Wednesday, December 4, 2019

Importance of IT Certification-Free-Samples-Myassignmenthelp.com

Questions: 1.Discuss about the Importance of IT certification for the professionals. 2.Discuss about the Security Issues in 5G network. Answers: 1.Importance of IT certification for the professionals: IT certification is the quality assurance standard for the IT professionals. The certification clarifies the value to the status of the IT professionals. Some of the professionals think that the development and the growth of the enterprise depend on the knowledge used. The implementation of the knowledge is itself a proof; it does not want any certification. The increasing certification is important for the professional because it helps in aiding skills and talents to their working structure and use of knowledge [1]. The marketability and value to their knowledge can be improved with the help of certification. The importance of it certification for the professionals is listed below: Retention of the Job: The skills, talent, and knowledge of the employees can be efficiently used if they are holding a desirable position according to their certificates and knowledgeable skills. The organization develops the norms and regulation for the employees to be hired for the particular position in the organization chart. Maintenance of the salary plan: On the basis of the certificates employees can judge themselves to ask for the handsome amount of salary from the project owner. Some organization fixed salary on the basis of qualification for the particular position. Eligible for promotion: The promotion given in the company is based on experience and certificates hold by the working employees. The competition of promotion is leaded by the certified person. Career plan: The person can seek job according to the qualification hold by him. The new opportunities are created for the certified person in the worst situation also. Discrimination: The organizations are always looking for the qualified and certified employees to be worked in the enterprise. The certified persons are hired by the consultants for improving the profit of the enterprise. Increase in productivity: The certified person helps in providing better alternatives which can help in gaining momentum in the product development life cycle. The advantage is given to the certified professionals at the time of interview. The preference will be given to the certified person than the knowledgeable person. At the time of interview and selection process, knowledge comes second than certification. The interviewer gets attracted towards the certified person. The confidence of the IT professionals can be improved with the certification. The employees are motivated to work under the certified and knowledgeable person. The certification in professional development helps the employees to remain motivated towards the working forum. The certified training and development program helps in adding values to the resume of the employees which helps in remaining ahead of the other professionals. The confidence of the client can be earned with the help of professional certification because it helps developing the scenario of knowledge and services provided by the individual for the growth of the company [2]. The productivity of the organization can be effectively increased with the use of certified person in the working platform of the organization. The certification helps in setting standards for hiring the right employees to undertake the work according to their skills and talent. The professional certification standard helps in providing roles and responsibility for the completing the project activities according to the requirement of the project working schedule. Software Certification in Australia: The integrity and values can be added to th quality assurance program with the help of software certification. The IT certification provide various benefits to the IT professionals such as they boost educational skills, provide handsome amount of salaries, specialization and expertize in their work, and other. They are various IT certificates are available; some of them are discussed below: Software Certification Description Microsoft certified IT professional credentials (MCITP) It is the most commonly used certification for the developer of the database, administrator of the database, administrator of the enterprise messaging system, administrator of the network server, and others [1]. This helps in providing validation to the proficiencies of the individual. Microsoft organizes an exam for the candidates to get specialization in their field. Microsoft certified technology specialist (MCTS) This certification is used for validating the capabilities of the individual in the field of installation program, maintenance and operation, and lastly troubleshooting of the complete system. It helps in developing proficiencies in the individual in the specific field on the specific platform Security + The security is the critical issue in the digital world. The confidence of the client can be gained only with the tight security parameters used for carrying out the functional operations [14]. The employees get the certification of managing client sensitive information without any leakages. The skills of the employees can be sharpen in the field of developing security system, security of the infrastructure, managing authoritative access control policies, and auditing processes, and others. Microsoft certified professional developer (MCPD) It is used for creating the specialization of the application program. It works in the direction of optimizing the designing and operational capabilities of the employees. Cisco certified internetwork expert (CCNA) It works on certified the proficiencies in the area of remote access. PMP certification The PMP certification is used for managing the project with skills and specialization. Certified information system security professionals It is used for providing certification to the operational capabilities of the employees in the area of physical security [13]. The certifications which are in demand in Australia are Microsoft certified IT professional credentials and Cisco certified internetwork expert. These certifications help in dealing with the complexity of databases and networking platform. The ethical issues which are associated with the first case study are data interpretation and data privacy. The student Iriat had changes the wordings of the work done by Sara B. The privacy of the document has been affected. The credit of the work had been taken by the Iriat who does not follow the ethical rules studying at college. Dr. Smith has to provide an ethical judgement of the complete scenario. By analysing the given case study, we come at the point of discussion that ethical judgement given by the Dr. Smith will be best outcome to resolve the ethical issues of the Scenario. Dr. Smith does not allow the student to submit their paper late if the deadline of submitting the paper crossed. This will help in resolving the redundancy of the work. Every student has to prepare their own work without taking help from any other research paper due to the limitation of the time [12]. In the given case study, the compliance manager has to take an ethical and effective decision to reduce the level of water pollution caused by flowing of waste by their industry. The effective decision will secure the life of fish or other water habitants. The legal step should be taken to stop the dumping of waste in water to make the environment secure. By analysing the given case study, we come at the point of discussion that ethical judgement given by the environmental compliance manager in favour of securing the life of marine habitants. The use of plastic material should be banned for carrying out business operation [11]. The plastics components should be replaced by biodegradable materials which are environmental friendly. The biodegradable waste does not cause any adverse effect on the life of the marine habitants and also does not affect the functionality of the organization. 2.Title: Security Issues in 5G network Introduction The innovation of the 5G network is capable of providing variety of services to the organizations and customers [5]. It plays a vital role in accomplishing the internet of thing services with ease, tracking and connecting of vehicles, scenario of developing augment reality system, accessing of the ubiquitous network, fast accessing of the data, and many other. It helps in overcoming the limitation of speed occurred in the 2G, 3G, and 4G networks [7]. The basic complexity which is associated with the deployment of 5G network is the security concern. The security has to be provided to every pinch of resources which are placed in the 5G network connected environment. Background The 5G network is capable of providing increased capacity to handle large amount of data with ease. The latency rate of the 5G network is very low. The efficiency of the network can be improved with the effective utilization of the resources implemented on the 5G environment. The 5G network is efficient in managing the consistency of connection between the different devices. The following table shows the comparison of improvement in the 5G network from the 4G network. Particulars 4G network 5G network Bandwidth of the data It is about to be 100 Mbps It is about to be greater than 1 Gbps Frequency It is in between 3GHz and 9Ghz It is in between 4GHz and 300 GHz Standards followed CDMA CDMA and BDMA Use of technologies LAN, MAN, WAN, WLAN,PAN 4G Services provided Accessing of information from dynamic environment Accessing of information from dynamic environment Multiple access port CDMA BDMA and CDMA It supports the facilities of dynamic network which utilizes the concept of virtualization techniques and software defined network. Network function virtualization plays a vital role in the construction of 5G architecture [10]. The architecture of the 5G network is based on the abstraction layer used for performing open interface with the use of control data planes. The following diagram shows the architecture of the 5G network. Security issues in 5G network: The security has to be provided to every pinch of resources which are placed in the 5G network connected environment. The following table shows the security issues and challenges associated with the 5G network: Security Issues Description Heterogeneous network The cost associated with the heterogeneous network is high. The complexity arises with the implementation of the interface in the medium access control layer. It is difficult in providing links to the setup for coordination of the interface [6]. Peer to peer communication It is difficult to manage security in the peer to peer program for reducing the interface between the communication devices. Radio waves It is difficult in managing issues related with cellular network with respect to capacity, availability, efficiency and security [8]. Security related with accessing of network The major issues is to access the network securely Security associated with the network layer application The security should be provided to the application based on network layer. Change in technology The deployment of the services and capabilities with respect to new regulatory forum is the major challenge to manage [9] Security provided to the service layer The integrity and confidentiality should be maintained of the information Authenticity and authorization The consideration should be given on the authentication and authorization associated with the deployment 5G network. Identification of network devices The complexity of device management should be handled carefully Confidentiality The confidentiality of the information should be maintained Monitoring Compliance should be monitored carefully Impact of security challenge: Particulars Use of Internet of things Critical platform for managing communication Enhancing broadband services Level of security High Medium High Identification of the devices used High Low Low Authentication the user provided High High High Identification of the network used High Low Medium Authentication and authorization provided to the network High High High Encryption used for network management High High High Identification of the services Low High Medium Authentication to the mutual services used Medium Low High Encryption of the services used High Low Medium Provisions used for services Low High Medium Protection provided to the data integrity High High High Security Solution: The security platform should be developed for using 5G network t manage the physical tampering of the devices. The credentials should be developed for managing the standards of the key used in the security system. The low latency is the powerful factor for managing the resources securely on the 5G network. The protection should be provided to the complex and sensitive data to manage integrity, confidentiality, and accuracy of the data [4]. The high security procedures should be used for establishing high security to the sensitive and the critical data which is available over the network. The security level of the broadband should be ensured for managing the interoperability between the trusted participating units. The customization should be provided to the innovation in the tampered resistant hardware used in the development of the 5G network. The focus should be given on using the security standards for finding the location of the data available on the physical environment. The par ameters should be developed for managing the privacy and the information consent associated with the data identification. The deployment of the 5G network with the use of hardware based on tampering resistant is capable of managing trusted communication between the devices and the participating units. The identity of the resources can be kept secured with the help of security procedures [3]. The distribution of the logistic mechanism helps in identifying the trust between the different parties. The security procedures help in managing the interoperability and scalability between the resources used on the trusted network. The backward compatibility of the data should be given preference for handling the data on the 5G network securely. The privacy should be provided to the end user by monitoring the user identifiers. The encryption services along with supreme key and private key are used for establishing security between the devices. The linking of the network nodes helps in managing encrypting and decrypting techniques for keeping the confidentiality of the information. The faulty nodes or the unauthori sed accessing of the information can be easily predicted with the use of supreme key. The cryptographic procedures should be used for establishing privacy and integrity o the data available on the 5G network. Resiliency of the network should be given preference for establishing security parameters. The mitigation policies should be developed for establishing the security and resilience of the 5G network. The development of the new security architecture helps in abolishing all the flaws occurred in the traditional networking platform. Conclusion: The 5G network is capable of providing increased capacity to handle large amount of data with ease. The latency rate of the 5G network is very low. The efficiency of the network can be improved with the effective utilization of the resources implemented on the 5G environment. There are various security concerns associated with the 5G network which should be taken under consideration for developing the mitigation policies for the system. The high security procedures should be used for establishing high security to the sensitive and the critical data which is available over the network. The security level of the broadband should be ensured for managing the interoperability between the trusted participating units. References: E. Eckel,The industries 10 best IT certifications. 2008. Ericsson,5G security. 2017. S. Hidano,New security challenges in the 5G network. 2016. G. Karopolous,Security and privacy challenges in 5G network. 2016. D. Francis,Security and privacy challenges for next generation 5G technologies. 2016. M. Siddiqui,Security issues in 5G network. 2017. O. Alani,Technologies for the 5G network: Challenges and opportunities. 2014. Y. Pal,A present day approach for 5G technology, International Journal of computer science trends and technology, Vol 3, No. 5. 2015. J. Wary,Security and resilience in 5G. 2013. E. Perkins,An analysis of the security need of the 5G market. 2012. S. Slade,Learning analytics: Ethical issues and dilemma. 2014. T. Brown,Ethical principles, dilemmas, risks in collecting data. 2015. N. Tiwari,A study on next generation communication technology: 5G, International Journal of innovative research in computer and communication engineering, Vol 4, No. 6. 2016. G. Patil,5G wireless technology, International Journal of computer science and mobile computing, Vol 3, No. 10. 20

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.