My company belongs to the computer security domain of activity. We sell a product range named CalyxSuite which contains an SSO product (Single Sign On), CalyxCrypto which encrypts data, and CalyxAdmin which allows making a distant security management from a single post. To find the information I needed to write the report on the CalyxSuite product range and more specifically on the SSO process, I looked for in the internal company sources of information. I was able to use documentation on products and business information on our domain of activities. The documentation of the sales force was the more useful to me as it kept the essential data, to clearly explain it to business partners. In the internal documentation I had the opportunity to study different treatments of the subject depending on the person the documentation was addressed to.
[...] The Munter model explains that the communicator chooses channel to send message to a specific audience who send a response. All this process depends on a cultural context which will give the code to decode the message sent by the communicator. Here is all the difficulty of communication. Whether you are from a country or another part of the world, a situation won't have the same impact on you because your cultural key to understand the given message will differ from another person. [...]
[...] The difficult part of the communication to me deals with emotion. Emotion can't be exclusively driven by method, and because through emotion, people touch the deep part of a person. This is good to talk about emotion at work because human kind mustn't be reduced to method and controlled business communication. Nevertheless, the access of this kind of expression has definitely to be limited to protect people from abusive behaviour. That's why I would say that emotion has to be used to underlight specific information to make it understandable but no more. [...]
[...] I could use documentation on products, business information on our domain of activities. The documentation to sales force was the more useful to me as it keeps the essential data to clearly explain it to business partners. In the internal documentation I had the opportunity to read different treatment of the subject depending on the person the documentation was addressed to. Then, we have a documentation which is used by salesforce to explain what the computer security consists in. this is basically to people who haven't understood the interest of such process within a company. [...]
[...] The principle is to gather rights of access and resources of identification. The key ideas are the following ones: Management of access code and user's control Centralisation and secured identification The logon management, that consists in server which can't be easily accessed by users thanks to complex passwords to increase the user security. Management of the shared applications and of the web The requirement for identifications are controlled All the steps of identification are managed The PC or access at the office Diane NEVEU –business communication- May Protection of the hard disk, of the server and laptops Management of rights of access, applications, files Reducing the rights of access to options which belongs to the PC Concerning the Web access, the CESNET technical report number 21/2006 gives us specific information. [...]
[...] The company we work in makes its business thanks to computer security. The products it sales are named CalyxSuite among other products. The aim of this product is triple: it protects the access of your PC; its controls the access to the data of a network and it allows to control from a single PC access. This is all about security and infrastructure. Beyond the anti virus and the firewall, the information system security begins with a strategic choice in using more and more sophisticated techniques. [...]
Source aux normes APA
Pour votre bibliographieLecture en ligne
avec notre liseuse dédiée !Contenu vérifié
par notre comité de lecture