Ctg Security Solutions

Share Embed Donate


Short Description

ctg security solutions...

Description

CHAPTER 1 INTRODUCTION

1

1.1 INDUSTRY PROFILE

The information technology (IT) industry has become one of the most robust industries in the world. IT, more than any other industry or economic facet, has an increased productivity,  particularly in the developed world, and therefore is a key driver of global economic growth. Economies of scale and insatiable demand from both consumers and enterprises characterie this rapidly growing sector. The Information Technology !ssociation !ssociation of !merica (IT!!) e"plains the #information technology$ as encompassing all possible aspects of information systems based on computers. %oth software development and the hardware involved in the IT industry include everything from computer systems, to the design, implementation, study and development of IT and management systems. &wing to its easy accessibility and the wide range of IT products available, the demand for IT services has increased substantially over the years. The IT sector  has emerged as a ma'or global source of both growth and employment.

India's IT Industry Information Technology is one of the most important industries in the Indian economy. The IT industry industry of India has registered registered huge growth in recent years. years. Indias Indias IT industry industry grew from 1* million + -ollars in 1*/11 to a whopping * billion + -ollars in 0**/0**2. In the last ten years the Information Technology industry in India has grown at an average annual rate of  3*4. The liberaliation of the Indian economy in the early nineties has played a ma'or role in the growth of the IT industry of India. -eregulation policies adopted by the 5overnment of India have led to substantial domestic investment and inflow of foreign capital to this industry. In 12*, high import duties had forced I%6 to leave India. 7owever, after the early nineties, many multinational IT companies, including I%6, have set up their operations in India. Som o! t" ma#or rasons !or t" si$ni!i%ant $ro&t" o! t" IT industry o! India ar  

!bundant availability of skilled manpower 8educed telecommunication and internet costs 8educed import duties on software and hardware products

0

9ost advantages Encouraging govt. policies Som o! t" ma#or %om(anis in t" IT industry o! India ar )

T!T! 9&:+;T!:9< E8=I9E (T9) I:>&raud, Trademark Infringement, -efamation, 9opyright Infringement and Intellectual @roperty Theft.

J

loppies, 6emory sticks H other digital media devices with unmatched success rate available in the country. >. 2*sit S%urity Sr,i%s4  ?eb !pplications have recorded a huge growth in the recent time.

!lmost every organiation present around wishes to have its business and management online for  uick and effective business processes. The risk and concern over the security of the web applications have grown along its popularity. The web applications may e"pose customer  information, financial data and other sensitive and confidential da ta if not configured properly.



1?. Et"i%a+ Ha%8in$ Pro#%ts4 ?e at, 9T5 ecurity olutionsG ,Team of 7ighly -edicated

6embers and !ssociates pledge to protect data and track unauthoried or malicious hackers, especially in sectors like IT ,police services, insurance and %anking. If a system is hacked into, &ur 9ompany resort to tests such as vulnerability assessment testing, application penetration testing, network penetration testing, security analysis, reverse engineering, malware analysis, security auditing, and also security management. 11. Com(utr Ha%8in$ 7/o*i+ Ha%8in$ Fornsi% In,sti$ator4 CHFI  @rogram certifies

individuals in the specific security discipline of computer forensics from a vendor/neutral  perspective. 6obile >orensics is fast becoming a lucrative and constantly evolving field, this is no surprise as the mobile phone industry has been witnessing some unimaginable growth, some e"perts say it may even replace the 9omputer for those only wishing to send and receive emails.

ACHIE/ENTS ?1: O -eclared in IndiaNs Top 0* promising 9yber ecurity 9ompanies by 9I& 6againe. O tudents from abroad preferring online Training from us as they have found us worldNs best online IT ecurity Training provider. O ?e have got  7all of >ames (9ompanies including 5oogle, 6icrosoft H ony (Twice),3 wags,1 !cknowledgement from Eset !ntivirus 9ompany H 0 bounties. O 6any 9ompanies from India H !broad are in process of associationKpartnership with us.

2OR@SHOP3S2/INOR7CORPORATE TRAININ3PLACE//ENT DRI0E 9T5 ecurity olutionsG has covered many 9olleges and +niversities for providing ?orkshopsKeminars H @lacement -rives. =arious Topics like 9yber ecurity H Ethical 7acking, 6obile 7acking, >orensic Investigation H 9loud 9omputing are covered in our  workshops. Even we have conducted Training workshops for the 9orporate ectors ;ike  Enterprises, 5oyal 9onsortium ecurities @vt. ;td. and also in various banking sectors like I9I9I  bank ,7->9 %ank H many more.

1*

8ecently 9T5 ecurity olutionsG has conducted few workshops on #Ethical 7acking H Information ecurity$ at various 9ollegesK9ompanies in @un'ab. 9T5 ecurity olutionsG distributed #9ertificate of !ttendance$ to each personKstudent who attended the workshop.

0ISION 7 0ALUES4 we are the most trusted IT ecurity ervices H Training @roviding company, the easiest to deal with, offer the best value for money, and set the standards in the industry. The most obvious choice for all . =alues that we observe while we work  Integrity  Innovation  9ustomer centric  @eople 9are P&ne for all and all for oneP  Team work  Qoy and implicity 9ompanyNs !nalysis C 9T5 ecurity olutionsG 1. Strn$t"s  &ne of the leading private players in the IT ecurity industry in India  8eliable ervices  0F A 2 upports  9overs risk . 2a8nss4  ;ow 9apital  ;ow !dvertisement %udget 5. O((ortunitis4  7igh :etwork Individuals (7:I)  ! clear career path 11

 !ll round support through e"clusive advertising, own in house consultant, and world/class

training  ! comprehensive benefit package 6. T"rats4  -ynamic environment  Increasing 9ompetition  :on/creativity  !n +nfocused approach  9omplacency and arrogance

1.5 INTRODUCTION TO STUDY

10

India provides high uality off share out sourcing services to the global entrepreneurs H start ups we are Rnow for our word press development from last  year. ?e combine our passion, creativity He"perience to deliver white labeled intellectual proprietary oftware Kweb application at low cost. I:IB solution

India has a huge clientele for both website design Hdevelopment services

covering countries like +!, +R ,H other European countries that have successfully used our  services since out commencement I:IB solution has the backing of more than * profssionals, who all use their high level of e"pertise in the most latest web programming technology including 7T6;, css3,magento H word. &ur team proficiencies include in design, corporate logos, e/commerce website 969, Hmany more rice internet applications.

INI SOLUTION SER0ICES

1. 2EBSITE DESIN S with hands on knowledge in website designing, the e"perts at

I:IB provide the client with design, building, publishing and mgt of website. ?hether it is design of small brochure website or large dynamic, function website, trust in I:IB and we will provide you professional, utilitarian and user/friendly website.

13

. 2*sit d,+o(mntS we specialie in custom web development with high levels of 

e"pertise in the output and complete focus on the user e"perience. !nd the  professional, uniue and a user/friendly website that is easily navigable and uick to download.

5. E)%ommr% with the team e/commerce emerging as the latest slogan of business

worldwide, we at I:IB provide efficient e/commerce solution for all kinds of e/  business needs.

6. /u+timdia so+ution multimedia has become the o"ygen for the current day

 business communication. ?ho knows this better than us at I:IB ?e help you reach your target audience in the best way with our robust and elegant multimedia  presentations. !fter all, we enhance the appeal to your vision and mission though our  multimedia solution.

:. Custom &* d,+o(mnt  we have been in web development field from the past

many years and have gained much e"perience and e"pertise to deliver first class web 0.* application for individuals, businesses whether small or large. 9ustom web development evolves from the client specific needs which are somewhat uniue in itself and any application cannot fulfill it completely.

;. 2* a((+i%ation d,+o(mnt  web application development is a team covering a

wide range of services according to end business to end business needs. ?e at I:IB solution provide custom web application development using @7@, 7T6;, 9, Q!=!98I@T our team of e"perienced @7@ professional catch up with the client and 1F

deliver application that best suit the clientNs reuirements, budget, and schedule delivering a uality application in predefined time.

. /o*i+ Ha%8in$ 7 Fornsi% In,sti$ator4 Di$ita+  6obile >orensics is fast becoming a

lucrative and constantly evolving field, this is no surprise as the mobile phone industry has  been witnessing some unimaginable growth, some e"perts say it may even replace the 9omputer for those only wishing to send and receive emails. 1J

1.6 CO/PARISON BET2EEN CT AND OTHER IT CO/PANIES SER0ICES

2*sit Dsi$nin$3D,+o (mnt

9T5 ecurity olutionsG

I:IB solution

@yramid olutions

!ll packages include 96 available for choice L?ord  press, 6agneto, H &pen 9artM, to enable you with the facilities of edit and delete the pages from the browser you used and from the based control panel for the comfort of your home.

website designing, the It is not provide web e"perts at I:IB design Hdevelopment  provide the client with service. design, building,  publishing and mgt of  website

LOO Dsi$nin$ Sr,i%s

9T5 providing logo design I:IB not providing  :ot providing services logo services

A((+i%ations d,+o(mnts

There are provide !ndroid H ?eb application 9ustom I& !pplications H 5ames development softwareKapplication. -evelopment

/u+timdia so+ution 3Entr(ris so+ution

There are services

providing

both They are providing multimedia services

They

are

only

providing enterprise

services.

?eb !pplications have  :ot providing security ?ebsite ecurity E"pert Training, 2*sit S%urity recorded a huge growth in the services recent time. !lmost every delivered in the form Sr,i%s organiation present around of &ne 6onth &nline wishes to have its business and or 8egular 6ode of  management online for uick  Training. It involves and effective business all the tools and  processes. techniues (i.e.) 1

6anual and oftware  based to check the loopholes of any website and then fi"ing those loopholes. &ur 9ourses are 7ere, they are also worldwide recognied  provide ethical for IT ecurity related hacking training Qobs H >urther   admission. ?e also  provide Qob assistance to our students once they complete their  respected course. They are not providing  :ot providing. cyber services.

?e at, 9T5 ecurity Et"i%a+ Ha%8in$ olutionsG ,Team of 7ighly -edicated 6embers and Trainin$ !ssociates pledge to protect data and track unauthoried or  malicious hackers, especially in sectors like IT ,police services, insurance and %anking. 9yber Investigation ervices is Cy*r a highly e"perienced In,sti$ation investigation and forensic firm Sr,i%s that helps 9orporations, mall %usinesses, and Individuals address unwanted cyber issues impacting their lives. Ad,an% 2i)Fi This 9omprehensive and so  :ot providing interesting training module "a%8in$ will cover each and every techniue regarding ?i/>i ecurity and 7acking Techniues. This module e"plains about the wireless association and working, ecurity chema (?E@K?@!K?@!0) and lot more

:ot providing

0*

1.:CONSU/ER PREFERENCE 9onsumer @reference is a business term which is used to capture the idea of measuring how satisfied an enterpriseNs customers are with the organiation Efforts in a market place. Every organiation has customers of some kind. The organiation provides products (goods and services) of some kind to its customers through the mechanism of a market place. The products the organiation provides are sub'ect to competition whether by similar products or by substitution products. The reasons on organiation is interested in the satisfaction of its customers is because customers purchase the organiationNs products. The organiation is interested in retaining its e"isting customers and increasing the number of its customers. 7ow companies find consumer preferences 9ompanies routinely test the market to find out what customers like and dislike about their products and competitors products. This is usually done by an internal marketing department or outsourced to a market research firm. 6arket 8esearch E"ample 7ere is a popular e"ample of market research ! customer has finished shopping and paying for merchandise at a local grocery store. %efore handing the receipt to her, the cashier points to and e"plains that she has been invited to participate in a short survey about her visit. If she chooses to participate, she will receive V off her ne"t visit and a chance to win a large monetary grand prie. !fter gathering information, the ne"t step for the company is to determine what it means. !nalysis of the information may lead the company to change the formula, packaging, color, sie or some other feature of the product. The underlying foundation of demand, therefore, is a model of how consumers behave. The individual consumer has a set of preferences and values whose determination is outside the realm of economics. If an individual purchases a particular good, then the opportunity cost of that purchase is the forgone goods the consumer could have bought instead. ?e develop a model in which we map or graphically derive consumer preferences.

01

CHAPTER  LITERATURE RE0IE2

00

.1 RE0IE2 OF LITRATURE

Duts%" H. ??8EE with no e"tra cost and you can sell it with your %8!:- :!6E.



?e provide easy payment milestones and deliverable which can helps you pay after your satisfaction.





To compare the use of IT products in institutes H business houses. To know the consumer preference regarding 9T5 ecurity olutions T6



To analye the strategies that the company should adopt to turn viewers into consumers



To know the present status of the competitors of 9T5 ecurity olutionsG in terms of  advertisement

0J

CHAPTER 6 RESEARCH /ETHODOLOY

0

6.1 RESEARCH /ETHODOLOY

6.1.1 Rsar%" Dsi$n4)

! customer survey was undertaken to assess the customers. !n e"ploratory research design was adopted to conduct the study in order to know comparative analysis of consumer preference toward 9T5 security solution H other it companies In order to get the relevant data, primary data was collected by meeting the respondents personally. 6.1. Data %o++%tion

The study is based on primary as well as secondary data. a- Co++%tin$ Primary Data  @rimary data are collected through the responses of the customers through uestionnaires which were specially prepared for this study. The uestionnaire contained uestions regarding the general and socio/economic characteristics of the respondents such as age, religion, educational ualification, etc.  b) Co++%tin$ S%ondary Data4 There was e"tensive use of secondary information in the form of   books, articles published in magaines, 'ournals, newspaper, etc. Priod o! study

The study was conducted for a period of F days. The study involved collection of data from individuals and further information from the profile. 6.1.5 Sam(+ si  >or this study, a sample of * respondents was interviewed from the

customers and workers of 9T5 ecurity olutions. 6.1.6 Sam(+ dsi$n  ense survey, all items in any field of inuiry constitute a #universe$

or #population$. ! complete enumeration of all items in the XpopulationN is known as a census survey. 6.1.: Sam(+in$ Ara4  Qalandhar 3*

.

CHAPTER : DATA ANALYSIS AND INTERPRETATION

31

:.1 DATA ANALYSIS AND INTERPRETATION 1. -o you know about 9T5 ecurities

Table .1 @articulars igure .1

Respondents

 Yes

15

 Yes

35

Intr(rtation

The above analysis reveals that 2*4 of customers know the company and 3*4 doesnNt.

0.

?hat kind of services you avail from the company 30

Table .0 @articulars oftware 7ardware -ata 8ecover Total

8espondents  1* 1F 3*

4age 0* 3F F 1**

>igure

.

Respondents

6

Software Hardware

14

Data Recover

10

0 Intr(rtation

This analysis reveals that 0*4 of the respondents avail software services of the company, 3F4 uses the hardware services and F4 avail the data recover.

33

3.

@articulars

8espondents

4age

=ery 5ood



0*

5ood

F

1F

!verage

10

F*

%ad



1

=ery %ad

3

1*

Total

3*

1**

7ow do rate the performance of the company Table .3

>igure .3

Respondents Very Good 5

3

Good

6 4

12

Average Bad Very Bad

Intr(rtation

This analysis reveals that 0*4 rates it X=ery 5oodN, 1F4 rates it X5oodN, F*4 rates it X!verageN, 14 rates it X%adN, 1*4 rates it X=ery %adN. 3F

6. -o you know about I:IB solution

Table .F @articulars igure .F

Respondents  Yes "o

"o; 22; 44!  Yes; 2; 56!

Intr(rtation

The above analysis reveals that 4 of customers know the company and FF4 doesnNt

3

. -o you recommend the service of 9T5 to others Table . @articulars igure .

8espondents 0* 1* 3*

4age  3F 1**

Respondents

 Yes

10

"o 20

Intr(rtation

The Wuestion this said the service of 9T5 to others 4 igure .

8espondents 1J 1F 1* J *

4age 3 0J 0* 1 1**

3

Respondents



H)g*&y sat)s+ed 1

10

Sat)s+ed D)ssat)s+ed H)g*&y D)ssat)s+ed

14

Intr(rtation

The Wuestion this said services of 9T5 what is your satisfaction level 34 7ighly atisfied, 0J4 atisfied, 0*4 -issatisfied, 14 7ighly -issatisfied.

1*. ?hat is your opinion towards 9T5 services Table .1*

@articulars E"cellent 5ood !verage @oor Total

8espondents J  1* 2 3*

4age 02 12 33 03 1**

>igure .1*

F*

Respondents $%ce&&e't #

Good



Average (oor 10

5

Intr(rtation

The Wuestion this said opinion towards 9T5 services 024 e"cellent, 1245ood, 334 !verage, 034 @oor.

11. 7ow you get the information about 9T5 Ta*+ :.11-

&+89E I:>&86!TI&:

&>  :&.&> 8E@&:-E:T

@E89E:T!5E

?ebsites

10

0F4

>riends H family

1*

0*4

6againes



104

 :ewspapers

F

J4

advertisement

1J

34

total

*

1**4

>I5+8E .11

F1

NO.OF RESPONDENT "ewsaers; 13! ,e-s)tes; 3! aga)'es; 1! .r)e'ds / fa)&y; 31!

Ana+ysis 7 Intr(rtation4

The above table * respondents indicates that 324 peoples gets information from website and 14 from magaines and 134 from news papers.

10. 9T5 runs demo classes for students before enrolling. This practice gives you a better  knowledge about the course contents H the uality of education provided. Ta*+ :.1

&@I:I&:

@E89E:T!5E

trongly atisfied

:&.&> 8@&:-E:T 1J

atisfied

0

04

 :eutral

F

J4

-issatisfied

3

F4

trongly dissatisfied

*

*4

Total

*

1**4

34

FIURE :.1

F0

NO.OF RESPONDENTS D)ssat)s+ed; 6! Stro'g&y "etra&; ! Sat)s+ed; 35! Sat)s+ed; 51!

Ana+ysis 7 Intr(rtation4

The above table of * respondents indicates that, 04 people satisfied of that brand, 34 strongly satisfied, J4 people dissatisfied, F4people strongly dissatisfied.

13. ?hich of the following acts as the best promotional tool Table .13

&+89E I:>&86!TI&: ?ebsites

&>  :&.&> 8E@&:-E:T

@E89E:T!5E

10

0F4

%anners

1*

0*4

eminars



104

 :ewspapers advertisement -oor to -oor

F

J4

1J

34

total

*

1**4 >I5+8E .13

F3

NO.OF RESPONDENT "ewsaers; 13! ,e-s)tes; 3! Se)'ars; 1! Ba''ers; 31!

Ana+ysis 7 Intr(rtation4

The above table * respondents indicates that 324 peoples gets information from website and 14 from banner and 134 from news papers.

1F. The course contents at 9T5 are Ta*+ :.16

!:?E8

:&. 8E@&:-E:T

&> @E89ET!5E

E"cellent

1J

34

=ery good

1

304

5ood

1*

0*4

@oor



104

Total

*

1**4 FIURE :.16

FF

NO. OF RESPONDENTS (oor; 12! Good; 20!

$%ce&&e't; 36!

Very good; 32!

Ana+ysis 7 Intr(rtation4

>rom the above table of * respondents it is shown that 34 peoples are like that course content and 104peoples are not like that content

1:.  ?hat is main purpose of using IT ervices Ta*+ :.1: FIURE :.1:

?&8R

:&.&> 8@:-:T

@E89E:T!5E

@ersonal

0

04

&fficial

0*

F*4

%oth

F

J4

Total

*

1**4

F

NO.OF RESPONDENTS

B78H; !

oc)a&; 40!

erso'a&; 52!

Ana+ysis 7 Intr(rtation4

The above table * respondents indicates that, 04 peoples are using IT services for personal uses,J4 for both purpose and F*4 for official use.

CHAPTER ; F

;.1 Findin$s o! t" study



6a'ority of respondents are aware of the company



6a'ority of respondents give e"cellent rating to the company.





6a'ority of respondents came to know about the company by their friends, followed by relative, print media, college and other sources. %rand name holds a lot of importance for respondents while choosing an education  provider. %esides brand name, customers even look out for uality. F2



%est promotional tools according to survey done are seminars, newspaper ads and  banners

  ;. Limitation o! t" study

This research study was time bound and due to this only a few aspects of the problem were taken up for study. •









ome of the respondents may have told prefer promotion and were much conscious for  their brand. The ma'or problem of the survey was that most of the respondents being very loyal to their brands did not give e"act answers. ;ike they did not talk much about what problems they are facing, what are the different marketing schemes of the brand in which they deal etc. This research study was taken in a limited area only findings may vary if the area of  study is changed. ome of the respondents might have been biased in their responses and as such the analysis and conclusion based on it could vary to some e"tent. ome of the conclusions also depend upon secondary data. To the e"tent these data are reliable, the conclusion derived from them are valid.

FJ

CHAPTER <

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF