Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Assignment on Benefits of IT Performance Management

Category: Management Paper Type: Assignment Writing Reference: APA Words: 1200

Many organizations now a days use Key Performance Indicators (KPIs) to measure the performance of their IT services. Here are some benefits of Performance management systems:

·         It is to ensure that the IT infrastructure is working in line with the company’s goals

·         Performance metrics helps company in analysing its business process and their effectiveness

·         It also helps in evaluation of achievements and how its effects company’s future goals

·         Performance metrics also helps in allocation and management of resources

·         It can also help in identifying underutilized resources

·         It can also help in forecasting future demand and thus helping in decision making

·         It helps in budgeting and how much budget each department will require

·         It helps in prioritizing tasks

·         It also helps in identifying training needs for employees

·         One of the major benefits of IT performance management is that it helps in mitigating the risks that organization can face

·         IT performance management tools can help in identifying bugs or irregularities in the system that my cause failure

·         It also acts as a management control system by providing metrics about their performance (Juneja, n.d.).

Should Performance Metrics be Copied from other Enterprises?

            Performance metrics are unique to each organization due to uniqueness of their structures and objectives. Enterprises differ in terms of their goals and objectives. Their organizational structures are also different. It is due to these differences we can’t apply same performance metrics into different enterprises. Every enterprise has its metrics according to its objectives. Every organization has its own culture and that demands customized performance evaluation system. Every enterprise has different type of risk factors that are unique to that enterprise. Risk assessment is also different due to that reason. Also, performance metrics are greatly affected by geopolitical and economic situations of the county in which enterprise is performing its operations.

            Each organization goes for a unique business model so that it can distinguish itself from its competitors. Applying same performance metric will create discrepancies and results will not be accurate. Performance metrics should be customized to that particular organization for accurate results. Decision making process requires accurate metrics which cannot be achieved with copying metrics from another enterprise. Products and services offered by enterprises also are also different which emphasizes the use of customized performance management system. We can’t apply performance management system of another enterprise to our enterprise because of our unique goals and objectives. Even if there are similarities, we will need to customize the performance management system according to our organizations operational requirements. The risk factors of the enterprises are also not the same which is also a big factor for not copying the same performance management system. Performance management system are designed to focus on specific operational activities of enterprises thus making it difficult to apply same performance system. If an organization needs to maximize its profit it needs a system which shows accurate results and performance of its organization which is only possible with a customize performance management system. (Bakshi, 2016)

Task 2

d.         What is the vulnerability being exploited?

            The vulnerability being exploited in wifi is WPA2 security protocol. This protocol protects and secures your information while you are using wifi. If you are using router that is using WPA2 security protocol, then you are vulnerable to attack. It doesn’t matter what kind of router it is as long as it is using WPA2 protocol. Also, your weak password is also a vulnerability. Even if the encryption is strong, a weak password can increase your chances of getting hacked (Krackattacks, 2017).

e.         What information or data can be gained by a hacker exploiting this vulnerability?

            The attacker can see your encrypted information which was assumed to be safe. It can include your credit card numbers, passwords, messages, emails, photos etc. The hacker can then use this information for illegal purposes. He can also monitor your data usage internet search history. Also, hacker can get information about your employment record, medical history, financial data and your shopping history as well. These are all sensitive information that hacker can exploit and can use against you. Hacker can sell your sensitive information online or put it on the dark web. They can mimic your identity online. Lots of previous major cyberattacks are related to identity theft.

f.          How is the hack performed?

            Without proper encryption your information can be captured and analysed by hacker. Attacker uses a technique called key reinstallation attacks (KRACKs) to bypass WPA2 security protocol. This attack works against all WPA2 protected wifi networks. Hacker can also gain access by exploiting weak configuration of network and can manipulate your sensitive information. Also, he can inject malware or ransomware to exploit you. Some hackers rely weak passwords and exploit that. Even if your encryption is strong a weak password can undermine that. If you are using a free public wifi network there is chances that it is a rouge network which is specifically created to lure you into giving your sensitive information. It imitates itself as a legitimate wifi network which makes us think it is legitimate (Norton, n.d.).

g.         What about this particular hack interested you specifically?

            This hack can be used to strengthen security of Iot’s network. This hack can attack millions of devices at the same time because lots of electronic devices use wifi for connection. This hack enables gives you access to private data which pushes security companies to strengthen their security protocols. Wifi is used by multiple electronic gadgets and Iot’s which enables system wide hack. This can give control of the whole house. The hack can be used to share your bandwidth and use it for legitimate purposes such as bitcoin mining. The hack can be designed into a program that is used to divide network bandwidth and use it for research purposes.

h.         How do you think this particular hack could be mitigated?

            We can avoid being hacked by following these tips:

·         We can mitigate this risk by avoiding public wifi hotspots and using a Virtual private network (VPN) when surfing and online shopping

·         Avoid logging into websites and putting sensitive information like credit card number when using a public wifi hotspot

·         Keeping the software on your laptops and smartphones up to date

·         Visiting only those websites that are secure and follow latest safety standards

·         You can disable auto connect to avoid connecting to unknown wifi networks

·         Using strong password that include numbers symbols and or a combination of that

·         Frequently change your router’s admin credentials to avoid getting hacked

·         Get latest updates for you wifi router which can patch security issues (Kinzie, 2020)

References of Benefits of IT Performance Management

Bakshi, S., 2016. Performance Measurement Metrics for IT Governance. [Online]
Available at: https://www.isaca.org/resources/isaca-journal/issues/2016/volume-6/performance-measurement-metrics-for-it-governance

Juneja, P., n.d. Benefits of a Performance Management System. [Online]
Available at: https://www.managementstudyguide.com/benefits-of-performance-management-system.htm
[Accessed 13 April 2020].

Kinzie, K., 2020. 7 Wi-Fi Security Tips: Avoid Being Easy Prey for Hackers. [Online]
Available at: https://www.varonis.com/blog/7-wi-fi-security-tips-avoid-being-easy-prey-for-hackers/
[Accessed 13 April 2020].

Krackattacks, 2017. Key Reinstallation Attacks. [Online]
Available at: https://www.krackattacks.com/
[Accessed 13 April 2020].

Norton, n.d. Why Hackers love public Wi-FI. [Online]
Available at: https://us.norton.com/internetsecurity-wifi-why-hackers-love-public-wifi.html
[Accessed 13 April 2020].

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Best Coursework Help

ONLINE

Best Coursework Help

1554 Orders Completed

Assignment Helper

ONLINE

Assignment Helper

21 Orders Completed

Financial Analyst

ONLINE

Financial Analyst

1596 Orders Completed