Sunteți pe pagina 1din 9

c c 


  
  

Over the past decades, the IT department has moved from being a commodity

service provider to a strategic partner where IT is viewed as a tool for increasing business

growth rather than just an expense. In the same way over the past couple of decades, on-

line communication, especially electronic mail and on-line shopping, has changed the

way that people transfer sensitive information to and from each other. As long as these

methods of communication will be used, there needs to be a way to keep this information

secure.

The move towards using e-statements and other e-documents is well

understood and requires little explanation and justification, but doing this without

adequate security can expose both the business and its customers to greater risks. What is

required is an assurance mechanism that would be valid in the eyes of law as well as one

that would be understood by the end users.

One solution to help us solve this problem is Information security systems

based on PKI technology. Public Key Infrastructure (PKI) is well recognized as a critical

enabler of digital trust on the Internet. Over the past decades, it has grown from a

relatively unknown solution to some overly hyped business opportunities.


|igital signatures provide just such a mechanism. Hence ³Phishing Attacks´

can never happen in this mechanism.

This report was prepared as a means of helping all major organizations

understand the components for building a sound business case for using PKI on

Information Security for their business purposes. By following the business case

methodology presented in this document, decision makers will be able to determine for

themselves whether the investment benefits for (PKI) are justified and whether

investment benefits outweigh the risks. |ecision makers are also given guidance on

evaluating the economic impact of alternatives, comparing alternatives, and ultimately

monitoring the investment.

ã



As e-business evolves, new business models are bringing about a plethora of

changes. Interconnectivity between vendors, suppliers, customers, and employees has

gained a new level of importance as a way to achieve a competitive edge. The value of

intellectual property has skyrocketed and the need to protect it has become more critical.

In the financial, healthcare, and education markets, government regulation has made

compliance with privacy and security rules an imperative.

A security breach not only erodes confidence in the business but also affects

the organization¶s reputation capital. Case studies demonstrate risks that include
sabotage, vandalism, loss of data confidentiality and integrity, theft, fraud, and breaches

of privacy. |igital signatures and the Public Key Infrastructure (PKI) being discussed

here fall under the first of these efforts. Broadly speaking, this security plan must

consider people, business processes, and technologies and structure how they will interact

to conduct business in a secure and trusted fashion.




 

   
  ! is a software unit and one of the emerging educational

institutions of scientifically research-based technology programs. As an educational

institution and a consultant to the Career and Professional markets,  is committed to

designing total, client-driven education solutions. We are a team of professional

education experts, technology developers, curriculum development experts, education

course writers and man power consultants. We tailor solutions to each individual needs

whether that is for off-the-shelf online, in the classroom or blended courses or fully

customized curriculum development. We also provide a wide range of tools to help

students, faculty and enhance career development.

   
 is committed to improving student retention, faculty development,

and the overall classroom experience and outcomes with powerful and flexible

educational solutions for instructors and students.


"#

To form partnerships with our clients that will improve their business operations through

the use of technology by ensuring that the right tools are selected, followed by

comprehensive implementation, training and ongoing support.


'##

We understand your need:

Future-tec Software completely understand the need of technical education as a breather

to mould an individual to a professional .Its our job to recognize your demands, anticipate

your questions and this likely makes every professional to be a part of us.

We have solutions to your tough questions:


How do we help our students become a successful professional?
How do we stretch our resources?
Are we doing enough to satisfy student needs?
What will set our institution apart from everyone else?
We help you succeed:
We don't just provide off-the-shell fixes. We create learning programs that work. We

extend our capabilities by aligning with industry demands and provide a wide range of

intelligent and demanding tech-educational solutions. Quite simply we understand your

need and help you succeed.

#

  $
 
Our Custom Software |evelopment Team is committed to provide our clients with the

best software solutions for their business needs. We pride ourselves in doing a thorough,

honest evaluation and providing the best solution for the client needs. Examples of the

broad range of software solutions we provide include: Custom Built Software

Applications, Business Intelligence and Application Integrations.


FTS also provides enterprise class solutions for the mid-sized and small/emerging

organization. With world class technologies and our seasoned consulting resources, we

offer what was once only available to very large organizations.

Our unique business model allows us to offer you exceptional quality and diverse

capabilities with the personal attention your business needs and deserves, all with a single

focus: your success.


 c  


Project management is key to success with any software implementation and ensures

your project will achieve success. FTS professionals provide organization, task sequence,

milestone identification and project management as a single and well-orchestrated effort

that accomplishes the stated goals.


   #
$  
#  # 
j? V   

j? 4 
j? '   
j? ã 
j? Ö 
j?   
j?  


ð %%ð%c c &'

Future-tec Software provides a wide range of technical training in different technologies

with our infrastructure or we can come to you. In either case, the training is hands-on,
collaborative and enables staff members or students to become immediately productive in

the workplace.

FTS offers Computer-Based Training (CBT) which is a specialized arena of Learning and

|evelopment.

Real -time experts from big corporate are invited to train you on self-paced learning and

can script a customized CBT program to your needs. Our technical consultants have the

latest technical knowledge and skills to successfully implement your training schedule

FTS training services are based on flexibility, quality and in-depth system understanding.

We're different because we develop unique programmes understanding the technology

demands of the industry and using project based training and real time processes.

FTS offers complete training solutions to both Public demands and corporate needs and

Our programmes are delivered by Industry experts with strong training credentials -

rather than expert trainers familiar with technologies.

   (



j? 'icrosoft Technologies
j? Sun Technologies
j? ‘etworking Programmes
j? Embedded/VLSI
j? Telecommunications
% ã% %c
j? Tailored training solutions specific to your needs
j? Empowered users and improved job satisfaction
j? Learning by doing" improves retention
j? Improved efficiency in system usage
j? Tailored courses help your budget go further
j? ‘o added expenditure - we work with your existing software tools
j? A specialist training facility at our offices.


 ) $ 
 


All organizations face the pressures to increase revenue, reduce costs, comply

with government and industry regulations, or reduce risk. These issues are compounded

by the desire to conduct business electronically. To evaluate how the organizations use

the Internet to transact business, effective user authentication, confidentiality, data

integrity.

To evaluate how the cost of IT Security has been decreasing and more users

and professionals have now become IT savvy, the recent global economic challenges

have taught businesses to become even more conscious over cost and operational

effectiveness and efficiency.

To evaluate and suggest, from streamlining standards to consolidating

knowledge, and building and delivering guidance and training, are the most urgent areas

that perhaps regional and national PKI promotional forums and standards bodies could

make a significant and positive difference in helping enterprises to fulfill the PKI

objectives and enable trust in their businesses in the road ahead.



* 

j? Analyze the Current Environment and Assess Affected Areas

j? Establish a Baseline and Set Targets for Improvement

j? Identify Viable Alternatives

j? |etermine the Benefits

j? |etermine the Risk

j? Evaluate the Economic Impact of the Investment

j? 'onitor the Investment

+c'cc  %

|ue to cost and time constraints the sample size was restricted to 50 Samples.

A? Employees are not ready to reveal exact information because of the fear over the job

security.

A? The employees are busy in their work.

A? Full data collection is constrained by the less time available for interviewing.

S-ar putea să vă placă și