Plan must be designed to bring the business to normal condition involves two steps.

First is identifying all the critical points in a business then estimating the number of resources needed to resolve the query then choosing right recovery technique and calculating the funding expected to achieve the objective. Business continuity or disaster recovery plan can also be said as a proactive plan (Wallace and Webber, 2017) . This plan is designed to avoid the occurrence of risk and stop the risk to penetrate in the system and cause future disruption of operations (Graham, et. al, 2016). They provide detail steps to need to be under taken before the disaster and even after the occurrence of disaster to maintain the financial viability of an organization.

Introduction

In today’s era almost all the sensitive data is stored online and the society completely relies on internet for storing information. Thus it is very important to make sure that the networks re security through which communication take place. Cyber security plays a crucial role in this scenario. Cyber security protects the system from network attacks, malicious attacks and from hackers.

In this article the importance of business continuity plan is discussed as it is true many a time’s system crashes due to some bugs. In such case a proper business continuity plan is required to make sure that business work normally and it do not cause any harm to the business.

References

Buczak, A.L. and Guven, E. (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp.1153-1176.

Digitalguardian, (2018). What is Cyber Security[ONLINE]. Available from https://digitalguardian.com/blog/what-cyber-security [Accessed on 30 April 2018]

Furfaro, A., Gallo, T., Garro, A., Saccà, D. and Tundis, A. (2016) Requirements specification of a cloud service for cyber security compliance analysis. In Cloud Computing Technologies and Applications (CloudTech), 2016 2nd International Conference on (pp. 205-212). IEEE.

Graham, J., Olson, R. and Howard, R. eds. (2016) Cyber security essentials. CRC Press.

Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds. (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. 2(2), p.56.

Mattei, M.D. and Satterly, E.  (2016) Integrating Virtualization and Cloud Services into a Multi-Tier, Multi-Location Information System Business Continuity Plan. Journal of Strategic Innovation and Sustainability, 11(2), p.70.

Safa, N.S., Von Solms, R. and Furnell, S.(2016) Information security policy compliance model in organizations. Computers & Security, 56, pp.70-82.

Wallace, M. and Webber, L. (2017) The disaster recovery handbook: A step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. AMACOM Div American Mgmt Assn., pp. 23-89

 

 
 
 

Place your order
(550 words)

Approximate price: $22

Homework help cost calculator

600 words
We'll send you the complete homework by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 customer support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • 4 hour deadline
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 300 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
× How can I help you?