Sei sulla pagina 1di 26

T

TASK 1 / TASK 2
REPORT
ON

ENTREPRENEURSHIP (UCX-249)

Submitted in Partial Fulfillment of

Course – B.E- Computer Science and Engineering

At

CHANDIGARH UNIVERSITY, GHARUAN


BATCH (2019-2023)

Submitted By

NAME – AYASHA PUNDIR

UID – 19BCS1005

CLASS – CSE-1(A)
PRE-PHASE
Assignment-1

ENTREPRENEURIAL
REPORT
PRABHKIRAN SINGH
1. ENTREPRENEUR STORY
Prabhkiran Singh and Siddharth Munot are the founders of this highly famous E-
commerce startup known as Bewakoof.Com.

Both of them are civil graduates from IIT Bombay and always wanted to go on an
entrepreneurial journey. But after graduating from IIT Bombay, each of them started out
their careers one at a time.

Prabhkiran commenced with his Lassi mission outdoor his college and named it khadke
gLASSI. Unfortunately, this didn’t go that properly and as a result led to shut down
quickly. At the identical time, Siddharth started operating with an academic startup.
Much later, these outstanding minds decided to begin their personal commercial
enterprise of T-Shirt printing.

It so took place that each founders of Bewakoof Prabhkiran Singh & Siddharth Munot
were sitting outdoor their campus drilling a few thoughts to start their task. And this led
them to strike this T-blouse printing concept. So the concept again then turned into to
design something that would bring the humor element to college students.

This led to both of them researching the present day young people traits, way of life.
Following this, they began designing charges for their printing T-Shirt mission thus. And
that’s how this cool logo came into life. Back in 2010, whilst Prabhkiran Singh &
Siddharth Munot were attempting to find some area call for their newly started printing
T-Shirts commercial enterprise, they got here across the idea of taking Bewakoof.Com.

And it so took place that the month of April turned into about to start and April Fool’s day
became simply nearby. Also, the call is humorous, witty, and without problems
resonating with the youngsters, they went in advance and bought the area. The internet
site become released in 2012 even though. The target market for this website had been
the university college students for whom Bewakoof started developing humorous t-shirts
depicting numerous eventualities of their lives.
2.VENTURE DETAILS

Their story Launched on April 1, 2012, with the aid of IITians Prabhkiran Singh and
Siddharth Munot, Bewakoof.Com has trusted quirky, funny, out-of-the-container
messaging on its merchandise to hook up with its customers. Before starting out
collectively, Siddharth labored with an schooling startup, while Prabhkiran ran a
commercial enterprise promoting sparkling flavoured lassi via take-away joints named
‘KhadkegLASSI’. Bewakoof.Com became started with an investment of Rs 30,000, and
they received seed investment after six months in operations. They also raised
institutional angel investment couple of months in the past from Snapdeal founders
Kunal Bahl and Rohit Bansal, and Former IDFC Securities MD, Nikhil Vora. Talking
approximately their decision to name their undertaking Bewakoof, Siddharth says, “We
simply got fortunate with it. During our college days we had a hobby of purchasing
unique domain names which we could promote at premium in destiny. Bewakoof.Com
turned into offered years earlier than the logo changed into released. When we had
been launching our life-style brand we understood that a amazing emblem call and
domain is important -- some thing quick and smooth to recollect. The dots related well
and Bewakoof.Com became the perfect preference. It’s a superb increase for
advertising as well – it’s catchy and exceptional. Once we get people’s interest with our
brand name, they keep in mind it for the rest of their lives.”

What they do Bewakoof.Com sells apparels and cell telephone covers. It claims to be
doing transactions well worth Rs 1.Five crore per month, with t-shirts being their nice
sellers. Their ‘Ghanta’ series of t-shirts for college students with messages like ‘Ghanta
Engineering/Ghanta MBA’ etc had been their exceptional promoting products. A
considerable bite of its client base comprises of college students and children in the age
organization of sixteen-34 years. Prabhkiran Singh When requested why they have
limited themselves to best apparels whilst maximum e-trade web sites have a horizontal
supplying, Prabhkiran says both are distinctive enterprise models having its very own
strengths and weaknesses. “In our play, we've high margins and a totally high consumer
loyalty because of our differentiated and precise products,” he says. All products that
Bewakoof sells on its web site is designed and synthetic by them, they are no longer a
marketplace like Flipkart and Snapdeal, and so on. Until someday back, Bewakoof.Com
also retailed its products via offline shops in Mumbai. However, they've discontinued
their offline thrust and nowadays promote stuff online-simplest. Metros and tier-2 towns
are great markets for Bewakoof. Cities like Pune, Bangalore, and Kota, in which there is
a large congregation of younger population for have a look at/work, also contribute
properly to their income. They are also very famous in the North-East with Assam
constantly being considered one of their top-appearing states.
3.CHALLENGES FACED
Ever wondered how hard it might be to begin your personal organization? According to
Prabhkiran Singh, it may be as easy (or as tough) as a deep-sea dive. The
Bewakoof.Com cofounder (who has been diving in view that he changed into 22)
believes that diving into the sea is lots like diving into the startup global. It calls for
careful making plans.

After experimenting with flavours in his hostel room, Singh opened the first outlet of
Khadhke Glassi. For the primary 45 days, he offered lassi himself, due to the fact he
couldn’t have enough money body of workers. A Facebook page and phrase of mouth
made his first undertaking a fulfillment story and any other outlet changed into launched
soon. But the monsoon performed spoilsport. "I found humans didn’t drink lassi within
the monsoon, hence I had to shut the shops," says Singh, who then teamed up with
batchmate Siddharth Munot to release on line clothing store Bewakoof.Com. Initial
funding become the primary hurdle. Singh and Munot mortgaged their family property
and positioned loads at stake to set up the brand. A few months ago, Snapdeal
founders, Nikhil Vora and other influential angel buyers picked up stakes in Bewakoof.

Bewakoof began its adventure of miles from step one and have become one of the
leaders in the marketplace just in a small span of time. The competition are left behind
and the mission is gaining its reputation some of the target customers.

Asking to the co-founder Siddharth approximately the competitors, he said that during
their portfolio, they don’t have any competitor.

Rather there are some sites like Inkfruit, Teesort, who're in the identical enterprise and
they have early movers advantage. Bewakoof.Com has gathered its target customers
quite wisely. Now sites like Inkfruit, Teesort.Com are lagging a ways in the back of
Bewakoof in phrases of recognition. One factor Bewakoof will need to do is to attract
increasingly customers from the nearby local market manner offline clients
4.MARKETING STRATEGIES
Nothing can speak greater about the assignment apart from its stats and turnover.
Within a quick span, with an annual turnover of Rs10crores and month-to-month
transactions of well worth Rs1.5crore, Bewakoof.Com claims to be a worthwhile e-
commerce website online. “We are self-sustainable and developing 15-20% month-on-
month,” stated the co-founder Prabhkiran Singh. A document issued few months ago
showing stats of Bewakoof.Com is displayed beneath.

The organization used social platforms like Justdial and Facebook to sell their
merchandise in addition to internet site. The impact changed into in reality seen and in
much less than a few months, 75 thousand fans on Facebook had been engaged.
Other than the social media platform, the employer also arranges huge university
campaigns wherein students are asked to unfold Beewakoofy around their college
campus and the employer then gives a unfastened Tees to them.

For in addition promotion of their products, the corporation has additionally tied up with
many pinnacle brand e-commerce web sites to sell their merchandise which include
Snapdeal, Indiatimes Shopping and Seventymm.
Multiple payment method option also comes beneath their marketing approach.
Credit/debit card, net banking, cash/card on transport options are to be had to pay from.

COD has benefit over different charge strategies that it permits the customer to open
the field and take a look at the product before paying to the channel accomplice.

Marketing to force site visitors to their legitimate website is finished using the two most
popular Facebook pages 2 Min Aaya Yaar Raste Mei Hoon and bewakoof.Com.

The great power of the brand is their catchy and modern quotations printed on different
products. It draws the human beings inside the first appearance. Other than this, the
replacement coverage allows the clients effortlessly in shopping for any item.
Customers can pay the use of the approach COD with an advantage to test the product
earlier than paying to the channel associate.

Increasing Popularity

• 2 million monthly hits on website


• Shipping started out over ninety international locations
• Over 17lacs Facebook enthusiasts
• Over 3500 energetic followers on Twitter
• Over 6000 followers on Instagram
PLAGIARISM REPORT
Assignment-2

KNOWING
YOUR
FIELD
INFORMATION SECURITY

1.DESCRIPTION OF FIELD
Information security, now and again abbreviated to infosec, is a set of practices meant
to preserve information cozy from unauthorized get entry to or alterations, both while it
is being saved and whilst it is being transmitted from one gadget or physical area to
another. You may every now and then see it called facts safety. As knowledge has end
up one of the 21st century's maximum vital belongings, efforts to keep statistics cozy
have correspondingly come to be increasingly crucial.

Information security concepts


The simple components of statistics security are most often summed up with the aid of
the so-called CIA triad: confidentiality, integrity, and availability.

Confidentiality is perhaps the detail of the triad that most right now involves thoughts
when you think about information security. Data is personal whilst simplest those those
who are legal to access it can do so; to make sure confidentiality, you need in order to
perceive who is making an attempt to access records and block tries by using the ones
with out authorization. Passwords, encryption, authentication, and defense against
penetration attacks are all techniques designed to make sure confidentiality.

Integrity approach retaining information in its accurate country and stopping it from
being improperly modified, both through twist of fate or maliciously. Many of the
strategies that make certain confidentiality may also shield statistics integrity—in spite of
everything, a hacker cannot alternate data they can't get entry to—but there are other
gear that help offer a defense of integrity in depth: checksums can help you verify
records integrity, as an instance, and model control software and frequent backups
allow you to repair information to a accurate nation if need be. Integrity also covers the
idea of non-repudiation: you need to be able to prove which you've maintained the
integrity of your facts, especially in legal contexts.

Availability is the mirror image of confidentiality: even as you want to make sure that
your statistics cannot be accessed with the aid of unauthorized customers, you
furthermore may want to make certain that it is able to be accessed by those who have
the proper permissions. Ensuring information availability manner matching community
and computing sources to the quantity of statistics access you count on and
implementing a very good backup coverage for disaster recovery purposes.

In an ideal global, your information have to constantly be kept private, in its correct
state, and to be had; in practice, of route, you frequently need to make picks about
which records protection concepts to emphasize, and that requires assessing your
facts.

Major strategies used are:

> Identification:-
Identification occurs when a consumer (or any problem) claims or professes an
identity. This can be done with a username, a technique ID, a smart
card, or whatever else that may uniquely identify a subject. Security
structures use this identity while figuring out if a topic can get entry to an
object.

> Authentication:-
Authentication is the technique of proving an identity and it occurs when topics
provide suitable credentials to show their identity. For example, when a consumer
presents the perfect password with a username, the password proves that the
person is the proprietor of the username. In short, the authentication provides evidence
of a claimed identification.
There are numerous strategies of authentication that I’ll cowl in some other submit, but
inquick they may be:
● Something you already know, together with a password or PIN
● Something you have got, inclusive of a smartcard pancard, or RSA token
● Something you are, the use of biometrics

>Authorization:-
Once a user is identified and authenticated, they may be granted authorization based
totally on their established identification. It’s crucial to factor out that you can’t have
separate authorization without identity and authentication. In different words,if anyone
logs on with the same account you can furnish get entry to to assets for every body, or
block get right of entry to to resources for anybody. If all and sundry makes use of the
same account, you could’t differentiate between users. However, whilst customers have
been authenticated with special consumer money owed, they can be granted get right of
entry to to extraordinary assets based totally on their identity.

In precis, it’s important to apprehend the differences among identification,


authentication, and authorization.Identification occurs whilst a topic claims an
identification (including with a username) and authentication happens while a topic
proves their identity (which include with a password). Once the difficulty has a confirmed
identification, authorization techniques can grant or block get entry to to items based on
their verified identities.
2.PRACTICABILITY
With cybercrime on the upward thrust the safety of facts (statistics security) is the
maximum critical. The safety of networks is essential to save you loss of server
resources as nicely as to shield the community from being used for illegal purposes.
Information security is an ongoing and never ending procedure. Each statistics
protection method has its unique capabilities and applicability. To ensure records
security the satisfactory that can be achieved is to implement a huge variety of answers
and extra closely screen who has access to what community assets and information.

❖ Cryptography : Cryptography, a phrase with Greek origins, means “secret


writing”. Cryptography is utilized in records safety to defend statistics from
unauthorized or unintentional disclosure at the same time as the records is in
transit and whilst records is in storage Information protection makes use of
cryptography to convert usable facts into a shape that renders it unusable with
the aid of each person other than an authorized person, this system is referred to
as encryption. The original message is cited as plaintext and the message this is
despatched thru the channel is referred to as the cipher textual content.
Information that has been encrypted can be transformed again into its unique
usable form with the aid of an authorized consumer, who possesses the
cryptographic key, via the process of decryption.
❖ Traditional Ciphers : Traditional ciphers used two techniques for hiding
information from an intruder: substitution and transposition.
❖ Substitution Ciphers : A substitution cipher replaces one symbol with another.
If the symbols in the plaintext are alphabetic characters, we replace one
character with another.
❖ Transposition Ciphers : A transposition cipher does not substitute one symbol
for another; instead it changes the location of the symbols. A symbol in the first
position of the plaintext may appear in the tenth position of the cipher text, while
a symbol in the eighth position in the plaintext may appear in the first position of
the cipher text. In other words, a transposition cipher reorders (transposes) the
symbols.
❖ Modern symmetric-key ciphers:-Since traditional ciphers are no longer secure,
modern symmetric-key ciphers have been developed. Modern ciphers normally
use a combination of substitution, transposition and some other complex
transformations to create a cipher text from a plaintext. Modern ciphers are bit-
oriented (instead of character-oriented). The plaintext, cipher text and the key are
strings of bits.
❖ Asymmetric-Key Cryptography : Asymmetric-key cryptography is used for
confidentiality. Unlike symmetric key cryptography, there are exceptional keys in
asymmetric key cryptography, a personal key and a public key. If encryption and
decryption are concept of as locking and unlocking padlocks with keys, then the
padlock this is locked with a public key can be unlocked simplest with the
corresponding personal key. Both symmetric-key and asymmetric-key
cryptography will continue to exist in parallel. The conceptual variations between
the two systems are based totally on how these structures keep a mystery. In
symmetric-key cryptography, the name of the game token should be shared
among parties. In asymmetric key cryptography, the token is unshared each
birthday celebration creates its personal token. It is thought that both are
complements of each other. The blessings of one can catch up on the risks of the
other.
3.RELEVANCE
Many people still have no idea about the significance of data security for corporations.
Many managers have the false impression that their records is completely relaxed and
free from any threats. And that is a massive mistake!
As a whole lot as a organization takes steps to protect its highbrow assets, it is critical to
set aside the belief that it is impossible for a person to interrupt into your information.
With the advancement of technology, cyber-assaults are renewing rapidly, or even
before you comprehend it, your agency may additionally already be at threat once more.
That’s why you need to be very cautious along with your confidential pieces of facts.
As we've visible, there are numerous errors which could undermine the confidentiality of
facts in companies.
It is in opposition to these errors that Information Security control system, bringing
blessings like those that we are able to see next

(i). Access Control Effectiveness


Today the marketplace gives a huge range of structures to allow get admission to to
positive records. This makes it possible for unauthorized men and women to benefit get
admission to to sensitive statistics.
Some of those mechanisms are physical, as within the case of password-covered
rooms. Limited to 3 people, or maybe cameras.
There also are the maximum difficult manner of access, inclusive of the digital
signature, which identifies the user accessing the files and validates the digital
documents, as it guarantees the know-how of the creators of certain information.
Another crucial rule for records manage is to restriction the use of personal device with
the aid of employees within the employer, preventing private gadgets such as mobile
telephones, notebooks and so forth from being controlled as tightly as agency
equipment.

(ii). For the IT Sector


Having an IT department, including Information Technology, prepared to deal with the
safety of records is fundamental today. There are already various information protection
tools that will let you keep away from main problems and ensure the integrity and
confidentiality of data, which in the end is the primary want of agencies. Information will
simplest be secure whilst customers and IT experts act for that reason, putting in region
the first-rate ways to avoid destiny dangers.

(iii).Backup
For any record, it's far vital to have at the least two copies saved in distinct places than
the original document, ie out of doors the enterprise surroundings.
The backup is capable of fast retrieve statistics misplaced by using coincidence, theft or
different fatalities that may appear.
It can be saved in tough copies, which include CDs, or within the cloud, an choice
extensively used by IT professionals.

(iv).Solid Security Framework


Around internal and outside communication, there will continually be a well-described
protection method, which allows hold a stable shape in the back of company statistics.
The most interested events to your business enterprise’s safety are clients, who don’t
need to have their statistics exposed improperly. And the use of the data safety
coverage improves the recognition of your business inside the market due to this.
Finally, statistics protection cognizance is a totally crucial practice for all medium and
big enterprise. It will shield business enterprise facts by means of preventing threats
and vulnerabilities. One of the maximum critical mottos of technology fiction says “the
destiny is now,” but this is a future that everyone has a obligation to build. This is a
simple message, but one that calls for entrepreneurs’ dedication to recognizing
protection as an indispensable component in the invention of the future.
SWOT ANALYSIS ON INFORMATION TECHNOLOY
SWOT stands for Strengths, Weaknesses/Limitations, Opportunities and Threats. A
SWOT evaluation is a technique of analyzing inner factors a commercial enterprise can
manipulate and external factors it cannot manage. ... This type of analysis can be used
on a departmental or useful foundation, inclusive of a business enterprise's protection.

In statistics security, a SWOT evaluation may be beneficial for developing a higher


expertise of the security environment. It also can help the business' overarching method
by giving insight into safety assets, dangers, problems, and challenges that the statistics
generation department - and for that reason, the business as an entire - might be
confronted with.
A SWOT analysis is beneficial in assisting an organization pick and put into effect its
business method and have interaction in strategic making plans. What can the agency
accomplish within the subsequent year? What does the corporation want to look out
for? Typically, it's miles displayed as a rectangle with four quadrants, each quadrant
representing one of the four categories. This can both be drawn on paper or offered on
a whiteboard in order that an entire group can take part within the analysis.
SWOT represents four critical subjects while organizations are involved:

• The strengths they possess


• The weaknesses they need to address
• The opportunities gift
• And, the outside threats they face

Strengths:

• strong information encryption practices


• regularly updated antivirus software
• sturdy get entry to policy
Weaknesses:

• lack of a written safety plan


• spotty replace method for protection patches
• poor protection funding

Opportunities:

• options for cloud garage for statistics, preserving facts relaxed and backed up
off-site
Threats:

• environmental concerns which includes flooding or hearth


• computer viruses
• hacking tries
• non-compliance with rules
These are, of course, distinctive from what a advertising department's SWOT analysis
might seem like or the overall SWOT analysis for the enterprise, but they can assist
guide the system of the agency's statistics safety strategy - and support the business
inside the technique.
INTRODUCTION AS AN ENTREPRENEUR

I regularly examine approximately people and control groups approximately the pros
and cons of unique security tasks. Those accountable for safety these days are
frequently inundated with information on the subject. They see all the hype around the
merchandise, examine the headlines of rising concerns and listen masses of predictions
about what is subsequent. It's not difficult to see why some just want to know what to do
now and what's going to have the most important impact.

Most companies I've seen have recognized and implemented a few of thecommon
technologies critical to any security program. They have a firewall, antivirus software
program, intrusion detection/safety, authentication technology and so forth. However,
what keeps to subject me is that those systems regularly move untested and
unmanaged and consequently create a fake sense of safety.

So whilst some companies would benefit from knowing what safety gadgets to enforce,
for lots, the most valuable hints are concerning approaches. In many situations,
businesses still fail to comprehend that a safety application is just the beginning. All too
often, tracking and assessment responsibilities are either left out, underfunded or just
no longer done well.
Security audits are one of the first-rate approaches to discover safety risks and validate
the safety gadgets already positioned into location. Additionally, they're a useful aid for
justifying security budgets. However, many businesses nowadays fail to carry out
everyday comprehensive audits of their internal and/or outside IT infrastructure. And
those who do perform audits often simply test the externally exposed devices or
handiest have excessive-degree audits completed to make sure the above stated
"common technologies" are being applied. Comprehensive audits, however, should very
well check for all acknowledged vulnerabilities of all structures, correlate the findings,
take a look at exploits, identify the true level of risk to the business and detail
remediation necessities. Audits nicely accomplished with all these strategies with the
aid of a reputable firm are in truth one of the maximum crucial projects you may adopt
these days.

One of the reasons why protection audits pinnacle my list is that they lay the
groundwork for figuring out what is wanted to comfortable the IT infrastructure. In
addition, they provide objective insight at the effectiveness of your typical protection
software. Such audits should be finished as a minimum once in keeping with 12 months
towards the inner environment and every six to 365 days against the outside
environment. This frequency is a counseled minimal, and lots of organizations rightfully
decide on to check certain components of a full audit more frequently.
>Some important roles of statistics security in one-of-a-kind fields are as follows:-
● Security policy: To provide control path and help for records safety in accordance
with commercial enterprise requirements and applicable laws and regulations.

● Organization of information safety:


➢ Internal Organization: To manipulate records security inside the agency.
➢ External Parties: To preserve the security of the organization’s information and
facts processing centers that are accessed, processed, communicated to, or
managed via external parties.

● Asset management:
➢ Responsibility for assets: To obtain and preserve appropriate safety of
organizational property.
➢ Information category: To ensure that facts receives the appropriate level of
safety.

● Human sources safety:


➢ Prior to employment: To ensure that personnel, contractors and 0.33 birthday
party customers apprehend their obligations, are suitable for the roles they're
considered for, so as to lessen the danger of theft, fraud or misuse of centers.
➢ During employment: To make certain that all personnel, contractors and 0.33
birthday celebration users are aware of records protection threats and issues,
their duties and liabilities, and are equipped to help organizational safety policy
within the course of their ordinary paintings, for you to reduce the hazard of
human errors.
➢ Termination or trade of employment: To make certain that employees,
contractors and 1/3 celebration users exit an company or alternate employment
in an orderly way.

● Physical and environmental protection:


➢ Secure areas: To save you unauthorized bodily get entry to, harm and
interference to the business enterprise’s premises and statistics.
➢ Equipment security: To prevent loss, harm, robbery or compromise of assets
and interruption to the enterprise’s sports.
● Communications and operations control:
➢ Operational processes and duties:To ensure the right and secure operation of
records processing facilities.
➢ Third birthday celebration service transport management: To put into effect
and hold the proper level of records protection and provider shipping in keeping
with 1/3 birthday party carrier delivery agreements.
➢ Backup: To preserve the integrity and availability of statistics and statistics
processing facilities.
➢ Network protection management: To make sure the protection of records in
networks and the safety of the supporting infrastructure.
➢ Media dealing with: To save you unauthorized disclosure, modification,
elimination or destruction of belongings, and the interruption of business
activities.
➢ Exchange of facts: To preserve the security of information and software
exchanged inside an organization and with any outside entity.
➢ Electronic commerce offerings: To make certain the security of digital trade
offerings, and their comfortable use.
➢ Monitoring: To detect unauthorized information processing activities.

● Access control:
➢ Business requirement for get right of entry to manipulate: To manipulate get
admission to to data.
➢ User get admission to control: To ensure authorized consumer get entry to
and to save you unauthorized get entry to to data systems.
➢ User obligations: To prevent unauthorized person access, and compromise or
robbery of statistics and facts processing facilities.
➢ Network get admission to manipulate: To prevent unauthorized access to
networked offerings.
➢ Operating gadget get entry to manipulate: To prevent unauthorized get entry
to to running structures.
➢ Application and data get right of entry to manage: To save you unauthorized
access to information held in application structures.
➢ Mobile computing and teleworking: To ensure data protection while using
cellular computing and teleworking facilities.

● Information structures acquisition, improvement andrenovation:


➢ Security necessities of records systems: To make sure that security is an vital
part of records structures.
➢ Correct processing in programs: To prevent errors, loss, unauthorized change
or misuse of statistics in programs.
➢ Cryptographic controls: To shield the confidentiality, authenticity or integrity of
records via cryptographic manner.
➢ Security of device documents: To make sure the security of machine
documents.
➢ Security in development and guide processes: To keep the security of
application system software and records.
➢ Technical Vulnerability Management: To lessen dangers resulting from
exploitation of published technical vulnerabilities.

● Information security incident management:

➢ Reporting records security events and weaknesses: To ensure information


security occasions and weaknesses related to records structures are
communicated in a way that lets in timely corrective motion to be taken.
➢ Management of statistics safety incidents and enhancements: To make sure
a regular and powerful technique is carried out to the control of information
protection incidents.

● Compliance:
➢ Compliance with criminal necessities: To avoid breaches of any law,
statutory, regulatory or contractual obligations, and of any security necessities.
➢ Compliance with security regulations and standards, and technical
compliance: To make certain compliance of structures with organizational safety
guidelines and preferred
PLAGIARISM REPORT

Potrebbero piacerti anche