StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Network Security Opening to the World - Essay Example

Cite this document
Summary
With the advent of internet and telecommunication, comes a revolution in communication systems and style. Nowadays, any one can communicate with any one even a thousand miles away in just a matter of minutes. Internet based speech and video conferencing have allowed people to literally eliminate the geographical and/or time differences…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Network Security Opening to the World
Read Text Preview

Extract of sample "Network Security Opening to the World"

Download file to see previous pages

Internet based conferencing eliminates the need of a physical meeting place. One can meet people, exchange information and data, and can share files and notes using electronic means. It also saves cost and increase efficiency of the system as a whole. Cisco recently saved more than $1 million on ISO-compliance training by using video-on-demand instead of in-person sessions (Jackson 2004). All the internet conferencing products are inherently dependent upon the bandwidth, networking components and desktop hardware supporting them (McKenzie 2005).

If the hardware and network lack necessary support features, internet based conferencing could be an effort in turmoil, and may cause loss of time, productivity, and revenue. An electronic document or file is more vulnerable to unauthorized access. However, the latest software packages that provide internet conferencing facilities have features to provide assurance about the privacy and confidentiality of data. One low cost, and feature rich product is GoToMeeting by Citrix. In addition to the usual features for conferencing, the product offers high security and privacy to the potential customers.

The users are provided capability to share only a specific application rather than entire desktop. It helps to make users more confident that they control the software, and not the other way around. Hence, it is similar to a face to face meeting where one can share specific information with other party without having to show the entire knowledgebase to others.Confidentiality and AvailabilityTo protect against tapping and data security breaches during transmission, GoToMeeting offers 128 bit encryption of all meeting data, and enforce strong end user authentication procedures.

There are software, like Elluminates's server based software, which can detect dropout in audio due to a network glitch and can re-send the missing audio, speeding up the feed slightly until it catches up to the real-time feed. This allows minimal loss of information.Reliability and Flow ControlFor the purpose of internet based conferencing, the delivery and convertibility of data packets reaching to destination is very important and critical aspect of a good performance versus a failed session.

This is the exact problem the Cisco was facing with regard to video streaming over IP to ensure end-to-end delivery of the video traffic. If each desktop isn't properly configured for video, there are no guarantees that a video feed will be delivered. The company solved this glitch by pushing out standard configurations to all sites that made it easier to handshake among varying protocols. ReferencesJackson, K. 2004. Video IP Project Boosts Network's Profile: A Look at Cisco Media Network. Network Computing.com. Online.

Available from Internet, http://www.networkcomputing.com/showitem.jhtmldocid=1508centerfold, accessed 12 March 2007.McKenzie, M. Five Web Conferencing Packages: Not Just Conference Calls Anymore. Network Computing.com. Online. Available from Internet, http://www.networkcomputing.com/showArticle.jhtmlarticleID=174403432, accessed 12 March

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Opening to the World Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Network Security Opening to the World Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/miscellaneous/1505371-network-security-opening-to-the-world
(Network Security Opening to the World Essay Example | Topics and Well Written Essays - 750 Words)
Network Security Opening to the World Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/miscellaneous/1505371-network-security-opening-to-the-world.
“Network Security Opening to the World Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/miscellaneous/1505371-network-security-opening-to-the-world.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security Opening to the World

Cellular Networks Comparison

The UMTS (Universal Mobile Telecommunications System) is known as the third world (3G) wireless frequency that is used on the (GSM) Global System for Mobile communication, to convey text, audiovisual, digitized voice as well as multimedia (Markus 62)3.... Call process of WiMax session is started once the mobile station (MS) effectively complete the method of linking into the network, thus necessitates opening BCE Basic Capability Exchange, the recording and verification and Internet Protocol obligations....
5 Pages (1250 words) Essay

Best Practices for Network Security

Best Practices for network security.... Name University Best Practices for network security With a lack of security policy and the ability of the system can be affected.... Quoting Gary Mileisfeky, “These two servers were like putty to the hackers - one SQL Injection attack and thousands of consumer records were grabbed, sold and used for siphoning money from the credit cards”(12 Best Practices for Online security).... It is now possible for you to purchase lists of Social security numbers, forenames, addresses, telephone information, bank account archives and credit cards on the black marketplace....
4 Pages (1000 words) Research Paper

Technology Evaluation and Recommendation

As Scarfone and Mell (2007) describe, intrusion prevention systems (IPS) are network security tools that continuously monitor the company network and system activities to detect malicious activities; and intrusion prevention systems are classified into four different types such as network-based intrusion prevention systems (NIPS), wireless intrusion prevention systems (WIPS), network behavior analysis (NBA), and host-based intrusion prevention systems (HIPS).... Security Awareness: Applying Practical Security in Your world....
3 Pages (750 words) Essay

The Security of Networking

It is essential that firms make a substantial investment in network security in order to safeguard their exclusive information from hackers, as well as other delinquents.... I will address contemporary approaches towards network security, the upsurge in recent criminal activity.... ntroductionThe Internet is a principal platform of the contemporary business world.... With e-commerce now severely competing with the practice of the brick and mortar capacity, clients are quite comfortable with the convenience of shopping, finance, and otherwise flourishing fully in a virtual world (Cole et al....
12 Pages (3000 words) Essay

The Issues Involved in Internet Security

As its website says, ISO (International Organization for Standardization) is the world's largest developer of standards.... "The Issues Involved in Internet Security" paper formulates how an organization can develop confidence in the security of their networked systems when they are opening their systems to Internet access, illustrates why an organization might select such software for mission-critical applications.... Securing a computer system means the security of the software and hardware, the trustworthiness of the people who use and manage it, and the reliability of the procedures for using and managing the system....
7 Pages (1750 words) Assignment

SNMP for Diagnostics and Troubleshooting Network Problems

The research paper "SNMP for Diagnostics and Troubleshooting network Problems" describes the SNMP analysis program.... nbsp; Additionally, it was observed that created MIB sets can be added to a data collection group as an alternative protocol of enhancing the performance of the network in terms of signal strength and quality.... However, while the transfer of information will depend on signal quality and network stability, five areas are of concern to ensure that communication is flawless....
18 Pages (4500 words) Research Paper

Curtis and Brousseau Building Society

It is also opening two branches opening in Swansea and another opening in Newport.... The main aim of this paper "Curtis and Brousseau Building Society" is to design a network that will improve connectivity between the branches and the head office.... Curtis and Brousseau Building Society have the need to increase their downloading speed as well as manage to increase the number of connectivity and this will be made possible by employing a high-speed network which will be wireless networking....
8 Pages (2000 words) Case Study

Information Security Management

Cooper and Collman (2005) observed that the trail of information, including IP addresses left behind by users of the world Wide Web, has been linked with hospital databases containing information relating to DNA.... Pay attention to The network security element of subnetting improves security by way of splitting an Internet Protocol or IP address anywhere within its 4-byte (or 32-bit) address.... nbsp;  Part A –Description of the scenarios in each stage compared them to real-world cases....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us