StudentShare solutions
Triangle menu

Network Security Opening to the World - Essay Example

Not dowloaded yet

Extract of sample
Network Security Opening to the World

Internet based conferencing eliminates the need of a physical meeting place. One can meet people, exchange information and data, and can share files and notes using electronic means. It also saves cost and increase efficiency of the system as a whole. Cisco recently saved more than $1 million on ISO-compliance training by using video-on-demand instead of in-person sessions (Jackson 2004).
All the internet conferencing products are inherently dependent upon the bandwidth, networking components and desktop hardware supporting them (McKenzie 2005). If the hardware and network lack necessary support features, internet based conferencing could be an effort in turmoil, and may cause loss of time, productivity, and revenue.
An electronic document or file is more vulnerable to unauthorized access. However, the latest software packages that provide internet conferencing facilities have features to provide assurance about the privacy and confidentiality of data. One low cost, and feature rich product is GoToMeeting by Citrix. In addition to the usual features for conferencing, the product offers high security and privacy to the potential customers. The users are provided capability to share only a specific application rather than entire desktop. It helps to make users more confident that they control the software, and not the other way around. Hence, it is similar to a face to face meeting where one can share specific information with other party without having to show the entire knowledgebase to others.
Confidentiality and Availability
To protect against tapping and data security breaches during transmission, GoToMeeting offers 128 bit encryption of all meeting data, and enforce strong end user authentication procedures. There are software, like Elluminates's server based software, which can detect dropout in audio due to a network glitch and can re-send the missing audio, speeding up the feed slightly until it catches up to the real-time feed. This allows minimal loss of information.
Reliability and Flow Control
For the purpose of internet based conferencing, the delivery and convertibility of data packets reaching to destination is very important and critical aspect of a good performance versus a failed session. This is the exact problem the Cisco was facing with regard to video streaming over IP to ensure end-to-end delivery of the video traffic. If each desktop isn't properly configured for video, there are no guarantees that a video feed will be delivered. The company solved this glitch by pushing out standard configurations to all sites that made it easier to handshake among varying protocols.
References
Jackson, K. 2004. Video IP Project Boosts Network's Profile: A Look at Cisco Media Network. Network Computing.com. Online. Available from Internet, http://www.networkcomputing.com/showitem.jhtmldocid=1508centerfold, accessed 12 March 2007.
McKenzie, M. Five Web Conferencing Packages: Not Just Conference Calls Anymore. Network Computing.com. Online. Available from Internet, http://www.networkcomputing.com/showArticle.jhtmlarticleID=174403432, accessed 12 March ...Show more

Summary

With the advent of internet and telecommunication, comes a revolution in communication systems and style. Nowadays, any one can communicate with any one even a thousand miles away in just a matter of minutes. Internet based speech and video conferencing have allowed people to literally eliminate the geographical and/or time differences…
Author : madeline80
Network Security Opening to the World essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Network Security Opening to the World"
with a personal 20% discount.
Grab the best paper

Related Essays

Network security
However, there are many challenges that organizations have to overcome for securing the information on the network as well as in the servers. Certified skilled professionals, certified vulnerability assessment tools, incident response management teams and other relevant staff plays a significant role for protecting and detecting potential threats and vulnerabilities that may or have compromise the network to gain access to business critical information of the organization.
8 pages (2000 words) Essay
Network Security: Opening to the World
Web conferencing involves the conducting of meetings and presentations live through the internet. They are able to see each other, talk to each other and transfer documents to each other while online. There are three types of web conferencing: Webinar: This is a type of web conferencing that allows for the conducting of seminars online.
3 pages (750 words) Essay
How Does Network Affect the World
of specific inspiration such as people from a given neighborhood or even schools and campuses (Social Networking, para. 1). The aim of this paper is to look at the origins of social networking and its background. In addition, it will also focus on the impact that social networking has made on the world in both negative and positive ways in different fields of life.
5 pages (1250 words) Essay
Project Paper: How to Use Linux Operating Systems as a Network Security Device or Component
This paper intends to identify the ways in which Linux operating system can be used as a network security device or component. The history of internet is short but its growth has been explosive. The size of internet users has grown to millions and every year the figure is increasing at a rapid pace.
11 pages (2750 words) Essay
Spyware and Implementing Network Security
Purposes range from overtly criminal (theft of passwords and financial details) to the merely annoying (recording Internet search history for targeted advertising, while consuming computer resources). Spyware may collect different types of information. Some variants attempt to track the websites a user visits and then send this information to an advertising agency.
22 pages (5500 words) Essay
Computer system Network Security
Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network
5 pages (1250 words) Essay
Network Security
It deals with stopping attacks on a network from outer entities such as hackers and from non-intentional attacks. As more and more networks are being introduced every single day, the implementation of network security has become very important. The interconnection of networks has made flow of information easier between organizations or individuals (Curtin, 1997).
5 pages (1250 words) Essay
Network security
This dream of a foolproof secure network system can only be realized when the computer hardware is 100% compatible with the policy of security protocols. The following check list helps out the situation
6 pages (1500 words) Essay
Network Security
With this opening to the RSA system, the attackers extracted the information until they obtained access to their targeted system where the data files were stolen. According to the details of the
4 pages (1000 words) Essay
Network security
The components include large flat panel televisions and surround sound systems of varying scale and complexity and huge range of peripheral devices that are with the system. As of now, the VAC has internal chain of supply, which is networked using
3 pages (750 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation