Free Samples
IT 604 Cybersecurity Technology And Management
.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}
IT 604 Cybersecurity Technology And Management
0 Download15 Pages / 3,607 Words
Course Code: IT604
University: Majmaah University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Saudi Arabia
Question:
In sports medicine, this exchange of data can be particularly helpful for athletes in order to prevent hurts and increase their enactment. However, security susceptibilities and a nonexistence of security instruction characterizes a risk to game players their personal privacy, as well as the market surrounding the game, including gambles on game results, ticket sales, and advertising contracts. During the real-time data transfer, the process can allow instant diagnoses and used for criminal purposes.
Your research should explore previous data breaches of private sports related data, analyze their ethical concerns and security risks surrounding in sports, and provide action items for sports organizations to improve their cybersecurity efforts.
Answer:
Introduction
Cyber security or computer security can be stated as protection of computerized systems from any type of damage or theft to the respective software, electronic data and hardware. Moreover, misdirection and disruption of various services that are provided are also checked with the help of cyber security. A major importance is provided to this cyber security for incrementing reliance on computerized systems, wireless networks like Wireless Fidelity and Bluetooth and even Internet connection. The major and noteworthy vulnerabilities, which are being discovered are eventually documented within subsequent database of CVE or Common Vulnerabilities and Exposures.
The most common types of cyber threats are denial of service attack, direct access attacks, eavesdropping, phishing, spamming, multi vector attacks, polymorphic attacks, social engineering attacks, privilege escalation, backdoor threat, spoofing, tampering and several others. These risks are required to be mitigated with the help of cyber security. The following project paper outlines a brief discussion on threats as well as security measures of cyber security within Sports medicine. Several solutions will be identified in this project paper and an action plan will be provided for selected solution.
Problem Statement
The exchange of data could be specifically helpful for athletes in sports medicine for the core purpose of preventing all types of hurts and even increment of enactment. However, security susceptibilities as well nonexistence of security instructions eventually characterizes a specified risk to the respective game players for their person security or privacy. Moreover subsequent market that is surrounding game after proper inclusion of gambles on game results, advertising contracts and ticket sales are also at stake. However, it is being noticed that during real time data transfer, the entire procedure could allow an instant diagnoses and hence is being utilized for criminal purposes by attackers.
Objectives
The few objectives for completing this project paper after proper exploration of data breaches in sports medicine are as follows:
i) To explore the previous cases of data breaches of private sports related data.
ii) To analyse major ethical concerns as well as security risks for sports medicine.
iii) To provide suitable solutions to the sports organization regarding data transfer of sports medicine.
iv) To provide action items for proper improvement of cyber security efforts in sports organizations.
Literature Review Regarding the Problem
According to Amin et al., with an increment in frequency, the respective medical devices or organizational databases have eventually become data driven as well as network linked for the core purpose of providing accessible, current and reliable health related data or information. For sports medicine, a proper exchange of data is extremely important for these athletes for preventing against such injuries and hence improving overall athletic performances. Due to higher risk of data getting stolen during data transfer, a proper security is quite mandatory to all of these resources and assets of sports organizations. The attackers could easily use confidential data for using them in criminal activities. Since, devices and data have become more prevalent as well as useful, proper privacy and security is extremely important for safety of athletes. Moreover, it is vital to continuously audit several data systems and also monitoring potential breaches and then informing the parties regarding rights or responsibilities for utilization and distribution of data. As per Ning, Liu and Yang the proper utilization of the technologies is responsible for providing utmost benefits, however risks and threats are also present in these technologies.
Probable Cyber Risks or Threats in Sports Medicine
The sports medicine or sports organization comprise of few of major and the most significant cyber risks or threats that are extremely vulnerable for them and these are required to be mitigated on time for avoiding all types of vulnerabilities or attacks. This type of vulnerability is extremely weak for designing, implementation, internal controlling and operations. For proper security of computerized systems, it is extremely important for understanding attacks, which could be made against attacks and all of the threats of sports organizations are provided below:
i) Backdoor: The first important and significant cyber threat is backdoor. This backdoor within computerized systems is an algorithm as well as a cryptosystem, which is the secret methodology for bypassing the security controls and normal authentication. Cherdantseva et al.stated that this backdoor might even exist for number of reasons after proper inclusion of original designing and from poor configuration. This type of attacks might even be added by authenticated or authorized parties and hence allow few of legitimate access or even by attackers for all types of malicious reasons. A significant vulnerability is also created with this type of cyber threat.
ii) Denial of Service Attacks: The DoS or denial of service attack is designed for making network resource or machine unavailable for intended or authorized users. The attacks could deny the services to individual victims like deliberately entering erroneous or wrong password for causing accounts of victims to get locked and also overloading major abilities of network and machine, hence blocking authenticated users. When network attack from anyone IP address could be blocked by addition of firewall rules. This type of attack could be extremely common for sports organization, since attacker might change IP address and obtain data during data transfer.
iii) Direct Access Attacks: The third important and significant example of cyber threat for sports organization is direct access attack. The attacker, who is obtaining physical access to computer is extremely easier for directly copying of data. These attacks might even compromise with security by simply making modifications in respective operating system and by proper installation of software worms or by utilizing wireless mice. The disk encryption is being designed for prevention against these attacks.
iv) Eavesdropping: Another vital and noteworthy cyber risk is eavesdropping. In this type of attack, the attacker or hacker surreptitiously listens to any private conversation, usually within the hosts of any network. Several programs are being utilized by the attackers for eavesdropping over the systems of the Internet service providers. Moreover, the machines could even operate as the closed systems and hence could be easily eavesdropped through the monitoring of electromagnetic transmissions that are being generated by hardware.
v) Multi Vector Attacks: In the multi vector attack, the cyber criminals eventually combine the range of several threats that are being implemented at the various stages and at the several points of entry for infecting the networks and computers. This is a basic and significant type of the distributed denial of service attacks.
vi) Polymorphic Attacks: The polymorphic virus is extremely harmful, intrusive and destructive kind of malware, which could morph or change and hence makes it difficult for detecting with the antimalware programs. The subsequent evolution of the malicious codes could also occur within the variety of ways like changing of filenames.
vii) Phishing: It is a fraudulent attempt of attacker for acquiring any type of confidential or sensitive information like passwords or usernames directly from users. This type of attack is generally carried out by email spoofing and instant messaging.
viii) Privilege Escalation: The next significant type of cyber threat for sports organization is privilege escalation. It describes the subsequent situation, where any attacker without authorization would elevate the privileges or access level. As per Noam and Gonzalez standardized users have the significant ability of fooling system for providing them subsequent access to restricted data.
ix) Social Engineering: The social engineering eventually aims in convincing the user for disclosing the secrets like usernames or passwords. This type of attack is extremely common during the relevant data transfer.
x) Spoofing: It is the specific act of masquerading as one of the valid entity by the falsification of confidential data like IP address for the purpose of gaining access to resources and information, which is unauthorized for obtaining. Email spoofing and IP address spoofing are the most common examples here.
Case Studies of Data Breaches in Private Sports Company
Several popular case studies are present for data breaches in sports organizations and these case studies have taken place in all over the world. Amongst several security breaches, two most popular and significant data breaches in sports industry regarding sports medicine are as follows:
i) WADA Doping: According to Maxthe first popular case study of such breaching is WADA doping. In September 2014, a Russian cyber espionage group called Fancy Bear has hacked the WADA or World Anti Doping Agency. The hacking group released private medical data as well as evidence for doping on their 41 Olympic athletes. They have included three famous athletes of the US; who were Simone Biles, an Olympic gymnast and Tennis players Venus Williams and Serena. This attack on the WADA was considered as a spear phishing attack. It is extremely difficult for protecting against the flaws in code. This type of doping is an unethical activity and it enhances use of banned athletic performance enhancing drugs by the respective athletic competitors. Although, it is believed that athletes get opportunity of increasing their strength; it is completely banned in every sports. The sports hence became a victim of such activities for few of their athletes.
The typical spear phishing attack of this WADA doping comprises of the unsuspecting user receiving email for looking legitimate and the user clicking on the link within the email as well as entering the credentials over the WADA webpage. This WADA attack eventually targeted the employees and was termed as the potential retaliation against the significant investigation in Russian doping for 2016 Olympic Games. The data that was released comprised of the private information regarding athletes.
Big data is considered as the most relevant and important technology for eradicating this issue. Due to several attributes of big data like velocity, volume, variety and veracity, WADA doping could have been easily identified and performances would have been improved through real time business analytics. Moreover, since this technology is responsible for avoiding all types of preventable outbreaks. Hence, doping could have been reduced to a high level.
ii) Houston Astros Hack: Maxstated that the employees of St. Louis Cardinals have broken into the computer network of Houston Astros in the year of 2013. These employees have utilized the old password of the former general manager for breaking in. The database of Astros included discussions of internal trade, proprietary data of team statistics and players’ data. FBI has not subsequently disclosed the breach severity, however, this type of break in was not found out for the number of months and hence the entire information system was being stolen by the attackers. Astros did not have any security in their database and this was an important reason for such breaches. Furthermore, old passwords were also not changed and employees got the scope for such data breaching. A proper security audit should have been introduced by Astros, however, no such policy or audit was found.
This particular attack could have been restricted with the help of Internet of Things technology. Since, IoT has distinct applications like wearables. Being a sports organization, St. Louis Cardinals could have easily used IoT for their employees and hence only authenticated users would get the chance to access data. Moreover, the attackers would not get any chance for data breaching and data would be safe and secured.
Literature Review Regarding the Solution
The growth or development of the smart devices like smart phones, several smart devices or smart televisions is another important reason for introducing cyber security within any particular organization. These various devices are responsible for constitution of the Internet of Things or IoT. The most significant advantage of the cyber security is to manage all types of vulnerabilities and attacks or threats. This vulnerability is stated as the weakness in designing, implementation, internal control or operation.
The information security that is being designed for the subsequent maintenance of the CIA or confidentiality, integrity as well as availability of data. Moreover, this information security is a basic subset of cyber security. The most significant elements of the cyber security are application security, network security, end user education, information security, operational security, business continuity planning or BCP and disaster recovery or DR planning. There is a constant evolving nature of the security risks and hence these risks are required to be resolved with utmost efficiency and priority. Although, various threats and risks are present for the sports organizations, some of the most significant and important solutions could be implemented for the proper eradication of these attacks.
Using of Big Data
According to Maria and Sasse the recent several technological advances within the sensors, computing and storage capacity have substantially produced huge amount of information regarding athletes. Big data would be extremely effective and efficient for removal of every identified risk or threat. The professional sports league could easily track as well as store the player’s information. The data of player movement could be easily shared with the help of big data and thus there is lesser chance of data getting hacked or lost. Various sports organizations like NFL and MLB have started using this technology for avoiding security breaches.
Internet of Things
The second effective solution that could be significant for data breaches in sports organizations is IoT or internet of things. Since, this is the network of several devices, home appliances and vehicles, which comprise of software, connectivity and actuators; it could be easily used by the sports organizations for avoiding any type of data breaching. The player development and player safety are proper maintained with the applications of IoT and this is done by the proper analysis of data that are being collected through the several devices.
Solutions
The two solutions that are extremely effective and efficient for the proper eradication of the cyber security breaches for the sports medicine in sports organization are as follows:
i) Big Data: The big data are the collection of data sets, which are extremely large as well as complicated for the traditional data processing application software. The data substantially offer higher statistical power and hence leads to the high falsified discovery rate. The most significant challenges of this big data are storing of data, analysis of data, capturing of data, searching, transferring, visualization, and sharing and information privacy. There are three significant components of big data, which are velocity, variety and volume. The current usability of the big data eventually refers to the proper utilization of user behaviour analytics and predictive analytics. The Radio Frequency Identification or RFID readers as well as the wireless sensor network are being utilized within the system for obtaining major benefits.
Regarding the sports organizations, big data could be extremely effective for ceasing any type of cyber threat or cyber-attack and hence the players’ data are protected. For the case study of Astros Houston, the employees were responsible for stealing the passwords for breaking into the system and gaining sports data. However, if they would have implemented the technology of big data, they would have been able to resolve and avoid this type of cyber security effectively. Moreover, the applications like easy detection of cyber threats is easily done with the help of big data. It is also effective for fraud detection.
ii) IoT: The internet of things is the subsequent system for interlinked computing devices and digital machines for easily transferring the data. The human to human or the human to computer interactions are checked with the help of this particular technology. Due to the presence of web enabled smart devices for using embedded processors and sensors for secured collection, sending and acting on the data for acquiring from the relevant environments.
The most suitable application of the internet of things for the sports organizations is wearables. These types of devices are eventually installed and implemented with the sensors or software that could collect the information and data regarding the users of sports organizations. Since, they could broadly cover the fitness and health of the individuals; hence doping is almost impossible with such IoT devices.
Action Plan for Implementing Chosen Solution
Amongst the solutions of big data and IoT, the most suitable solution for sports organization is big data. The action plan for the proper implementation of the big data solution is given below:
Actions
Efficiency
Duration of the Action
1. Performing Daily Security Audits
It would be extremely efficient for the sports organization since the regular security audits could identify data breaches.
This particular action should be implemented as soon as the organization is starting.
2. Hiring Big Data Security Professionals
It is quite efficient as these security professionals would be doing the security audits.
This particular action should be implemented as soon as the organization is working.
3. Ensuring Usability
This particular action would also ensure usability and reliability and is quite efficient.
As soon as the big data is being implemented, the usability is being ensured.
Conclusion
Therefore, from the above discussion, it can be concluded that cyber security is stated as the proper protection of various internet linked systems after the inclusion of software, data and hardware from the cyber threats. Within the technological world, the security eventually consists of the physical security as well as cyber security for helping the organizations to protect against all type of unauthorized access to the data centres or computerized systems. The major focus is provided to the resources and the components of the crucial system for protecting against the most popular and known threats. There are several types of cyber security threats, which are required to be mitigated for the welfare of the organizational resources and relevant as well as confidential data or information. The above project paper has clearly provided a brief discussion on the various types of threats and security measures of cyber security for sports medicine. A proper exchange of data is extremely helpful for the athletes to prevent all types of hurts and then increment the enactment. Cyber security hence is quite important for the sports medicine and the above provided project paper has clearly described the various threats that are common for the sports medicine. Moreover, probable solutions are also provided here with an action plan for the suitable solution.
References
Abomhara, Mohamed, and Geir M. Køien. “Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks.” Journal of Cyber Security 4, no. 1 (2015): 65-88.
Amin, Saurabh, Xavier Litrico, S. Shankar Sastry, and Alexandre M. Bayen. “Cyber security of water SCADA systems—Part II: Attack detection using enhanced hydrodynamic models.” IEEE Transactions on Control Systems Technology 21, no. 5 (2013): 1679-1693.
Amin, Saurabh, Xavier Litrico, Shankar Sastry, and Alexandre M. Bayen. “Cyber security of water SCADA systems—Part I: Analysis and experimentation of stealthy deception attacks.” IEEE Transactions on Control Systems Technology 21, no. 5 (2013): 1963-1970.
Ashok, Aditya, Adam Hahn, and Manimaran Govindarasu. “Cyber-physical security of wide-area monitoring, protection and control in a smart grid environment.” Journal of advanced research 5, no. 4 (2014): 481-489.
Bada, Maria, and Angela Sasse. “Cyber security awareness campaigns: Why do they fail to change behaviour?.” (2014).
Ben-Asher, Noam, and Cleotilde Gonzalez. “Effects of cyber security knowledge on attack detection.” Computers in Human Behavior 48 (2015): 51-61.
Buczak, Anna L., and Erhan Guven. “A survey of data mining and machine learning methods for cyber security intrusion detection.” IEEE Communications Surveys & Tutorials 18, no. 2 (2016): 1153-1176.
Cavelty, Myriam Dunn. “Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities.” Science and engineering ethics 20, no. 3 (2014): 701-715.
Cherdantseva, Yulia, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, and Kristan Stoddart. “A review of cyber security risk assessment methods for SCADA systems.” Computers & security 56 (2016): 1-27.
Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. “Defining cybersecurity.” Technology Innovation Management Review 4, no. 10 (2014).
Elmaghraby, Adel S., and Michael M. Losavio. “Cyber security challenges in Smart Cities: Safety, security and privacy.” Journal of advanced research 5, no. 4 (2014): 491-497.
Fielder, Andrew, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, and Fabrizio Smeraldi. “Decision support approaches for cyber security investment.” Decision Support Systems 86 (2016): 13-23.
Greenwald, Max. “Cybersecurity in Sports.” (2017).
Hahn, Adam, Aditya Ashok, Siddharth Sridhar, and Manimaran Govindarasu. “Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid.” IEEE Transactions on Smart Grid 4, no. 2 (2013): 847-855.
Hong, Junho, Chen-Ching Liu, and Manimaran Govindarasu. “Integrated anomaly detection for cyber security of the substations.” IEEE Transactions on Smart Grid 5, no. 4 (2014): 1643-1653.
Knowles, William, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso, and Kevin Jones. “A survey of cyber security management in industrial control systems.” International journal of critical infrastructure protection 9 (2015): 52-80.
Liu, Yang, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh, Manish Karir, Michael Bailey, and Mingyan Liu. “Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents.” In USENIX Security Symposium, pp. 1009-1024. 2015.
Luiijf, Eric, Kim Besseling, and Patrick De Graaf. “Nineteen national cyber security strategies.” International Journal of Critical Infrastructures 6 9, no. 1-2 (2013): 3-31.
Ning, Huansheng, Hong Liu, and Laurence Yang. “Cyber-entity security in the Internet of things.” Computer (2013): 1.
Sommestad, Teodor, Mathias Ekstedt, and Hannes Holm. “The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures.” IEEE Systems Journal 7, no. 3 (2013): 363-373.
Sou, Kin Cheong, Henrik Sandberg, and Karl Henrik Johansson. “On the exact solution to a smart grid cyber-security analysis problem.” IEEE Transactions on Smart Grid4, no. 2 (2013): 856-865.
Von Solms, Rossouw, and Johan Van Niekerk. “From information security to cyber security.” computers & security38 (2013): 97-102.
Wang, Wenye, and Zhuo Lu. “Cyber security in the smart grid: Survey and challenges.” Computer Networks 57, no. 5 (2013): 1344-1371.
Wells, Lee J., Jaime A. Camelio, Christopher B. Williams, and Jules White. “Cyber-physical security challenges in manufacturing systems.” Manufacturing Letters 2, no. 2 (2014): 74-77.
Free Membership to World’s Largest Sample Bank
To View this & another 50000+ free samples. Please put
your valid email id.
Yes, alert me for offers and important updates
Submit
Download Sample Now
Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.
UploadUnique Document
DocumentUnder Evaluation
Get Moneyinto Your Wallet
Total 15 pages
PAY 9 USD TO DOWNLOAD
*The content must not be available online or in our existing Database to qualify as
unique.
Cite This Work
To export a reference to this article please select a referencing stye below:
APA
MLA
Harvard
OSCOLA
Vancouver
My Assignment Help. (2021). IT 604 Cybersecurity Technology And Management. Retrieved from https://myassignmenthelp.com/free-samples/it604-cybersecurity-technology-and-management/electronic-data-and-hardware.html.
“IT 604 Cybersecurity Technology And Management.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/it604-cybersecurity-technology-and-management/electronic-data-and-hardware.html.
My Assignment Help (2021) IT 604 Cybersecurity Technology And Management [Online]. Available from: https://myassignmenthelp.com/free-samples/it604-cybersecurity-technology-and-management/electronic-data-and-hardware.html[Accessed 18 December 2021].
My Assignment Help. ‘IT 604 Cybersecurity Technology And Management’ (My Assignment Help, 2021)
My Assignment Help. IT 604 Cybersecurity Technology And Management [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/it604-cybersecurity-technology-and-management/electronic-data-and-hardware.html.
×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}
×
Thank you for your interest
The respective sample has been mail to your register email id
×
CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.
Account created successfully!
We have sent login details on your registered email.
User:
Password:
At MyAssignmenthelp.com, we always go the extra mile to support the students with comprehensive assistance. Along with assignment help Melbourne service, students will get their hands on a number of automated tools and develop a flawless assignment. We have a plagiarism checking tool, rewriting tool, GPA calculator, essay typer. These tools help avoid the most embarrassing writing mistakes. High-quality scanning, free and unlimited use, and smooth interface have made these tools popular among the students. Cite, download, or edit-all for FREE.
Latest Management Samples
div#loaddata .card img {max-width: 100%;
}
MPM755 Building Success In Commerce
Download :
0 | Pages :
9
Course Code: MPM755
University: Deakin University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More
SNM660 Evidence Based Practice
Download :
0 | Pages :
8
Course Code: SNM660
University: The University Of Sheffield
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration
BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20
Course Code: BSBHRM513
University: Tafe NSW
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More
MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5
Course Code: MKT2031
University: University Of Northampton
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration
MN506 System Management
Download :
0 | Pages :
7
Course Code: MN506
University: Melbourne Institute Of Technology
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology
Next