Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Case Study on Smart Technologies related to security

Category: Computer Sciences Paper Type: Case Study Writing Reference: HARVARD Words: 1850

Scope of the project of Smart Technologies related to security

Security is the basic need of every person these days. With the advancement of technology, increase of threats are also increasing. Every company is motivated to do certain things and many of them become successful in no time. This is not the point here, the success makes every other person jealous and they start thinking negative about the struggling company. Rival companies start making plans to hurt them and make their name bad in the market through all possible means. Here the basic thing which is required is the need of a proper security system that can not only make the company safe but also the employees working in it. Obviously every company should know a very first thing that how and through which means proper security can be given to their employees. Here in this case, the scope is to design a proper basic security plan that not only works for certain time period but can work for a long time duration. Stakeholders of this project are the employees themselves because they live inside the building of a company and they can better tell where the security lacks and what the areas of improvement are.

Risk Identification and Mitigation plan by using SWOT analysis

In security purpose or to make security even better, the very first thing which is being required is the problem area. Look for the things which other person can take advantage of. In a company or a specific building where any kind of the office is located, I believe only alarm systems are being installed at the entrance or Guard is giving the duty to have a look on the people who are going in our out. But here I believe that this is not the complete security system, a proper security related team should be hired which can manage or observe all such things. If it’s not possible then different devices are easily available like Smart Technologies through which one can check all the basic security related issues or whatever happens in a specific place.

Some of the common Security Related Risks of Smart Technologies related to security

1.      Hacking of data or Cybercrime is one of the biggest security related issue. Any hacker can sneak into the system and can have an access of all the personal or private data without even letting anyone know at all. Cybersecurity is being used for the protection of data as we have learnt by now, but here is the big major drawback that only large organizations are using it as they are more concerned towards the security and privacy. They are afraid of hacking. Here I would like to suggest that small organizations should also apply this or use this security measure. It has made the lives easy of everyone as hackers can’t hack any important think through the internet. viruses are phishing are two main things which are seen these days and many people complain about it as well, this cybersecurity is not helpful for the privacy and stop hackers from hacking but it is also helpful in letting viruses come in to the device and destroy the important data.

2.      Technological Disaster is another security related issue and can take place anywhere and at any moment. No one have a control on this thing as this is technological related. But it doesn’t mean to leave it just the way it is without making it right. Different Engineers should be a part of the team to have a check on the systems at regular intervals to know about any kind of the default in the system or anything like this. This can be of much help to prevent incidents in the future times.

3.      Malicious attack is another kind of hacking method through which virus can be left in the system which can copy everything and can send to the person who did this hacking. This can also be controlled with the help of cybersecurity and can make everything safe and sound.

4.      Security and privacy regulations is one of the most threatening issue these days and it needs to be stopped. Anyone can sneak in to the office or company and cause much harm to the employees and system as well. The interest of many people around smart technology has risen greatly since the last decade and still, many people eagerly want to know about this technology. If we talk about the past years, such machines and their development used to be strictly for the high-value industries and people couldn’t even think of installing them at companies. But as it is seen that smart technology is among them and it is on the verge of becoming embedded deeply in the company of every individual. These days, smart companies are almost similar to our smartphones which is in the hands of every person and they are a source of natural transition in the current climate of technology. Helping an individual to control or set the particular temperature of their cabin or main hall from anywhere in the world is an example that how technology is helping to create ease and convenience for the employees. Smart technology is an environmentally friendly choice taken by different people and making this thing sure that energy is not being wasted like the previous times and it has been done only because of the smart technology as an individual can turn the light on or off while sitting anywhere whether in the house or outside.

When this smart technology was introduced, many of the employees and common people were not well aware of its use and they also had difficulty in using it but as time started passing people got to know about its use and now they know about its use properly. Cameras and smart speakers both of them are the few examples of this technology, it gives the convenience of having a look in the certain areas or listening to different voices to the owner if he or she is outside and someone tries to sneak in or even tries to steal something in the office too.

Smart technology is a device that is being installed anywhere in the company and then any individual can track different things, monitor them and can also control different appliances just with the help of using a smartphone. All these appliances are connected with the internet and they are being communicated with the app of smart technology which is being installed in the mob or laptop. It is not necessary to install this technology only for a reason when an individual goes out and want to look at the monitor safety. But staying in the same office, at times it becomes really important to have a check on other employees or what is happening around the office that what are they doing or in what kind of activities they are involved in. So, different senior employees or security related people can easily check on the different employees while staying in their room and even letting other employees know.

Smart technologies include variety of monitors, sensors and different devices which are connected with one another and then works together as well to make sure that automation is being enabled with the help of remote control. Different sensors are available in all these appliances which help to detect the certain conditions in environment like humidity. This controlling function is provided by the software which is present on the computing devices like tablets or smartphones etc. all these smart technologies are connected wirelessly by the use of standard communication methods. Their demand is increasing day after day, they are being used professionally. 

Every owner of the company wants to make sure that their company is safe and this security is one of the biggest draws towards the automation, on an average people, are investing approximately 47 billion dollars on the security and it clearly shows that people are conscious towards their security. People want to have peace of mind while working in the company.

SWOT Analysis of Smart Technologies related to security

SWOT stands for Strength, weakness, opportunities and threats and this SWOT analysis is a kind of technique that helps in the assessing of all these four aspects of a company or business. Through this analysis one can know about the strengths and weakness both of their company and can manage them accordingly with the passage of time or analyzing them. Every owner is keen towards writing or telling about the strength of their company but when the time comes for the weakness no one really cares and they don’t write them honestly. So in this analysis, everything needs to be written accordingly and honestly for the betterment of their company.

Threat is not just a word but it includes all those things that can negatively affect the business or any company through the outside source. Before planning, always make sure to think about the obstacles and hurdles one can face. Evolvement in the technology is forever a threat as well as an opportunity so one should think wisely before using it. Always try to know what the competitors are trying to do or what are they up to.

Conclusion of Smart Technologies related to security

Security is not just the outside protection but it also refers to the security of data and systems. Both kind of securities are equally important and they need to be managed accordingly. Knowing about the security risks and how to deal with them can be of much ease to many of the owners as they become fail to identify the problem statement all of a sudden. Before losing something big or having any of the major loss, it’s better to take all the safety and security measures as soon as possible. This will not only help in the protection but obviously can be much helpful to save the owner from any kind of the major loss. Different issues have been discussed in the report along with the precautions which should be used.

References of Smart Technologies related to security:

Vakilinia, I., Tosh, D.K. and Sengupta, S., 2017, July. Privacy-preserving cybersecurity information exchange mechanism. In 2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) (pp. 1-7). IEEE.

Heidenreich, J., 2015. The privacy issues presented by the cybersecurity information sharing act. NDL Rev., 91, p.395.

Arimatsu, L., 2012, June. A treaty for governing cyber-weapons: Potential benefits and practical limitations. In 2012 4th international conference on cyber conflict (CYCON 2012) (pp. 1-19). IEEE.

ULLEN, K. & MORAN, R. (1992). Technology and the Elderly. European Commission (Science and technology policy EUR 14419 EN) ISBN 92 826 4826 5

Peace, S. and Holland, C., 2001. Homely residential care: a contradiction in terms?. Journal of Social Policy, 30(3), pp.393-410.

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Supreme Essay Writer

ONLINE

Supreme Essay Writer

1890 Orders Completed

Top Quality Assignments

ONLINE

Top Quality Assignments

1071 Orders Completed

Unique Academic Solutions

ONLINE

Unique Academic Solutions

6510 Orders Completed