Friday, February 28, 2020

Business Process Outsourcing, WIPRO.....India's largest BPO provider Essay

Business Process Outsourcing, WIPRO.....India's largest BPO provider - Essay Example Business Process Outsourcing (BPO) is the delegation of IT related services to an external service provide. It is totally dependent on human interface. At the same time it is capital intensive. Thirdly, it involves the data of the client who is usually from a different country hence, privacy and security too become obligatory. The report covers diverse incidents and opinions from the industry experts. India has provided enough evidence of its capability to handle big and small projects. It receives 80% of its work from US and now other countries are looking at this option. India now needs to improve upon its data protection and HR issues. Business Process Outsourcing (BPO) is globally now a mainstream business activity. A rapid growth in outsourcing in India has resulted in service providers mushrooming all over. Most lack in the resources, specially trained work force and finances. Except for a few large houses the rest do not have the necessary infrastructure. Brian Glick (2003)1 reports some critics see offshore outsourcing as little more than UK jobs being lost to India and some other developing countries. Nevertheless, it remains the fastest growing sector in the services market. More and more companies in the US and UK are moving their back-end offices to India for business processing to reduce operating costs. The concept of the offshore software development centre was born in India in 1990s when IBM and General Electric returned to India. Today India is a powerhouse of Information technology. The three main reasons according to Ramesh Emani2 why R & D has moved to India are – firstly, the product life cycles are shrinking and the companies are under pressure to launch products faster. The second is cost and the third is availability of talent with competence. IT and language skills in India bring business to India. The growth rate in the Indian BPO industry is 40% against 30% in the software industry. India has set for

Wednesday, February 12, 2020

Common Information Security Threats Essay Example | Topics and Well Written Essays - 750 words

Common Information Security Threats - Essay Example Example in this sense includes interprocess messages. Other data susceptible to compromise from attackers include, information prepared by a program, and stored. In most instances, the data is modified by the hacker. The modified data provides the hacker a chance to exploit the organization’s program. Additional threat in this light involves direct modification; this enables hackers to initiate other indirect modifications. Example includes altering the internal program information. The altered information makes it easier to create a code that operates arbitrary; as a result, an attacker can add an admin user not authenticated by the systems database. Threats facing service availability Computer and network threats may involve an attack to paralyze service available, such activity halts application functions. In other occasions, an attack on service availability slows down the server. As a consequent, authenticated users are unable to access the server. Compromising service av ailability involves convincing others to hack the firm’s server, attacking bugs, and particularly, the networking stack. System integrity threats This threat, involve altering the organization’s system to create a system that is not trusted. Compromise on the integrity of network systems may involve acts such as creating a malicious code, using root access. The intention, involve enabling the system to permit the code used by the hacker. The hacker may capitalize to create a malicious code, as a result of buffer overflow. The moment the hacker accesses administrative control of the firm’s network system, it becomes difficult to mitigate such threat. Additional threat, may involve impersonation of the server by the hacker; as a result, the hacker can retrieve an authentic password and username. This allows the attacker to obtaining the status of a legal user. An unauthorized user can also alter the firm’s software to prevent certain operations. Example inc lude, repudiating the use of a security item such as credit card. Values for threat and vulnerability Investing on controlling threats and vulnerability within any organization is crucial in terms of minimizing attacks on the information security systems. In essence, it enables the company to prepare adequately, and prevents the anticipated risks. Further, Identifying threats and vulnerability assist in planning for appropriate security tests. This allows the firm to put in place effective measures to minimize security threats on a long- term basis (Jenkins, 1998). Risk management techniques The appropriate risk management techniques for organizations, involve implementing programs, efficient in terms of protecting information systems. This requires a focus on a risk management policy geared toward establishing a cost-effective security system. Further, appropriate management