Technology Evaluation And Recommendation

Read Complete Research Material



Technology Evaluation and Recommendation

Technology Evaluation and Recommendation

Introduction

In this study we try to explore the concept of technology in a holistic context. The main focus of the research is on the evaluation of technology and its relation with how things work out in our favor. The research also analyzes many aspects of technology utilization and tries to gauge its effect on the functionality of an organization. Finally the research describes various factors which are responsible for evaluating technology and tries to describe the overall effect of this evaluation on company progress and organizational development.

Risk Evaluation

In the modern times of today, information dissemination, processing and transfer from one destination to another is gradually becoming a natural norm in our society altogether. These days, with the changes and the challenges that have risen and come within our surrounding environment not only make way a better understanding of how to go about maintaining a certain level of confidentiality, but also call for the threats and contingencies that come in the name of information dissemination and destruction (Peltier, 2002).

For the table below, the data needs to be evaluated and observed. Information and data of private, confidential, secret nature not only requires security protocols and relevant checks, but also calls for the changes and the challenges that are associated with the problems and the situations that are associated with the problems and the situations that come in case of any data theft, breach of information or loss of important records.

What Is the Risk or Vulnerability?

What Needs to Be Protected? (e.g., passwords, data, file backups, system registry)

Candidate Technology Solution

How the Technology Solution Works

Effectiveness (High, Medium, Low)

 Loss or Theft

Official Passwords, Official Files, Company and personal Data, Data Backup files, Pictures

 Passkeys, Checks, Data Level Security, Server Authentication. Internet Authorization

 It automatically generates Alerts and Pop-Up windows would be ...
Related Ads