StudentShare solutions
Got a tricky question? Receive an answer from students like you! Try us!

Essay example - Network Security Opening to the World

Only on StudentShare
Pages 3 (753 words)
With the advent of internet and telecommunication, comes a revolution in communication systems and style. Nowadays, any one can communicate with any one even a thousand miles away in just a matter of minutes. Internet based speech and video conferencing have allowed people to literally eliminate the geographical and/or time differences…

Extract of sample

Internet based conferencing eliminates the need of a physical meeting place. One can meet people, exchange information and data, and can share files and notes using electronic means. It also saves cost and increase efficiency of the system as a whole. Cisco recently saved more than $1 million on ISO-compliance training by using video-on-demand instead of in-person sessions (Jackson 2004).
All the internet conferencing products are inherently dependent upon the bandwidth, networking components and desktop hardware supporting them (McKenzie 2005). If the hardware and network lack necessary support features, internet based conferencing could be an effort in turmoil, and may cause loss of time, productivity, and revenue.
An electronic document or file is more vulnerable to unauthorized access. However, the latest software packages that provide internet conferencing facilities have features to provide assurance about the privacy and confidentiality of data. One low cost, and feature rich product is GoToMeeting by Citrix. In addition to the usual features for conferencing, the product offers high security and privacy to the potential customers. The users are provided capability to share only a specific application rather than entire desktop. It helps to make users more confident that they control the software, and not the other way around. ...
Download paper
Not exactly what you need?

Related papers

Network Security Ph.D. Essay
The weekly assignment, which covered various security-related topics, necessitated that we, as students, research the assigned topics, engaged with the material and, importantly, explore the multi-dimensional nature of network security. Added to that, weekly feedback on assignments offered us a clear indication of the topics which we could handle well and those which we could not.…
34 pages (8534 words)
Workplace's Network Security
A case study approach will be used because the focus will be on the Healthcare organization in which the researcher is employer.…
5 pages (1255 words)
Network Security Essay
In other words, by compromising routers, attackers can inflict substantial, wide-ranging harms upon an organisation. It is, thus, that routers functions as attractive targets, upon which hackers routinely wreak their subversive efforts.…
32 pages (8032 words)
Network Security College Essay
The internal vulnerabilities are to be countered so that possession of one is not used by the other.…
2 pages (502 words)
Network Management & Security
The use of an Ethernet switch will allow quicker access to services and should handle all bandwidth issues. More switches can be added to accommodate more devices as they are added.…
10 pages (2510 words)