欢迎来到51Due,请先 | 注册
关注我们: 51due论文代写二维码 51due论文代写平台微博
英国论文代写,英国essay代写知名品牌微信

Paper代写范文

为您解决留学中生活、学习、工作的困难、疑惑
释放自我

paper代写-Network security and Business Model

2018-03-13 | 来源:51due教员组 | 类别:Paper代写范文

下面为大家整理一篇优秀的paper代写范文- Network security and Business Model,供大家参考学习,这篇论文讨论了网络安全。网络安全意味着系统中的硬件、软件、网络系统及其数据受到保护,免受意外或恶意破坏、泄漏和变化等。如今,计算机网络的安全性已经成为人们关注的重要问题。不同的用户对网络安全系统有不同的需求,如果大公司的话,就需要独自设计一个高水平的IT安全系统,而个人用户只需要一个中等成本的正常的安全系统就行了。

Network security,Business Model,英国论文代写,论文代写,paper代写

1. Network security and Business Model

1.1  Networksecurity

1.1.1 Definition of Network security

Network security means the hardware, software, network systems and their data in the system are protected, being free from accidental or malicious destruction, leak, and change(Sasikumar Gurumurthy, 2010). Therefore systems could continuous and reliable operate its online services without interrupting. General speaking, confidentiality, integrity, availability, authenticity, and related technology of network security are all belong to network security research field (Peixin Qu, Zhen Liu, 2012). it is an integrated discipline involving computer science, network technology, communication technology, cryptography, information security technology, applied mathematics, number theory, information theory and relative other disciplines.

1.1.2 Need of Network security

Nowadays, the security of computers as well as network becomes an increasingly important problem for both public and private users (Mohammad and Zhu, 2013).

The managed security service (MSS) is more mature after a long time development in North America and there are some MSSP providing network security services. The main types of MSSP are as following. First is MSSP with telecom operator background like AT&T, Verizon Business, BT Counterpane and Sprint Nextel. The second kind of MSSP is companies whose main business is IT security, such as Symantec and Sarvis. The rest of them have other backgrounds, for example, IBM ISS (IBM Internet security system) (Sining ZHOU, Youjun XIANG, 2007).

Different users have different needs of the network security system, for instance, those big corporations want an integrated and high level IT security system which may be designed for themselves, while some individual users just need a normal security system with a medium cost. All in all, the main requirements of MSS from companies are the same. They need a more various and complex service from the estimation, supplement providing and supervising, analysis and emergency plan of incidents. Some medium companies are becoming the customers of MSSP, compared with only big companies in the market in the past. As there are more choices for the users, they tend to be careful when they choose their MSSP (Sining ZHOU, Youjun XIANG, 2007).

1.2 Definition of Business Model

Business model design is an integral part of the business strategy. And apply the business model into the company's organizational structure (include institutional settings, workflow and human resources) and systems (including IT architecture and production lines) are parts of business operations (Gerry George and Adam Bock, 2011). Business model design defined for business logic at the strategic level. Any business models is a three dimensional model formed by customer-value, corporate resources and capabilities, profit. Professor Mark Johnson, Clayton Christensen of Harvard University and SAP's CEO Henning Kagermaim, co-authored the white paper of business model innovation(2011), and summarized these three elements as follows: Customer-value proposition", means the tasks companies need to complete when they provide services or products to their customers or consumers at a pre-determined price. "Resources and product process", to support specific customer-value proposition and business model. "Profit formulas '', which is, the process for shareholders to achieve economic value.

2. Enterprise Value Chain

2.1 Definition of Enterprise Value Chain

The concept of value chain was developed by Professor Michael Porter of Harvard University Business School, which raised in the book Competitive Advantage (1985). He thinks that “every enterprise is an aggregation whose activities include design, production, sales, and support.” All of these activities can be indicated by value chain. When enterprises is constructing value chain, they need to be based on the value chain analysis and the economics of their own product activities, and separate each activity, after that each one owns its own economic content. For example, one activity has a high potential of differentiation, or the ability to reduce costs. While the enterprise value chain is not a collection of independent activities, but a system of interdependent activities. In this system, there is a link between the activities. These links are reflected in a relationship between cost and value activities, or relationships with other activities. Enterprise value chain put enterprise's internal relations together, eventually forming competitive advantage, two competitive advantage is to optimize and coordinate (Ghemawat, Pankaj, 2011). Enterprises in order to achieving its overall objectives, often make choices in individual value optimization between activities, to gain a competitive advantage in terms of coordination. As to the collaboration, enterprises coordinate all activities for increasing product differentiation or reducing costs.

2.2 Network Security in Enterprise Value Chain

Take m-commerce for example, network involves many parts of the chain. Mobile transport is the basic network in communications. This need the help from many telecom operators like AT&T and forthcoming high-speed transmission technologies such as the Universal Mobile Telecommunications System (UMTS). The second part of network involved is mobile services and delivery support. For instance, network plays an important part in connecting to the Internet, security, the server platform, and payment systems (Barnes, 2002). If there are some network attacks happened, the value chain would be broken. Hence, network security is necessary in m-commerce as well as many other parts of the industry. That is why there are more and more demands of network security system in today’s business world.

Result Analysis

In recent years, domestic information security market is growing rapidly. IDC (Internet Data Center) recent statistics show: Till 2011, IT security market size of China is US $ 1.4692 billion, which has nearly 100Billion RMB. The rapid growth of China's security market has attracted many foreign companies to invest. However, the advantage in talent accumulation, technological innovation of previous years of IT manufacturers, is no longer evident. Therefore, it is necessary for IT security companies to seek a breakthrough.

"Service" for the security market is no longer a fresh concept. IT service includes security system, planning advice, compliance consulting, risk assessment and reinforcement, and security operation and maintenance services, such as the overall process management. The concept of “IT security service” was proposed in 2004, however the users’ awareness was not high, which cause a lot of security service providers could not continue. Since 2008, new changes appears in the IT security market: new technologies are constantly introduced, security threats become diverse and complex and IT security-related regulations are constantly proposed, in the new situation, the value of the security service is again put on the agenda. Today, “Services become the priority of IT security”, has become a widely accepted notion in IT security circles. Security services director of Westone, Dr. WU Hongzhong, who has engaged in security services business for a long time, views that “services” has become an index to measure the maturity of IT environment. Emerging from the Asia-Pacific region to a mature Western Europe, North America, "IT security services" have become one of the fastest growth and the most closely watched areas. IDC in a theme of "global and United States information security predictions 2003-2007" research, conducted a 5-year forecast of IT security services, which shows that because companies are looking for security service providers to help them understand security risks and develop comprehensive plan for addressing these risks, consumer spending will be increased 20% each year in information security services market. Internal information security services market also has been showing a trend of rapid development in recent years. Some companies said, before their corporate clients implement the IT security solutions, most of them tend to advice from professional IT Security Company, or hire professional information security personnel to do vulnerability testing. According to the data of Gartner, in 2007, the scale of China's information security services market accounted for 22.6% of the entire information security market. Although compare to security software 49.3% and security hardware 47.4%, information security services market is still relatively small, but it is growing faster, which increased by 36. 3% than in 2006. Figure 1 displays the 2007-2011 China's security services market size and growth rate forecasted by IDC, which shows the big development of security services in China.

Figure 1IDC forecasts 2007-2011 China's security services market size and growth rate

What’s more, compared with the mature IT security services market of foreign countries, IT security services market in China still has great room for development. Thus, it is a huge opportunity for China IT Security Companies. To the users, security assessments, technical analysis, countermeasures of professional security services and strategy making will become new bright spots.

Discussion

In the past, the service was often considered as a value-added for security product, whether manufacture or users. With the development, the requirement of users gradually shifts from the original single IT service to diversity security services, which make security service become some stand-alone product which is distinguished from the information security products in ordinary sense.

Security services business is the reflection of the overall strength for an IT security company. IT security service is different from some “short, adaptable and fast” business, so it is impossible to be finished in very short time. Because what provided by security service to customers are not some obvious products or functions, but the optimization of business process and the safeguard of information technology, which needs the accumulation of time.

1. Segment on services market

The key leading to the success is the focus. Recently, as one professional business in the development of information security industry, the IT security services are needed very strong in some industry. This will require deeper development and growth in these beneficial industries. After some profound understanding on security service business, the IT security companies need to transfer their strategy form “wide net” to “focus on training”, which is the most practical approach. The IT security companies need to discover where matches with their development goal, process and business mode. Follow the trend and drainage the trend.

2. Customized service strategy and quality control

Customized security service is the direction of security service, which needs IT security company to develop more security service which is closer to the users, to change the static image. The satisfaction of customers, and make the security service become an essential business in information security industry, are the difficulty and orientation should be focused on. In addition, many manufactures have introduced the quality system to improve their quality in terms of security hardware products and security software. The security is difficult to quantify and define. The quality is the fundamental of security service business development. Therefore, it is very necessary to introduce the quality control for the IT security service.

3. Quality control

The Security Company must dedicate themselves to the security service, to provide the high-quality services to customers, so as to enable more customers to recognize such security business. Service is considered as a work that examines and weighs localized operations, requires rapid response, as well as teamwork ability. The Security Company needs to have a comprehensive consideration in terms of the products of information security industry, market, technology and development history, etc., which can help ensure the quality of security service. The Security Company cannot ignore the quality, as the business processes become more complex and the post-maintenance more difficult. They need to clearly express the content and scope of the services they can provide, and cannot give people the feeling of they can do all things, but no meticulous and accurate on them.

The Security Company needs to learn some lessons from the success stories of foreign security services, in order to enhance the service capabilities and service system established. The human power plays an important role in a company. The Security Company is able to accumulate the talented and potential people to support the security service developed.

4. Cooperation for change and security on demand

According to different technical and performance perspective, the IT security companies need to develop different levels of software and hardware products. For example, the layout of firewall products can be divided into three categories, and there are a variety of security gateways in antivirus aspects. What’s more, when working with the external publicity, the IT security companies should tell the users which products are strong in anti-virus, or firewall, and also with what kind of other functions. The IT security service needs to fuse other things and not to lose original advantages that should be retained.

5. Combination with other companies to bigger and stronger

Essentially, Information Security service is a kind of monopoly market, so the traditional telecommunication operator has congenital advantage. Because of the particularity of security, customers prefer to choose a large scale and trusted Security Company to entrust their security business. So, a few large Security Companies with high reputations must monopolize the main development trend. And the small and medium-sized Security Company need to show the trend of mergers and acquisitions, to upgrade individual reputation and comprehensive strength.

On the other hand, for the traditional telecom operators, the superiority, like congenital ability of brand reputation, cyber source and so on, will help them become the most potential and talent “game player” in the security service market. At the same time, the security service can bring many benefits to the telecom operators, in which the most important is that they can obtain many strategic values, such as tied with major clients, establishing reliable image, enhancing their own security capability and quality. Therefore, more and more traditional telecom operators will cooperate with the professional company, to seek greater profit and reputation. The mergers and acquisitions are the crucial path for the security companies to develop their security service.

6. Confidentiality and consultant work

For the users, the security service is requested by the government or some other large enterprise, which can be considered as some kind of special service. So compared with other areas, the special nature of security service is the profound grasp on customer’s network environment, which is related to the secret of the enterprise, such as the database, physical line, network topology and the specific content of the security management. Therefore, the Security Company needs to have a comprehensive plan on the confidentiality work, which is the first principle of the service process.

In addition, at the beginning of the security company providing products, they need to have a mature methodology in the consulting field, which can learn and absorb from some equivalent foreign companies’ successful case. Domestic Security Company owns huge customer resources, environment for growth and understands the situation of market demand, which is the strengths that can be taken used by domestic company. Moreover, they also own the support from national policy for some special industry, such as military aspects. Therefore, those Security Companies should not only focus on the development of public market, but also grasp their own unique home advantages.

Conclusion

There is an accelerated changing to the human lifestyle and whole environment of IT industry. Generalized IT security solution has been unable to provide a sufficient security solution to household customers, let alone the corporate clients who is bearing thousands attacks every day.  The value of the information need to be secured is thousand times than the past, therefore customization of IT security firms’ services is one of most feasible profit model to IT security firms in the foreseeable future – at least next ten years.

This new profit model requires the IT security firms has more business understanding rather than the preference on the technical advantages as past times. The dynamic environment requires the IT security firms react from their customer demands more quickly. An efficient and integrated solution based on the nature of clients’ business or the customers’ personal characteristics is so-called customization of services in this industry.

想要了解更多英国留学资讯或者需要paper代写,请关注51Due英国论文代写平台,51Due是一家专业的论文代写机构,专业辅导海外留学生的英文论文写作,主要业务有论文代写assignment代写、paper代写。在这里,51Due致力于为留学生朋友提供高效优质的留学教育辅导服务,为广大留学生提升写作水平,帮助他们达成学业目标。如果您有paper代写需求,可以咨询我们的客服QQ800020041

51Due网站原创范文除特殊说明外一切图文著作权归51Due所有;未经51Due官方授权谢绝任何用途转载或刊发于媒体。如发生侵犯著作权现象,51Due保留一切法律追诉权。

我们的优势

  • 05年成立,已帮助上万人
  • 24小时专业客服
  • 团队成员都毕业于全球著名高校
  • 保证原创,支持检测

英国站