Saudi Arabia | Dubai | UAE | Abu Dhabi | Riyadh | Qatar | Dammam | Makkah | Bahrain | Sharjah | Jeddah | Oman
FPSC | PPSC | SPSC | KPPSC | AJKPSC | PPSC | Join Pak Navy | Join Pak Army | PAF | FIA | Police | Rangers
Medical | Bank | Teaching | Engineering | Data Entry | PHP | Latest Posts
Arslan Mehmood
In 2018, After finishing my graduation I joined a privately owned business as a Team Lead, Marketing. Despite the fact that the organization was making benefits, these were peripheral and there was a high staff wearing down rate on the grounds that the organization couldnt compensate its workers as indicated by winning business sector rates. After a short deals check, I immediately acknowledged benefits could be multiplied. Subsequent to imparting this data to the chief, I was doled out to draft another showcasing procedure to help the organizations deals. In any case, some old staff were not inviting of the thought and would not collaborate in the drafting of the new guide. To prevail upon them, I sorted out little bunch gatherings where I enabled everybody to express their feelings of trepidation or hesitations about the proposed changes. I at that point offered my vision to them, sharing my fruitful stretches at my past activity. I likewise urged them to allocate explicit obligations to every single part and perceived the commitment of every last one of them. They felt esteemed and after a short time, everybody grasped my thought. I at that point set about finding the overall buyer needs, goals and recognitions. I planned client post employment surveys and sorted out centered gathering dialogs to decide their perspectives about the items we were selling them. Subsequent to accumulating a rundown of client needs, I convinced the supervisor to give me a chance to lead an advancement drive to help our business, which he readily obliged. Inside a half year, the organizations deals had dramatically increased, route over our desires. After completing my study i would like to work further in Information Technology, because now a days growing demand of IT may lead me to achieve something new. If i talk about my own goal, i always wanted to create self destructive security system. But first of all we have to take a look at what is IT security? IT security is a bigger game than network security. While network security is one where the network through which communication is being done is made secure, for IT security the network, the data, endpoint cloud, and all interacting devices must be safe. It’s all about data. If the data is in the wrong hands, no matter the severity of the data the effects can be devastating. The most common form of a threat is malware also known as malicious software. It can include ransomware and spyware we all are aware of. IT security works within an organization to make sure the data of that organization is available to authorized users only and no party outside the organization can view or change the data without the personnel in the company knowing. It has been no secret that large-scale data breaches have become very common and it has made many people question the integrity of the company under threat. Due to the involvement of the Internet of Things IoTs the risk has increased to an even greater extent making it compulsory for every organization, be it small or huge, to have a foolproof security system that can guard the data of the company against such attacks and put a powerful fight against such. No mistake should be made while understanding the capacity of such security systems. One system cannot be implemented everywhere and expected to be working perfectly. The system needs to specially design for the medium with the current trends in consideration. After knowing that i want to create a system which can destroy itself in threatening conditions, The data hub will work completely free from companies system. In this case when somebody try to breach the security of networks in a company it wont harm the data hub, similarly when somebody try to get involve with the data hub, the main server shutdown automatically, but if someone try to breach the data hub security the data will destroyed automatically by itself.


Contact Arslan Mehmood
(*) Verified recruiters can download candidate CV/ Resume. Login into your recruiter account for details.