...Me and cyber security I strongly believe that cyber security will be my profession. The reasons to say cyber security will be my profession are: First, I have a good experience of reading. Second, I am incredibly interested in cyber security profession. However, my friends believe that cyber security is going to be difficult for me. Even though my associates frustrated me that cyber security is challenging, my reading practice and interest in cyber security empowered me to attend cyber security program. I have ability of reading various reading materials that encouraged me to go for cyber security program. When I was in Jimma University, I was both student and assistant lecturer. Due to that, I used to read a lot of materials to teach my students. For example books, journals, newspapers and video lectures. In addition to that, I was also reading different resources to score good grade on my own courses. Some of these materials are textbooks of physiology, anatomy and biochemistry, online materials and different researches. To sum up, I used to read day and night to cover both my students’ and my own courses. So, my reading skill will contributes a lot to successfully accomplish cyber security program. Also, I attracted by cyber security profession. The first reason that makes me interested in cyber security discipline is its high demand. Nowadays the uses of Internet and cyber crime are growing in parallel. As a result, our world is in high demand of qualified cyber...
Words: 520 - Pages: 3
...Information and Cyber-Security Questionnaire 2014: v9.2 2014-2015 STT Information Systems Analysis and Design Business Systems Analysis Systems & Information Systems Copyright © Peter Bednar. 2014 peter.bednar@port.ac.uk STT: Inf. And Cyber-Security Q 2014-15 Page 2/5 Information and Cyber Security Questionnaire All answers in questionnaires are to be kept anonymous. Department (e.g. section): Grade (e.g. category of work): Information and Cyber Security Questionnaire - Part 1 Planning 1. What information assets are critical to your work? 2. What kinds of risks could they be exposed to? 3. What legal and compliance requirements is your work and organization subject to? 4. How could you continue to do your job if your information requirements could not be fulfilled with your IT support? 5. How can you manage risks and threats to your information assets on an ongoing basis? Implementing 6. Have you put in place the right security controls to protect your equipment, information, IT system and external (or outsourced) services? 7. Do you and your co-workers know what your responsibilities related to IS and Cyber Security are? 8. Do you and your co-workers know what good IS and Cyber Security practices are? 9. If there is a IS Security threat or Cyber-attack, or something goes wrong with related to your Information Assets – how will you deal with it and get back to normal practices again? ...
Words: 331 - Pages: 2
...INTRODUCTION: This research report conducts analysis on security. Technology these days is going up very fast and technology has been changed the route business administered by giving online services to their customers, to secure data in to “cloud” and allowing them to get their data from smart phones and tablets. This process of securing data has given many benefits to small and large business alike. But where the benefits are there will be some risk present. Risk will be like lost of data or to protect data by any attack of security. According to a survey which took place in 2012 about security, the graph of crimes and security attacks is gradually going up every year. As we talk about security it’s a very huge field to do research on it. Security has many different units in a field. One can’t do a research on this topic. The topic I am going to discuss in my research is cyber security. Cyber security these days is important everywhere. Where ever the data is, we need cyber security to protect and maintain our data according to our requirements Cyber crime is far reaching, general and continually joined with different parts of the criminal natural gathering. It runs from the thievery of a specific's character to the complete interruption of a nation's Internet compromise in light of a huge trap against its masterminding and taking care of assets. The definite focus of cybercrime divisions is on information-the information which is stored electronically for resulting and...
Words: 1426 - Pages: 6
...responsible for safeguarding such information from modification, unauthorized access, disclosure and destruction. This Policy provides a minimum level of security requirements that will provide the confidentiality, integrity and availability of Maryland IT asset, when implemented. For this reason a comprehensive Information Security standard and system ought to be implemented so that there can be suitable management of security across all the present functions and to provide the required security and guarantees with the regards to information requirements. This would include aspects of confidentiality, integrity, and availability which are crucial aspect of any security standard. A comprehensive review of the Information Security implementation within the State of Maryland will make it possible to establish how this has been impacted by the set forth security standards in addition to changes introduced by legislative developments and processes. In essence, this will deliver the outcome of a comprehensive cyber security profile with respect to MD. Recently there have been several legislative adjustments introduced as a result specifically to the changing nature of Information Security inside the political environment with the administration accepting that vital national infrastructure be sustained by the most suitable security...
Words: 634 - Pages: 3
...Cyberwar: What the world needs to know After everything that has been happening in the world, from the 9/11 takedown of the twin towers, to the shooting in Paris almost a month ago, the world has been drawn to attention to the extent of surveillance and cyber-espionage practiced by the US government, not only in relation to suspected terrorists but also in relation to the ordinary citizen. After reading Cybersecurity and Cyberwar, I feel like it comes at an interesting time in the history of security services world-wide, when the extent of inter-connectivity of every agency, corporation and individual makes cyber-surveillance easier to put into effect. The authors are experts in their field: Peter Singer is Senior Fellow and Director of the Center for 21st Century Security and Intelligence at the Brookings Institution, a former coordinator of Obama's defence policy task-force during the 2008 campaign and author of three other books on aspects of warfare. Allan Friedman is also a well-known expert in the field of information security and cyber-security, formerly Research Director for the Center for Technology Innovation at the Brookings Institution, and currently Visiting Scholar at George Washington University's Cyber Security Policy Research Institute. In other words, this is an authoritative text. In Cybersecurity and Cyberwar, Singer and Friedman attempt to fill this worrisome knowledge gap. The book is divided into three sections: “How it All Works,” “Why it Matters...
Words: 1488 - Pages: 6
...Functions of the Authority ........................................................................................................................ 1 Initiatives ................................................................................................................................................... 2 3.1.1 3.1.2 3.2 Uganda Communications Commission (UCC)………………………………………………………………………………………………..3 Initiatives ................................................................................................................................................... 3 3.2.1 3.3 4 Broadcasting Council (BC):……………………………………………………………………………………………………………………………4 Laws that have been passed…………………………………………………………………………………………………………………………………4 4.1 4.2 Cyber Bills Passed…………………………………………………………………………………………………………………………………………4 Policies and Strategies under formulation by the Ministry of ICT………………………………………………………………….5 E‐Waste...
Words: 3997 - Pages: 16
...BPO – A SWOT Analysis ------------------------------------------------------------------------------------------------------------------------------ Abstract BPO is one of the popular business practices in today's competitive environment. India has enormous opportunities emerging from globalization and consequent lowering of tariff barriers. The Indian BPO industry is constantly growing. However, along with the Phenomena Increase in BPO to India there has been a backlash against outsourcing. Information Technology has given India formidable brand equity in the global markets. Indian BPO companies have a unique distinction of providing efficient business solutions with cost and quality as an advantage by using state of art technology. This article explains overview of BPO industry in India comparative strength, weakness, opportunities and thread Indian BPO industry. Introduction India has enormous opportunities emerging from globalization and consequent lowering of tariff barriers. Information Technology has given India formidable brand equity in the global markets. Indian BPO companies have a unique distinction of providing efficient business solutions with cost and quality as an advantage by using state of art technology. Through joint efforts of Government and the Industry, software development and IT enabled services have emerged as niche opportunities for India in the global context. The Government has been making continuous efforts to make India a front-runner...
Words: 2546 - Pages: 11
...| Outsourcing your Privacy | | | 4/20/2014 | Business Law Final | | Perhaps BPO is more of a threat than the NSA, when it comes to Privacy! | Outsourcing your Privacy Business Law Final Webster’s dictionary defines privacy as freedom from unauthorized intrusion. The meaning of what privacy is to an extent is driven by the society and its moral norms. Reasonable expectations of privacy in public places must change as our social environment changes. As moral and social norms change in a society the expectation from an individual towards society changes and thereby the individual’s privacy values. For example, slavery was an accepted practice in the late 19th century; today it’s not in practice. In the current information technology age, when an individual submits his personal information for purchasing merchandise online, it is within his expectation that his personal information be protected by the website. In future with the increasing use of technology in the day to day activities, new issues of privacy will arise making today’s notions of privacy out of date. One such issue is the privacy of personal information in business process outsourcing. Business process outsourcing (BPO) is the process of contracting a specific business task to a third-party service provider. There are two categories of BPO. Back office outsourcing constitutes the outsourcing of internal business functions such as purchasing or billing. Front office outsourcing constitutes the outsourcing...
Words: 1769 - Pages: 8
...threat within A study on insider threat by DSCI in collaboration with PwC About Data Security Council of India (DSCI) Data Security Council of India (DSCI) is a focal body on data protection in India, setup as an independent Self-Regulatory Organisation (SRO) by NASSCOM®, to promote data protection, develop security and privacy best practices & standards and encourage the Indian industries to implement the same. DSCI is engaged with the Indian IT/BPO industry, their clients worldwide, Banking and Telecom sectors, industry associations, Data Protection Authorities and other Government agencies in different countries. It conducts industry wide surveys and publishes reports, organizes data protection awareness seminars, workshops, projects, interactions and other necessary initiatives for outreach and public advocacy. DSCI is focused on capacity building of Law Enforcement Agencies for combating cyber crimes in the country and towards this, it operates several Cyber labs across India to train police officers, prosecutors and judicial officers in cyber forensics. Public Advocacy, Thought Leadership, Awareness and Outreach and Capacity Building are the key words to continue to promote and enhance trust in India as a secure global sourcing hub, and also to promote data protection in the country. For more information about DSCI or this report, please contact: Data Security Council of India Niryat Bhawan, 3rd Floor Rao Tula Ram Marg New Delhi – 110057 India ...
Words: 7525 - Pages: 31
...Zinnov Management Consulting IT Adoption in BFSI Sector in India 2012 This report is solely for the use of Zinnov Client and Zinnov Personnel. No Part of it may be quoted, circulated or reproduced for distribution outside the client organization without prior written approval from Zinnov. India is a fast growing IT market; BFSI vertical constitutes a significant share of the overall spending USD billion $13.7 17.1% FY12 FY11 Distribution of IT Spending in India, FY12 Energy 15.7% Government 15.4% Hardware $11.7 IT Services $12.6 14.4% $11.0 Manufacturing 28.8% BFSI 11.1% Telecom 7.2% Education 1.5% Healthcare 1.0% Software Products $4.2 19.5% Consumers 11.9% Others1 7.0% Retail 0.4% $3.5 Total domestic IT market FY12 ~ USD 30.4 billion Overall, BFSI vertical is contributing significantly to the growth of the Indian economy; its share in Indian GDP is estimated at ~8% Source: Company Annual Reports and Press Releases; Dataquest; Primary Interviews with Stakeholders in the Indian IT Ecosystem; MOSPI; Zinnov Analysis Note: 2 The rapid diversification of the sector including Banks, NBFCs and Insurance presents huge IT opportunity Over 97,000 Scheduled Banks in India (235) Commercial Banks (166) Co-operative Banks (69) Unscheduled Banks Public Sector Banks (26) Nationalized Banks (20) Foreign Banks in India (33) Private Sector Bank (21) Regional Rural Banks (82) Urban Cooperatives (53) State...
Words: 3481 - Pages: 14
...BUSINESS PROCESS OUTSOURCING ABOUT BPO BPO stands for Business Process Outsourcing. There is a common misconception that B.P.O. and call centers, mean one and the same. A call centre is a remote location in India wherein calls made by customers abroad are routed to India by means of telecommunication equipments. This call is answered by call centre agents who are trained to speak in an accent which the customer can understand. This accent is commonly referred to as Neutral Accent Coming to the term Business Process Outsourcing, let us understand the term in a simple way by breaking it up. There is a business. Each business has got a process. A process means a specific way or method of doing a job. Those jobs which are routine in nature, are given to countries outside India, to save money by way of salaries. OVERVIEW OF VARIOUS CAREER OPPORTUNITIES IN THE BPO INDUSTRY * Voice Process (Inbound and Outbound) * Semi Voice Process or Back Office Support * Medical Transcription * Medical Billing * Data Entry * E-Mail Support * Knowledge Process Outsourcing * Recruitment Process Outsourcing * Education Process Outsourcing * Legal Process Outsourcing * Technical Writing * Content Writing * Web Designing ABOUT NASSCOM NASSCOM stands for National Association of Software and Servicing Companies It regulates the functioning of the IT and ITES industry IT means Information Technology which includes software programming and ERP...
Words: 1729 - Pages: 7
...HE, President Mwai Kibaki, presides over the official ground breaking of Konza Technology City. January 2013 2 0 1 7 1 2 Hon. Samuel L.Poghisio, EGH, MP Minister for Information and Communications Minister’s Statement Access to information is crucial to economic growth. Information and communications technology offer a powerful tool that, if deployed equitably, can ensure citizens are empowered and Government can deliver services more effectively. Information is vital for the efficient delivery of public and private sector product and services that are responsive to the needs of citizens and businesses as well as capacity creation. For a variety of reasons (economic and policy), developing countries like Kenya are less equipped to take advantage of the potential in ICT to stimulate growth, and are likely to fall behind advanced economies. The Kenya ICT Master Plan is therefore not designed in isolation, given that there is evidence from developed countries that investment in ICT facilitates economic growth by increasing productivity. As the Kenya Government ensures an enabling ICT environment and regulatory framework, this plan aims at stimulating the setup of ICT-related businesses to enhance employment creation. At the heart of this document is a strategic intent to develop a robust ICT sector that will enhance economic growth through creation of businesses and hence employment. In the execution of this plan, Kenya will become a leading ICT hub...
Words: 4766 - Pages: 20
...MBA & MBA (IB) THIRD SEMESTER -- CHOICE BASED CREDIT SYSTEM (NEW SYLLABUS) COMPULSORY PAPERS Title: Total Quality Management Subject Code: 3001 Contact Hours: 45 hrs Work load: 3 hrs per week Credit Points: 3 Evaluation: Continuous Internal Assessment – 25 marks Semester End Examination -- 50 marks Objectives: This cour se is designed to help students to develop basic appreciation of quality concepts and learn the tools and techniques to achieve quality. It also gives the totally integrated effort for gaining competitive advantage by continuously improving every facet of an organization’s activities. Pedagogy : Lectures, Assignments, case studies, seminar, MODULE 1 Introduction to TQM: Various definitions of quality and TQM, Core concepts of quality, The masters of quality(W Edwards Deming, Joseph M Juran, Philiph B Crosby, Kaoru Ishikawa, Ginichi Taguchi, Shigeo shingo) Evolution of quality, The Total Quality Management Excellence Model, Strategic Quality Management, Lecture, Numerical Exercises on cost of quality, TPM 1. Basterfield H Dale and others, Total Quality Management, Pearson Education/PHI, Inc. 2006. 2. K.Shridhar Bhat Total Quality Management (Himalaya publishing house 2005). 3. Poornima M Charantimath, Total Quality Management, Pearson Education, 2003. MODULE 2 Continuous process improvement: Concepts of Kaizen, Kaizen vs. Innovation, Kaizen Strategy...
Words: 5392 - Pages: 22
...Course Project Parts 1-3 ITT Technical Institute GE 273 Microeconomics How outsourcing affects the US economy and contributes to political stability in developing economies is a matter of great debate. Many people think this practice will have an overall positive effect on the US economy, since it saves money for companies, opens up opportunities for greater entrepreneurship in the US, and leads to more Americans holding higher level jobs. Jobs that companies outsource to save money besides medical and manufacturing include copy writing jobs for publishing companies, administrative jobs, and data entry jobs for insurance companies. Critics suggest hiring foreign workers has an immediate effect on the US economy by stripping many Americans of jobs they would have performed, particularly by semi-skilled or skilled laborers. Further, many argue that giving jobs to workers in less developed countries improves those countries economically and increases trade for US products. It also increases a country’s ability to pay back debts to the US, and may promote better political relationships. Companies economically benefit by selling their products in other countries. This means they can hire more people in the US, lower their prices on products for US consumers. Comparative advantage and efficiency takes place when countries, individuals, and firms have lower opportunity costs in the production of a good or service with comparison to that of their competitors. This creates more...
Words: 1329 - Pages: 6
...to outsource a service provider to do work for them. The process is what actually known as Business Process Outsourcing. Business Process Outsourcing (BPO) is the contracting of a specific business function to a third-party service provider as a cost-saving measure of companies such as IT-related services, financial and administration (F&A) processes, human resources functions, call center and customer service activities and accounting or payroll. BPO is often divided into two categories: back office outsourcing which performs non-core processes that is actually necessary to a company but do not provide any intrinsic value to the company’s growth such as billing or purchasing; and front office outsourcing which inclined to performing core processes that directly benefit the organization in growing, generating revenue and establishing itself in the marketplace, included here are customer-related services such as marketing or tech support. Business Process Outsourcing is also distinct from where the external service provider locates. BPO that is contracted outside a company’s own country is known as offshore outsourcing while nearshore outsourcing happens when a company contracted a specific task to its neighbouring country and BPO that is contracted with company’s own country is being called onshore outsourcing. BPO is already recognized internationally. In fact, outsourcing has been around since the time of hunters and gatherers of the primitive society. Those who were...
Words: 8974 - Pages: 36