It is with no doubt that the technology has lowered the cost of operation and increased profit margins and business productivity, however, its rapid growth and extensive use has brought along potentially harmful threats to the technology itself and to its users. The paper examines the potential threats related to electronic communication and recommends possible responds to such threats. Introduction Electronic communication, a form of communication involving the transfer of images, signals, data and signs through electromagnetic energy, radio, wire or photo-optical system was discovered in 1998 and its popularity has grown drastically ever since. (Kranakis, 2008) The technology has significantly improved and enhanced the speed, reliability and accuracy in communication including globalization of various business and organizations utilizing the technology. A part from the vast and evident advantages of electronic communication, there are a number of threats associated with overreliance on the technology. The use of loop holes in the technology by cyber criminals posses as the most critical threat among others. Malicious actors such as hackers have the habit of utilizing easily accessible tools to compromise and intercept electronic communication thus putting the user and the target infrastructure at high risk. (Kranakis, 2008) The threats associated with electronic communication presents a potential danger to a business organization’s assets including the data of the organization and the users, user authentication information and the physical infrastructures like the network and the computer systems. The assaults and severity associated with such threats as spam, viruses and network attacks have risen to the extent that it threatens the viability of electronic communication. Apart from the leakage of confidential user data, such attacks and threats causes increased and unpredictable hardware and software costs, disruption to email delivery and depletion of IT resources. The threats associated with electronic communication can be widely categorized in to two including the following. System and Application Threats There is a possibility that data and information sent through electronic communication can be intercepted, copied and modified by unauthorized persons through such attacks as man-in-the-middle attack. This compromises privacy and exposes the user to great danger in case sensitive information such as banking details are exploited. In case of a hospital, the modification of intercepted patient information can endanger the patient’s health or worse off, life. (Melliar-Smith & Chuang, 2012) Password theft and unauthorized computer and network access by hackers or other actors with malicious intentions also posses as a dangerous threat associated with electronic communication. Hackers use special software and Trojans to attack and compromise the security of a target thus gaining unrestricted access to sensitive data and information which can be used against the business organization. Such security breach can do massive damage to a company’s reputation besides its competitive advantage in case sensitive and confidential information is lost in the process. In addition, intellectual property may also be lost in case of a security breach involving
Electronic Communication Threats (Name) (Course) (Section) (Date Due) (Tutor) Abstract Electronic communication, through Information technology, has significantly revolutionized the manner in which organizations conduct business. Such characteristics as unmatched ease of use, speed, accuracy and reliability among others have ensured a rapid gain in popularity of electronic communication over the years…
There has been a great evolution from the literate form of communication to the electronic communication popular today. The question is, has this been caused by virtue of an accident or years of research? This is the argument experts find themselves in but are quite unable to find a common ground based on their divergent views.
Electronic communication – according to Electronic Communication Privacy Act, ECPA, an "electronic communication" means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photo electronic, or photo optical system that affects interstate or foreign commerce.
Electronic communication mediums include e-mails (electronic mails), fax messages, text messages, tele or video conferencing, voice mails, television and internet. Electronic communication has enabled us to communicate with each other in a shorter time period owing to the development of social networks and other virtual networking sites.
The means through which people communicate is of question; whether the advancing technology is a positive or negative thing is to be decided. In order to come to a clearer and more knowledgeable understanding of the matter of electronic methods of communication and how this affects the workplace and life in general, the following questions must be addressed:
According to the report ICT is one of the sectors that have been growing at a rapid rate in the world. It has played a crucial role in linking people. Communication technology has been taking place in the social, economic and political life of the people. The rise in use of cheap computers is one of the reasons why there has been a great revolution in the communication.
The author states that the ability of people to connect with each other across long distances at practically the speed of light via the web has changed not only the way people communicate, but also the expectations they have for the retrieval of information. Email is free and instantaneous causing its use by businesses.
Among the major CMCs are:
IM, as it is usually referred, is a real time communication technology that incorporates texts between two or more individuals over the internet. It has the advantage of receiving a real time response
However, the basic working principle remains the same.
Often abbreviated the superhet, the super-heterodyne radio was designed during the First World War, a time that demanded the need for higher levels of receiver performance in terms of sensitivity