M-Global Executive Summary

Great Essays
INTRODUCTORY SUMMARY The internet of things is a global infrastructure for technology, enabling services by connecting things based on existing and evolving information and communication (Brown, 2015). After checking useful websites and reviewing books and articles, I recommend M-Global should include a new department for internet of things. The department will conveniently manage our technological connections as well as improve communication with other companies and government agency’s equipment. This report highlights advantages and disadvantages of the new department, costs, and facts about the current and future of the internet of things.

USAGES The five main usages of internet of things would be the following: Optical Tags and Quick
…show more content…
Wi-fi provides long range allowing multiple devices to connect to its network. It is also a secure and reliable infrastructure that has lasted for sixteen years so far (Malik, 2015). M-Global requires wifi in order for the company to function and communicate with employees as well as clients. The internet of things department could manage our wifi routers as well as the bills that come with it. This would help us divide our labor efficiently by category instead of having the financial department manage all our finances. The primary disadvantage of wi-fi comes with its cost, since it battery powered and the company needs to pay fees charged by a carrier. Despite the main disadvantage, wi-fi is essential for every company if they would like to connect with clients or other …show more content…
Employees will need to ensure clients their information is safe when connecting to our new technology. M-Global must also employ security tactics to ensure our company’s confidential information is not in danger. In addition, M-Global must ensure that no one else is reading the sensor data, so technologies like NFC, RFID, as well as Li-Fi can prevent the spread of private information from being leaked because the devices must be in the same room as the technology in order to connect. There will always be the issue of security as new technology is created, but employing good security practices will prevent potential

Related Documents

  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    SYSTEM IMPLEMENTATION: At some fixed interval the PC Master sends request to the Wireless sensor node through the sub master for Data collection. The request send by the PC Master is in the form of frames. The frame which is transmitted by PC master will contain both the sub master id & the wireless sensor node id from where the data should be retrieved. The sub master receives the frame is then check for the wireless sensor node id…

    • 358 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    The issues and possible risks in using wireless communication. There are few security risks occurring in mobile and wireless user: A. Intrusion - networks are more open to intruder access unless protective measures (such as passwords, encryption and identifier disabling) are adopted and this may result in a greater susceptibility to theft or misuse of information contained on networks, unauthorized destruction or modification of data, and abuse of network capacity B. Leeching - bandwidth can be used by intruders at the expense of legitimate businesses and users C. Exploitation - network access can be misused to launch denial of service (DoS) attacks against third parties, transmit illicit material such as child pornography, or engage in other criminal activities. [10] 5. Conclusion: The report introduced three wireless generations which have been using for the last few decades.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Nt1330 Unit 2 Case Study

    • 177 Words
    • 1 Pages

    The next challenge would be to determine if the budget allows an upgrade from WEP to WPA2 in order to protect the company’s data. WPA2 being the best and may not be available on current equipment. Most small business do…

    • 177 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    CSE 543: Individual Report

    • 1293 Words
    • 6 Pages

    Implications of IoT in Health-care Data Security CSE 543 – Individual Report Nishtha Punjabi Computer Science (MCS), Ira A. Fulton School of Engineering Arizona State University, Tempe, AZ, United States npunjab1@asu.edu Abstract— As society increasingly relies on digitally stored and accessed information, traditional information security technologies, policies, management and practices are found more and more limited in satisfying the security and assurance needs of modern information systems and applications. Incorporating new technology into the healthcare organization’s processes is risky because of the potential for patient information being disclosed. The Internet of things (IoT) is the inter-networking of physical devices, vehicles…

    • 1293 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The FCC, with Ajit Pai as the current chairman, is trying to repeal the Title II net neutrality regulations. “At the May 18, 2017 Open Commission Meeting, the Commission adopted a Notice of Proposed Rulemaking that proposes to restore the Internet to a light-touch regulatory framework by classifying broadband Internet access service as an information service and by seeking comment on the existing rules governing Internet service providers' practices” (FCC Initiatives). Broadband providers are currently classified as common carriers under Title II regulations. A Title I classification classified providers as information services, which allowed information service providers to get away with doing some scummy things. For example, even while classified…

    • 692 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    First responders (police officers, firefighters, paramedics) are not intrinsically mobile. They have traditionally relied on brick and mortar institutions as the brains of their operations and only left these buildings to respond to emergencies. Radios were, and continue to be, the primary source of communication; relaying information from computing resources found within the office to officers in the field. However, the evolution of mobile technology has increased the autonomy of first-responders in the field, with nearly all emergency vehicles now equipped with on-board computers. Nonetheless, the capabilities of these devices remain limited and first-responders are still tethered to their vehicles and radios for decision-making.…

    • 1415 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Movistar Mexico Case

    • 498 Words
    • 2 Pages

    The recommendations for Telefonica Movistar Mexico and regarding the information, the company is composed not only of the internal employees, they are composed of other teams and providers, all the employees have goals to achieve but as normal employee you need the be support for your providers or partners, so is important to include the external people in the evaluations to review that the evaluation is 360 grades in spiral. Movistar can request this new evaluation in the success factor module to measure them and complete the scene. In other aspects, the “go-to-market strategy” will be good during 2011 to 2014 because Movistar became the first in launching new technology and offers to customers, but sometimes you need to aggressive in the…

    • 498 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Introduction: Technology has definitely changed the last century. However, the last 10 years technology has made a dramatic change. In just 10 years, our nation has gone from house phones to smart phones. Our smart phones can almost do as much as our laptops. Social networking has become the rage to the way we communicate with each other.…

    • 606 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1. Where did the idea for your grant program come from? I understand that getting a business idea off the ground is difficult for young students or entrepreneurs. Some young minds have amazing ideas, but the state of the economy would not allow them to save enough money to get started. Even the $500 that I give to some grantees have went a long way.…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In a world that we live in, highly involved with internet connections for all the parts it plays a role in, uses efficient methods and management to make it no surprise that technology is the base of future. Technology is the collection of tools that make the exchange of information easier to use, create, and manage its…

    • 58 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    After viewing all the videos I am left with mixed emotions. On one hand, I believe privacy is very important. On the other hand, I believe surveillance is important but invasive at the same time. I will analyze the three videos and their implications in a political, social, cultural, economical, environmental, and ethical view.…

    • 989 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Outsourcing Trends

    • 1566 Words
    • 7 Pages

    Briefly describe the technologies that are leading businesses into the third wave of electronic commerce. The key technologies that are leading businesses into the third wave of electronic commerce include mobile phones and tablets along with high-speed networks that allow users to access the Internet and smart cards and radio frequency identification devices (RFID) that are being used with biometric technologies such as retina scanners and fingerprint readers. In about 100 words, describe the function of the Internet Corporation for Assigned Names and Numbers. Include a discussion of the differences between gTLDs and sTLDs in your answer.…

    • 1566 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In his article entitled “Internet Access Is Not a Human Right” published on the website of The New York Times on 4 January 2012, Vincent G. Cerf, a vice president and chief Internet evangelist for Google, presents his perspective on a controversial issue regarding access to the Internet. He argues that access to the Internet should not be accepted as a human right, “it’s just a tool to achieve those rights.” According to Internet World Stats (2014), over a third of the world’s population are accessing the Internet as a part of their everyday life. This proves that the Internet plays numerous significant roles in society. It makes our lives easier and more convenient than in the past, by providing information, education, communication, business, and freedom of expression.…

    • 1148 Words
    • 5 Pages
    Improved Essays