Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Case Study Technological University of Dublin, like the majority of academic institutions, must strike a careful balance when evaluating its IT security requirements. It must
Case Study Technological University of Dublin, like the majority of academic institutions, must strike a careful balance when evaluating its IT security requirements. It must maintain reliable systems to safeguard the crucial work completed by students and staff, to keep them connected and able to operate effectively, and to keep their priceless documents and data safe. Additionally, it must enable and encourage a collaborative environment that is dynamic, agile, flexible, and open to global collaboration between students and academics using a variety of platforms, workstations, devices, and technologies. The University and its IT users need to be protected from destructive attacks and the loss of confidential information with significant intellectual and financial value. And it must accomplish this without delaying the hundreds of individuals and small groupssophisticated technology and device usersfrom working independently and utilizing the tools that best suit their needs. The University's asset manager, adds that we are different from many corporate organizations who typically have strict restrictions on how employees operate when using their IT For instance, we give our employees and kids a lot of freedom and autonomy over how they utilize the internet. It is frequently unrealistic to set restrictions on which websites they may and cannot access given the very specialized work that many of them perform. Of course, freedom comes with risk, so in this extremely liberal environment the protection we deploy has to operate as effectively as possible, enabling us to manage those risks effectively and to act quickly when threats appear. Due to our heavy reliance on technology, we must always have fully operational, secure systems. Carry out research about enhancing information and network security and address the following questions: Introduce the core principles of computer security in the modern age? How is computer security used in an educational enterprise network? Discuss the security technologies and their utilization specifically for this case study? Discuss security governance and management issues for education providers? How to manage malicious software and advanced persistent threats for this case study? What are the benefits of computercyber security use in the education sector? What are the risks and challenges of security to the abovementioned case study? What approach to applying to address these risks and challenges? What is the biggest concern with computercyber security in the education sector? Which security policy is beneficial for the abovementioned case study? Explain the impact of computercyber security on academic staff, faculty members, and students? You are required to produce words report of your findings adhering to the following structure: Title Abstract a words maximum Introduction a Provide an overview of your report Literature review a Provide context by discussing the fundamental aspects of computercyber security b Provide an overview of the case Discussion and Analysis a Discuss the relevant risks and challenges of computercyber security usage related to this particular sector b Apply understanding of computercyber security to case study Conclusion and Recommendations a Summarize and reflect on your research process b Make recommendations for future work References a Sufficient academic resources and internet sources b Formatted using the Harvard referencing style
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started