StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Pros and Cons of Network Security - Essay Example

Cite this document
Summary
The essay "Pros and Cons of Network Security" focuses on the critical analysis of the major issues in the pros and cons of network security. Working as a telecommuter will have several advantages and disadvantages. A person needs to take the opportunity as a telecommuter…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Pros and Cons of Network Security
Read Text Preview

Extract of sample "Pros and Cons of Network Security"

College: Essay Questions Qn Working as a telecommuter will have several advantages and disadvantages. Before taking theopportunity as a telecommuter, there are several assumptions that would be made. One of the assumptions will be the reduction in the cost of fuel that is incurred daily during driving to work. It is obvious that there is a huge cost of fuel as the distance from home to the current job is 60 miles. As a telecommuter, the cost will be done away with. Another assumption is reduction in costs of maintaining the vehicle that is used to drive to work. Although, it may appear as less of a cost, maintenance of the vehicle takes a considerable amount of money for maintaining it. Another assumption that will be considered is the time taken. Driving to and fro work takes a lot of time and effort than being a telecommuter. There are several valid reasons that would prompt one to consider the telecommuting offer. One of the reasons is reduction in expenditure. The telecommuter job will help in reduction of vehicle associated costs like fuel and maintenance costs. Consequently, one will have an increased amount of money for expenditure at home. The second reason is convenience. The telecommuter job will be convenient in terms of time taken and effort. The time taken to drive to work and effort used will be reduced. Thirdly, the job will reduce the risks associated with driving to work like accidents and insurance. While the current job is a race against time, the telecommuter job will be less of a burden. Fourthly, the telecommuter job will reduce the time taken to access the job location and also drive back home. This will increase the time that one can dedicate to the care of the baby. This in turn reduces the costs of childcare. Fifthly, the job reduces the distance that one has to commute to and fro work. The telecommuter job will result into pay reduction, which will affect the money available for expenditure. Secondly, it will reduce the comfort that one enjoyed as they drive to and fro work. Thirdly, the telecommuting job may not be luxurious as the current job and may have a lot of hardships. With lack of experience in the job, one is likely to face many problems. Fourthly, there may be no guarantee of how safe one will be on the job. Telecommuting may be an unstable job and may not guarantee job tenure. Fifthly, the telecommuting job may not offer the chance to grow career wise and one may stagnate in one job. As per my decision, I would prefer to remain in my current job rather than taking up the telecommuting job. Qn: 2 The internet is currently the main domain that the world relies on for most of its operations. The internet enables a large host of information, activities, operations and other major world actions to go unabated. The world of security, business and scientific exploration and development relies on the internet. Since it was discovered, various bodies have been tasked with expanding its ability and operations. A principal operational aspect of the internet is the ip address. In 2000, ICANN attempted to add to the existing ip addresses with no meaningful achievements. The ip addresses failed for various reasons. In calling for the proposals for the domains, ICANN produced a limited number of experimental ip addresses that did not achieve much after their introduction. Another reasons why the domains failed to achieve their goals was the inherent mismatch between the few required domains and the large number of proposals received by ICANN. This raised a platform for an increased number of proposals being left out (ICANN n.pag). IPv4 is an earlier version that was created in the 19th century from the 70s to 80s and its application is therefore limited. Initially, it was meant for connecting educational facilities and government institutions. Its inability to host a lot of addresses makes it unsuitable for the growing use of the internet. IPv4 limits growth of internet and slows down the applications. On the other hand, IPv6 offers a wide space of hosting many internet addresses and provides mobility. IPv4 is not secure and does not therefore guarantee private data and information confidentiality. IPv6 provides several features that guarantee security to private data (Ullrich par. 3-4, 6). Qn: 4 A cell phone is an essential commodity in one’s life and currently it in an indispensable part of people’s life. Daily transactions need one to have a cell phone that facilitates communication, as well as, other major functions that define people’s lives. Technological development has produced different types of phones with applications that are brilliant and that make life easier. The current generation of cell phones comes with applications that have enabled people to carry out many activities including communication, business and photography, all from one gadget. There are several uses that I consider a cell phone useful. One of the major and basic functions is communicating. A cell phone is a general communicating gadget that is used to connect people over long distances. However, I would consider a cell phone as a communicating gadget if it has advanced applications like teleconferencing. Communicating alone is not enough. Cell phones need to do more than conveying sounds from one speaker to the other. A cell phone that I consider useful should have the capacity to support communication with more than a single individual at a time, convey the image of the caller and can be used to represent one in a meeting in absentia. Another use of a cell phone is browsing and accessing the internet. A cell phone that I would consider useful must have browsing capability. The internet is crucial in communication, getting information and disseminating it. The cell phone must access applications like email, and social websites such as Twitter and Facebook that serve my communication purposes. Another feature that I would like in a cell phone is the photography application. A cell phone that I will consider useful must have a camera with high resolution. It must have the ability to take high quality photographs that can then be sent to friends and family through the internet. Another feature that I would consider in a cell phone is its simplicity to use. Cell phone applications must be presented in a user-friendly way. They must be accessed easily. The cell phone must also have a host of applications that can be downloaded and used as per the user’s discretion. The cell phone must be portable and durable. In the search of a cell phone, I would consider the above factors to the latter. However, the search of the phone would be limited to their available protocols. Current generation cell phones have a wide range of applications that one can choose from. Therefore, finding a cell phone with the desired features will not be a problem. Extra Credit The past few years have experienced a significant surge in registrations of domain names under major generic top level domains (gTLDs) and country code top level domains (ccTLDs). This rapid increase in domain name enrollment has significantly increased their gainfulness to both registries and owners, be it individuals or nations at large. Other country codes have gained notably from being licensed for commercial purposes internationally. One such recognizable ccTLD is .tv. The latter is a ccTLD for Tuvalu, which is a tiny island country. Formally referred to as Ellice Islands, Tuvalu is a Pacific Ocean island, geographically placed between Australia and Hawaii. Despite being far away from developed nations, and having little recognition, the country’s domain is extensively utilized in television, multimedia and entertainment industries. Consequently, this has exposed the country to the rest of the world and opened investment opportunities for it. Further, because of the significance of the domain names to the island’s general economy, they can perhaps qualify as Tuvalu’s primary export. This is evident from estimates that .tv contributed about 6.1% to the country’s gross domestic product (GDP) (Metcalf n.pg). Works cited ICANN. Reconsideration Request 00-8. Recommendation of the Committee, March 5, 2001. Web. 22 February 2014. Metcalf, Leigh. A ccTLD Case Study: .tv. 2013. Web. 22 February 2014. Ullrich, Johannes. Why we need IPv6 now and what it means for Network Security. Forbes, 6 May 2012. Web. 22 February 2014. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Answer questions Essay Example | Topics and Well Written Essays - 1000 words - 5”, n.d.)
Answer questions Essay Example | Topics and Well Written Essays - 1000 words - 5. Retrieved from https://studentshare.org/miscellaneous/1629937-answer-questions
(Answer Questions Essay Example | Topics and Well Written Essays - 1000 Words - 5)
Answer Questions Essay Example | Topics and Well Written Essays - 1000 Words - 5. https://studentshare.org/miscellaneous/1629937-answer-questions.
“Answer Questions Essay Example | Topics and Well Written Essays - 1000 Words - 5”, n.d. https://studentshare.org/miscellaneous/1629937-answer-questions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Pros and Cons of Network Security

Wireless Technology

Some of the major pros and cons of these technologies are outlined below: Pros of 3G Technology One of the basic advantages of 3G technologies is that they are very useful in quickly transferring data.... Certainly, similar to any other technology, both these networks have also some pros and cons, which are discussed by a number of authors such as (Viswanathan, 2013; Smith, 2010; Balasubramanian, Mahajan, & Venkataramani, 2010).... cons of 3G Technology One of the biggest drawbacks of 3G technologies is the cost associated with their use as subscribing to 3G networks is expensive....
5 Pages (1250 words) Assignment

Computer Information Systems

The pros and cons of using Wireless Internet Services.... There are, however, a number of pros and cons associated with the concept of WiFi Computer Information Systems Submitted to, Submitted By, of the Submitted on, [November 22nd, INTRODUCTIONInternet connectivity today is inevitable for every individual as internet is a timely means of information transfer.... There are, however, a number of pros and cons associated with the concept of WiFi connectivity....
2 Pages (500 words) Essay

Information Systems Security

This report "Information Systems security" discusses a database that would include tenants and the building managers.... The company ought to put in place structures that will ensure information security in two main ways, (1) authentication and authorization, and (2) general policies and procedures.... The threat posed by such security menaces may damage a company's reputation or compromise the integrity of its confidential information, causing it to lose clientele as banks would in the case where credit card numbers are leaked....
6 Pages (1500 words) Report

Business Recovery after Disaster

n integrated security system of physical and logical security of a firm refers to the system that protects the physical assets of an organization and the intangible assets, which is majorly the company's data and information.... In case of a security lapse, the management can easily point the responsible individual or department.... ons:- There is a big problem with the system being compatible with both physical and logical security and this leaves a security gap, which might cause great losses to the firm, in the event the individual responsible is not aware of the existing gap and how to resolve it....
4 Pages (1000 words) Assignment

CIS204 U4 Discussion

The pros and cons of Using a Virtual Private Network.... VPNs are good at establishing business connections between two sites using the IPsec or the Internet Protocol security (IPS).... The reason as to why this technology has been recommended to the company is the security in information flow.... This security ensures more secure communication by the people in it.... Disadvantages of this technology are the complexity involved when there is addition of new infrastructure, and the security issues involved when using a mobile device to establish connection (Thrivenetworks 2015)....
1 Pages (250 words) Coursework

Social Media Network Technology

Additionally, it will provide detailed information on the things that ought to be done to safeguard students' privacy as well as security.... The paper, Social Media network Technology, will also expound on the advantages and disadvantages of using the technology in the classroom.... As the paper discusses the positive impacts of social media network technology in education are intense.... Additionally, network technology enhances the development of students' communication skills....
4 Pages (1000 words) Essay

Pros and Cons of Social Network

The paper "pros and cons of Social Network" tells that social network is currently viral among people of all works of life in the world.... The pros and cons will also be analyzed in detail to show the impact and the effects of social networks since their discovery.... The social network has attracted a different class of people including leaders and governments to communicate to the people based on the popularity of these sites.... At least every group of people including the ones in the remotest parts of the world has access to the social network....
9 Pages (2250 words) Essay

Internet Security Advantages

By discussing the pros and cons of the internet, this paper will successfully address the importance of internet security.... The paper "Internet security Advantages" states that the internet has become both an advantage and disadvantage over the last decade.... With the prevalence of Artificial Intelligence-powered attacks, a shortage of IT security talent, and an explosion of Internet-connected devices, it's going to take the speed of machines to counteract this perfect storm of increased internet threats....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us