StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security: Opening to the World - Essay Example

Cite this document
Summary
Network Security: Opening to the World Name Institution Network Security: Opening to the World Web conferencing The main element that has been discussed when it comes to network security is whether the Internet-based conferencing is as safe as face-to-face meetings…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Network Security: Opening to the World
Read Text Preview

Extract of sample "Network Security: Opening to the World"

Network Security: Opening to the World Network Security: Opening to the World Web conferencing The main element that has been discussed when it comes to network security is whether the Internet-based conferencing is as safe as face-to-face meetings. Web conferencing involves the conducting of meetings and presentations live through the internet. They are able to see each other, talk to each other and transfer documents to each other while online. There are three types of web conferencing: Webinar: This is a type of web conferencing that allows for the conducting of seminars online.

It was created to allow a question and answer type of communication. It has more communication features that the webcast type. Webcast: This media connects participants through an online broadcast. It is commonly used for presentations done online. This type of web conferencing can allow for hundreds of participant at a single time though it has limited interaction with the audience. Web meeting: This is the most advanced type and is most preferred by international businesses as it allows individuals to work from home even on a rudimentary system (Toxen, 2002).

Internet-based conferencing pros Web conferencing often involves the transfer of secret documentation that the company would not want to share with individuals outside the conference room or competitors thus every service provider takes the customer’s privacy needs very seriously. There are a number of systems that can be used to assure the safety of the web conferencing services. These are introduced in order to lock out online eavesdroppers, spies and hackers. These measures include: The implementation of a Secure Sockets Layer: This is a tool that is intended to provide a secure connection the initiator and the rest of the audience in the online meeting by encrypting the data that is transferred through the internet.

This information then cannot be copied or altered by thieves. Creation of a password to allow one into a web conference: Passwords are often created for each conference and sent as emails to individuals who will be taking part in these talks. The individual heading this online meeting has the authority to allocate every individual attending this meeting an access code that will act as a verification of their identity. Recent advancement in technology has ensured that web conferences have been made safer through the implementation of hacker detection elements in to the conferencing media.

This has led to the creation of a safer communication media where individuals can engage in conversations that are free from hacking. Internet-based conferencing cons Because of the relative insecurity involved in this form of communication, there is always some form of security risk when people communicate online. The first suspects are usually the hackers who use their computer expertise to hack into other people’s conversations. This can be just for kicks, or for reasons known to them. The second security breach is the fact that there will always be the risk of not knowing who else may be listening to the conversation as there is limited control on people in the conference.

Each and every web conferencing company has put in place security measures to lock out the threat of hackers, but these measures are often challenged by experienced hackers. There is little that one can do in order to completely control the individuals who will listen into a conference call. If the information being passed on from one party to another requires maximum confidentiality, then web conferencing may not be the most appropriate form of communication (Kaufman Perlman & Speciner, 2002).

When it comes to technical difficulties, the requirements engaged in web conferencing can come up as a disadvantage if the correct setup is not put in place. Most web conferencing services have been made to be all encompassing and require the user to only have a computer, login information and an internet connection. While setting up a platform for web conferencing, it is vital the people attending this conference have every item that they may require to participate in this web conference. Before one chooses a web conference hosting company, it is important to try out their services in order to choose whether or not the services they propose are best suited for one’s needs.

There is always the challenge of having users who are not skilled with technology thus leading to difficulties in communication. The platform’s compatibility should also be checked against a variety of browsers to aloe accessibility (Thomas & Stoddard, 2012). Communicating through the web conferencing services can easily be interrupted when there is a power outage during the conference. Power outages may affect the hosting of this type of communication. A power outage will result in the shutting down of the computers being used to relay the conversation if the company does not have appropriate power backup generators.

The power outage can also lead to malfunctioning of the internet connection thus causing a collapse in communication among the hosted parties. These problems often happen randomly in the most unexpected times thus are beyond the control of human beings. Conclusion Web conferencing saves people much time and money due to the absence of travel fees and the long hours spent travelling to attend a single meeting. This is an advantage, but when it comes to safety, a fact to face meeting is considered safer that an online web conference.

References Kaufman, C., Perlman, R., & Speciner, M. (2002). Network security: Private communication in a public world. Upper Saddle River, NJ: Prentice Hall PTR. Thomas, T. M., & Stoddard, D. (2012). Network security first-step. Indianapolis, IN: Cisco Press. Toxen, B. (2002). Real world Linux security: Intrusion, prevention, detection and recovery. Upper Saddle River, NJ: Prentice Hall PTR.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security: Opening to the World Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Network Security: Opening to the World Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1445033-network-security-opening-to-the-world
(Network Security: Opening to the World Essay Example | Topics and Well Written Essays - 750 Words)
Network Security: Opening to the World Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1445033-network-security-opening-to-the-world.
“Network Security: Opening to the World Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1445033-network-security-opening-to-the-world.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security: Opening to the World

Best Practices for Network Security

Best Practices for network security.... Name University Best Practices for network security With a lack of security policy and the ability of the system can be affected.... Quoting Gary Mileisfeky, “These two servers were like putty to the hackers - one SQL Injection attack and thousands of consumer records were grabbed, sold and used for siphoning money from the credit cards”(12 Best Practices for Online security).... It is now possible for you to purchase lists of Social security numbers, forenames, addresses, telephone information, bank account archives and credit cards on the black marketplace....
4 Pages (1000 words) Research Paper

Cyber Network Security, Threats, Risk, and Its Prevention

Be it genetic engineering or the development of software, information technology is enabling progress across every field of advancement across the world (Castells, 1999, p.... However, the negative side of IT reflects on its misuse and the effects of cybercrimes that have significant concerns in every organization across the world.... This dissertation "Cyber network security, Threats, Risk, and Its Prevention" is about a crime that has created major concerns in the modern world with the greater advancements in the field of information technology, and the misuse being increased....
36 Pages (9000 words) Dissertation

Network Security Best Practices

From the paper "network security Best Practices" it is clear that Regular maintenance of a network is vital to its security.... To ensure impeccable network security, comprehensive analysis and exploration of the entire network need to be conducted.... network security is balanced art.... hellip; Based on the best practices for a secure network listed above, a company should then review and update its security policy.... The document should never be considered complete, as threats are continually adapting, and in this way, so should the security policy....
8 Pages (2000 words) Essay

Network Security Opening to the World

In addition to the usual features for conferencing, the product offers high security and privacy to the potential customers.... onfidentiality and AvailabilityTo protect against tapping and data security breaches during transmission, GoToMeeting offers 128 bit encryption of all meeting data, and enforce strong end user authentication procedures.... If the hardware and network lack necessary support features, internet based conferencing could be an effort in turmoil, and may cause loss of time, productivity, and revenue....
3 Pages (750 words) Essay

The Issues Involved in Internet Security

As its website says, ISO (International Organization for Standardization) is the world's largest developer of standards.... "The Issues Involved in Internet Security" paper formulates how an organization can develop confidence in the security of their networked systems when they are opening their systems to Internet access, illustrates why an organization might select such software for mission-critical applications.... Securing a computer system means the security of the software and hardware, the trustworthiness of the people who use and manage it, and the reliability of the procedures for using and managing the system....
7 Pages (1750 words) Assignment

Device Hardening and Secure Network Design

Additionally, the firewalls are implemented for additional in-depth examination; tactically positioned router ACLs thus they augment network security.... At present, network security has become the most important subject of discussion.... In addition, this research will offer a comprehensive overview of the hardening and other security initiatives.... Additionally, the reason for establishing the server hardening policy is to express the requirements for installing a new server in a secure fashion and maintaining the security integrity of the server and application software....
12 Pages (3000 words) Term Paper

Security Quality Requirements

The authors emphasize that IT infrastructure security practices and the techniques of network security do not adequately guard application software against security threats.... This paper 'Security Quality Requirements" focuses on the fact that the authors of the complete textbook draw widely on the systematic method created for the Build Security In (BSI) Web site to represent two renowned resources in the security world: Cigital, Inc.... nbsp;… The Department of Homeland security Software Assurance Program sponsored the project, and the BSI website contains a range of guidelines, tools, principles, rules, among other resources that project managers would find useful in addressing security concerns at each stage of the software development life cycle....
20 Pages (5000 words) Annotated Bibliography

Network Security in the Organization

Besides e-mail and access to the world-wide-web, we provide a wide range of other services as well like hosting, domain, etc... This report "network security in the Organization" presents data plane security that encompasses the actual packets that carry customer traffic.... In contrast to the control plane, traffic on the data plane just goes through network devices and is not destined for any of the interfaces on the device.... Connect via LAN ServerThis approach requires the user to install on his/her PC a network adopter card and Open datalink Interface (ODI) or network Driver Interface Specification (NDIS) packet drivers....
10 Pages (2500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us