Got a tricky question? Receive an answer from students like you! Try us!

Network Security Opening to the World - Essay Example

Only on StudentShare
Author : madeline80

Summary

With the advent of internet and telecommunication, comes a revolution in communication systems and style. Nowadays, any one can communicate with any one even a thousand miles away in just a matter of minutes. Internet based speech and video conferencing have allowed people to literally eliminate the geographical and/or time differences…

Extract of sample
Network Security Opening to the World


Internet based conferencing eliminates the need of a physical meeting place. One can meet people, exchange information and data, and can share files and notes using electronic means. It also saves cost and increase efficiency of the system as a whole. Cisco recently saved more than $1 million on ISO-compliance training by using video-on-demand instead of in-person sessions (Jackson 2004).
All the internet conferencing products are inherently dependent upon the bandwidth, networking components and desktop hardware supporting them (McKenzie 2005). If the hardware and network lack necessary support features, internet based conferencing could be an effort in turmoil, and may cause loss of time, productivity, and revenue.
An electronic document or file is more vulnerable to unauthorized access. However, the latest software packages that provide internet conferencing facilities have features to provide assurance about the privacy and confidentiality of data. One low cost, and feature rich product is GoToMeeting by Citrix. In addition to the usual features for conferencing, the product offers high security and privacy to the potential customers. The users are provided capability to share only a specific application rather than entire desktop. It helps to make users more confident that they control the software, and not the other way around. ...
Download paper

Related Essays

Network Security Essay
In other words, by compromising routers, attackers can inflict substantial, wide-ranging harms upon an organisation. It is, thus, that routers functions as attractive targets, upon which hackers routinely wreak their subversive efforts.…
32 pages (8032 words)
Network Security.
But with this ease of information access comes the issue of security. With the increase of information flow, there has been an increase in the number of attacks on information by hackers. Attacks such as Denial of Service (DoS) Attacks, Spoofs, Sniffing, etc. have increased with the increase in the availability of hacking tools which are free of cost. Valuable information is lost in the process. For example, if a customer buys a product of a particular organization through their web-site and a hacker presents himself as the organization and receives the money from the customer, valuable…
5 pages (1255 words)
Network Security College Essay
The internal vulnerabilities are to be countered so that possession of one is not used by the other.…
2 pages (502 words)
Network Management & Security
The use of an Ethernet switch will allow quicker access to services and should handle all bandwidth issues. More switches can be added to accommodate more devices as they are added.…
10 pages (2510 words)
Network Security
Numerous hackers search for and exploit vulnerabilities of a system or a network on a day-to-day basis. Moreover, the tools that help in penetrating and exploiting networks and systems are becoming increasingly accessible and they are so simple to use that they require very little technical knowledge. The threats become even more real when the network connects to other networks, however, threats usually originate from the internal network more often. Research indicates that the 70% of threats usually originate from inside the corporate environment. Hence, any person in charge of networks needs…
10 pages (2510 words)
Network Security
In order to prevent such attacks in the future the following measures should be thoroughly applied.…
4 pages (1004 words)
Network Security
Likewise, the disadvantages associated with DMZ are not significant, but one issue can be highlighted, as the segregation may create a hassle for the network administration because DMZ requires frequent updates and maintenance. Moreover, the hardware cost is high and requires dedicated hardware in order to implement DMZ within the network. Deployment includes a switch, separate firewall and IDS etc.…
4 pages (1004 words)