$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

What Development Of What Internet Have Helped The People.

tag 0 Download10 Pages 2,300 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


Discuss Development of What Internet Have Helped the People  ?




In the recent times the use of internet having been increasing at a great rate (Reddy and Reddy 2014). The development of the internet have helped the people of the whole world to attain great level of information very easily. The technologies such as the Internet of Things have been developed in the recent times. But, with the development in this technologies there has been a great risks that has emerged due to the development of these technologies. In addition to the development there has be in a development in the hacking techniques and the mal practices on the internet. These mal practices can be termed as cybercrimes. The rate of these cybercrimes has generated a great deal of fear in the minds of the people. In addition to the common people various kind of multinational and international companies are also facing the effects of the cybercrimes in today’s world. In addition to this they face great deal challenges from the cybercrimes that are taking place nowadays in today’s world. There are various kinds of risks that the Huawei Company are facing in the present situation and these have been mentioned in this article.


Challenges of Cyber Securities

The risks that the Huawei Company is facing from the cyber security challenges have been provided in the report. The NIST framework has been used by the company for accessing the organizational cyber security risks of the company.

The main concern for the company has been the risks that have been involved with the Supply Chain Management. There is need for the organization to understand the risks and the importance of the cyber security challenges that would be faced by the company and would be effecting the supply chain management of the company. In addition to this this there is a need for the company to address the situation.

According to Shah et al. (2015), The USB encryption is one of the major concern of the Huawei Company regarding the cyber security challenges. Various kind of surveys were conducted in which it was seen that the respondents were lacking the techniques when it came to tackling the USB encryption challenges. The failure to ensure that the traffic that was flowing through the network was successfully encrypted before being allowed by the USB. The company were not able to ensure that the end points of the connections were properly secure. As a result this resulted in a hostile environment that resulted in the unsecure environment within the company. To solve tis issues the company can encrypt their USBs using the BitLocker before using the USB ports. The encryptions are to be done efficiently. It would be seen that the efficiency of the company increase to a great deal, also the security of the company can also be enhanced to great extent from the cybercrimes that are taking place.

In the present time the company is using third party products (Agarwal et al. 2015). The company is using various devices that are being integrated with their operations, these devices improve the data integration of the company. These can save the time to capture the data of the company and store them efficiently. In addition to this these instances can also control the flow of the data throughout the organization. Hence, this gives rise to the security issues that can be faced by the company. The company is obtaining the option of integrating their operations with the third party applications. This can hamper the security of the company as they are handing over very useful information of the company to these third party vendors. The company would easily lose their privacy and data security and can also be subjected to mal practices. These products might result in changing of the security settings and policies of the company and also result into allowing various kinds of viruses into the systems into the systems of the company and can affect the overall security and efficiency of the company.


In addition to the USB encryptions the cybercrimes also produces threats to the USB control for the company (Shah et al. 2015). The threats generally changes the access control of the USBs. It has be noted that the company do not control the access of the USB. They also do not control the data that is flowing through the network. This would be allowing unauthorized to the network and would allow the outsiders to have access to the company’s network and the data that is flowing through the network. This can distribute the attacks to the various points on the network of the company. In addition to this, the unidentified devices if allowed access to the computers can allow very harmful malwares to get into the systems and these malwares would be harming the devices and reduce the overall efficiency of the systems. This as a result would be reducing the overall efficiency of the company. The security of the company can also be easily breached due this inefficiency. The data of the company would also be unprotected and they would be losing their privacy.

According to Guglemann et al. (2015), the company do not have any kind of data protection systems for their systems. The data loss prevention is a kind of strategy that would make sure that the critical data of the company is lost very easily, When a system is subjected to malware attack, it can lose a huge amount of data. In these kind of situation the company should possess an efficient data protection method or else a data recovery technique so that the data of the company that is very confidential is not lost or stolen very easily and it is also to be ensured that the data is recovered very easily. The data loss prevention also ensures that the company data are not sent outside the network of the company by the end users and also, the help the network admirations control the flow of the data and ensure that they keep track of the data. Failing to do so the company may face severe kind of consequences.

In addition to this it was found that the company have been working on the reverse engineering of the malware (Duchene et al. 2017). In addition to this, the organizations are still on the developing phase of the reverse engineering of the malwares. The reverse in engineering of the malwares would be nullifying the effects of the company and block all types of them, malware activities on the network of the company. The reverse engineering would also reduce the effects the malwares on the systems of the organization. In addition to this the reverse engineering would also cause the dis functionality of the malwares. This would not allow the malware to hamper the system. Even if the system is hampered the system can easily be recovered. Hence, the reverse engineering is very efficient for the company to protect their systems. Failing these processes would hamper the security of the company’s data and would result in inefficiency of the data recovery.


In addition to this it was also found that the company was not in possession of a fully capable emergency response team (Cranmer and Biddinger 2014). The company was able to put together a response team but they were not efficient at all. The response team would be responsible in handling the malware attacks and the intrusions that were faced by the systems. They would be responsible for detecting the cyber-attacks and cleaning up the cyber-attacks. This would be hampering the organizations in a bad way as they would not be able to perform proper analysis of the attacks that had took place in the organization and also would be viable to more number of cyber-attacks. This would be hampering the security of the company and also the overall efficiency of the company.

According to Piccoli and De Witte (2015), the company is also required to have breach indicators in the systems. The breach indicators raise an alarm immediately when the security of the company is breached. The main components of the breach indicators include, Reporting Systems, log managers, security information, and also some of the event management techniques. These systems altogether are also known as the SIEM systems. They stop the breaches to the network of the company. They can actively monitor the breaches that are taking place in the systems of the company’s networks. The company possess the systems that are almost unable to identify the breaches that are taking place in the company. This result in hampering the effectiveness of the company.

The company is also affected in the areas of disk encryption (Skillen et al. 2013). The company should have systems in which the disk encryptions can be performed successfully. This would prevent the systems against potential data losses and also protect them against the data theft of the company. The survey has shown that not more than 30 per cent of the company uses the disk encryption techniques. The company is viable to loss of data and also theft of very confidential data to the outside world. These would result in inefficiency of protecting the private data of the company. This would hamper the security of the company to a great extent. The efficiency of the business of the company would also be lost.

According to Ferguson et al. (2013), the company have the application control system at their possession. They are running an application control that is presently active in the systems. The organization can perform the application control very effectively and in addition to this the other organizations can perform the quality control of the application. The company has only started the process of controlling the application. The company can control the applications that can have access to the systems of the company and also perform various kind of activities that they are entitle to perform. The operations of the company would be very inefficient if they cannot perform the procedures successfully. Hence, the companies must perform the application control techniques very efficiently and this would also improve the business efficiency of the company in addition to increasing the efficiency in the security of the company.

The company is required to perform some efficient Mobile device management. Only a part of the company performs the mobile device techniques very efficiently (Harris and Patten 2014). The mobile devices that are running and connected to the network of the organization are needed to be secured efficiently as do the computers and the laptops that are connected to the network of the organization. The Companies that do not have these policies in place are viable to the security breaches that can be conducted via the mobile devices that are connected to the network of the company. Even if a single device is hacked the hacker would be getting access of the full network and all the information regarding the company. This would decrease the efficiency of the security of the company.



For conclusion it can easily be said that the, results from various kind of surveys have shown that there are various kind of security facilities that are available to counter the effects of the cyber-crimes techniques that can be implemented by the Huawei Company for their security from the external threats. Although the company have implemented these techniques successfully in their businesses but they have still ignored various other technologies and also have tried to implement the cyber security measure but are unable to implement many of the techniques efficiently.  Hence, it can easily be said that the cyber security measures are necessary for the company to provide security to their data and also increase the efficiency of their business to a great extent.



  1. Harris, M. and P. Patten, K., 2014. Mobile device security considerations for small-and medium-sized enterprise business mobility.Information
  2. Management & Computer Security,22(1), pp.97-114.

Agrawal, V.V., Atasu, A. and Van Ittersum, K., 2015. Remanufacturing, third-party competition, and consumers' perceived value of new products. Management Science, 61(1), pp.60-72.

Cranmer, H.H. and Biddinger, P.D., 2014. Typhoon Haiyan and the professionalization of disaster response. The New England journal of medicine, 370(13), p.1185.

Duchêne, J., Le Guernic, C., Alata, E., Nicomette, V. and Kaâniche, M., 2017. State of the art of network protocol reverse engineering tools. Journal of Computer Virology and Hacking Techniques, pp.1-16.

Ferguson, A.D., Guha, A., Liang, C., Fonseca, R. and Krishnamurthi, S., 2013, August. Participatory networking: An API for application control of SDNs. In ACM SIGCOMM Computer Communication Review (Vol. 43, No. 4, pp. 327-338). ACM.

Gugelmann, D., Studerus, P., Lenders, V. and Ager, B., 2015. Can content-based data loss prevention solutions prevent data leakage in Web traffic?. IEEE Security & Privacy, 13(4), pp.52-59.

He, D., Kumar, N., Lee, J.H. and Sherratt, R., 2014. Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics, 60(1), pp.30-37.

Piccoli, B. and De Witte, H., 2015. Job insecurity and emotional exhaustion: Testing psychological contract breach versus distributive injustice as indicators of lack of reciprocity. Work & Stress, 29(3), pp.246-263.

Reddy, G.N. and Reddy, G.J., 2014. A Study of Cyber Security Challenges and its emerging trends on latest technologies. arXiv preprint arXiv:1402.1842.

Shah, N.N., Kumar, G.N. and Raval, J.A., 2015. Web Based Framework for Data Confidentiality in Removable Media ensuring safe cyber space. International Journal of Science, Engineering and Technology Research (IJSETR), 4(5).

Skillen, A., Barrera, D. and Van Oorschot, P.C., 2013, November. Deadbolt: locking down android disk encryption. In Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices (pp. 3-14). ACM.


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). What Development Of What Internet Have Helped The People.. Retrieved from

"What Development Of What Internet Have Helped The People.." My Assignment Help, 2018,

My Assignment Help (2018) What Development Of What Internet Have Helped The People. [Online]. Available from:
[Accessed 02 April 2020].

My Assignment Help. 'What Development Of What Internet Have Helped The People.' (My Assignment Help, 2018) <> accessed 02 April 2020.

My Assignment Help. What Development Of What Internet Have Helped The People. [Internet]. My Assignment Help. 2018 [cited 02 April 2020]. Available from: is the perfect solution to render quality solution for all sort of academic issues. We have hired professionals from different fields of study to provide assistance with different subjects. We successfully have provided different types of assignment solutions on 100+ subjects. We have hired industry experts to deliver nursing assignment, hr assignment and finance assignment help. To offer quality content with IT assignments, we have hired IT professionals to render programming language assignment help and IT assignment help for other types of IT assignments as well.

Latest Management Samples

MGTP102 Management Principles And Argumentative Essay

Download : 0 | Pages : 9

Answer: Introduction The essay aims at providing an insight into the fact as to how remuneration has been one of the factors for motivation within society.  A distinct system for compensation ensures in employee motivation that further results in the increase of the productivity. The essay focuses on relationship between motivation and the level of the pay. Bolman and Deal (2017) put across in the study that most business acts like an in...

Read More arrow

HI5019 Strategic Information Critical Systems

Download : 0 | Pages : 17

Answer: Introduction BlueScope Steel Limited is one of the leading Australian manufacturing company that face challenges in terms of their information system (BlueScope Corporate, 2019). Therefore, the study will propose a new information system that should be developed by the BlueScope Steel Limited of Australia in the future. In order to determine this, various procedures related to this manufacturing company such as the critical success fa...

Read More arrow

BG009 Internal And External Environment Analysis For Generic Strategy

Download : 0 | Pages : 14
  • Course Code: BG009
  • University: The Open University
  • Country: United Kingdom

Answer: Samsung is a global conglomerate that has its origins in South Korea and the headquarter of the organization is located in Samsung Town, Seoul. Samsung company comprises of different types of affiliated businesses that are united under brand of Samsung. Samsung was established in the year 1938 by Lee Byung-chul. The operations of the company had started with trading business and in the next few years Samsung had been able to diversify it...

Read More arrow

HRMT20024 Managing Human Resources Staff

Download : 0 | Pages : 14

Answer: Nowadays, there are different challenges for the financial company is to retain the valuable and talented workforces. The management can control the issue of workforces to prevent from quitting the company within no time to higher extent. However, it cannot put complete full stop on it.  This essay discusses the key challenges in attracting and retaining a workforce in the financial sector. In this week, different weeks discussion...

Read More arrow

BUSN20019 Effect Of Employee Turnover To A Company Profitability

Download : 0 | Pages : 17
  • Course Code: BUSN20019
  • University: Central Queensland University
  • Country: Australia

Answer: Introduction The primary goal of every business firm is to make a profit (Aitken, Frino, McCorry, & Swan, 2018). The executives or top administrators of any company must therefore continuously find ways of optimizing business functions to minimize cost while maximizing profit (Cao, Hwang, Li, & Zomaya, 2013). For maximum productivity, the workforce must be motivated and skillful in doing all the necessary business activities to ...

Read More arrow

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1896 Order Completed

95% Response Time

Herman Berens

MSc in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1592 Order Completed

96% Response Time

Jane Sima

Ph.D in Psychology with Specialization in Industrial-Organizational Psychology

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

440 Order Completed

99% Response Time

Jack Arens


London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

expert working good with ratio analysis i got full marks for ratio but overall good presentation.


User Id: 207116 - 02 Apr 2020


student rating student rating student rating student rating student rating

excellent work by tutor and quality of good work excellent work by tutor and quality of good work excellent work by tutor and quality of good work excellent work by tutor and quality of good work excellent work by tutor and quality of good work


User Id: 264013 - 02 Apr 2020


student rating student rating student rating student rating student rating

Brilliant work, paid attention to every details, And submitted on time for review.


User Id: 338016 - 02 Apr 2020


student rating student rating student rating student rating student rating

The report was exceptional. Thank you for helping me with this assignment, and I am very satisfied with the result. The content was exceptional and my grade was exactly what I needed, the writer was very on point and finished my report in a timely ma...


User Id: 262907 - 02 Apr 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?