Sign In
Not register? Register Now!
You are here: HomeEssayTechnology
Pages:
4 pages/≈1100 words
Sources:
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 24.3
Topic:

ITM 441 Case Study Assignment (Essay Sample)

Instructions:

Module 5 - Case
NETWORK SECURITY: OPENING TO THE WORLD
This module is about what networks do for organizations, and thus it is appropriate that the case focus on one of the unique contributions of networks -- that is, the ability to conference people from widely distributed places. The development of easy-to-use and widely accessible conferencing arrangements has been some time coming, although one of the very first things done with the early ARPANET was to establish a conference call between two of the first three nodes. There is no shortage of technology available to organizations wishing to implement such approaches. However, Internet based conferencing is not just a technological issue, but a classic case of sociotechnical balance; in most organizations, the social arrangements for managing and incorporating conferencing are underdeveloped, and it is not clear just how to change the situation for the better. Mostly, people are worried about its security.
Read this guide to gain a background in web conferencing:
Web Conferencing Guide, netschmoozer.net. http://www.netschmoozer.net/article_list.php
Then read the following articles. One is on web conferencing packages and the other is on web conferencing security:
Patton, E. (2009) Web Conferencing Packages. Article Alley, 10/15/2009http://www.articlealley.com/article_1175700_45.html
Baez, D. How Web Conferencing Security Works. HowStuffWorks.com.http://communication.howstuffworks.com/how-web-conferencing-security-works.htm
White Paper (n.d.), Cyber Security for Power Utilities, RAD, Retrieved from 
http://www.rad.com/21/Cyber-Security-for-Power-Utilities-White-Paper/30757/
When you've had a chance to read these articles, anything from the Background that seems helpful to you, or anything else you may have come across on the subject (please use appropriate references), please write a 3-5 page paper taking a stand one way or the other (and justifying it!) on the proposition:
Agree or Disagree: Internet-based conferencing is as safe as face-to-face meetings

source..
Content:

ITM 441 Case Study Assignment
Name

Institution
The current global technology is essential for running organization effectively. This technology has expanded to include not only email and instant messaging, but also web conferencing. What is web conferencing? The term web conferencing could be elucidated as an interactive technology that allows its users to share information or hold meetings over the internet (Parker, and Hoffman, 2013). The technology allows its users to share audio and video content in real time, which implies that the users can share documents while conversing. Since web conferencing allows people to hold meetings without travelling, it follows that an organization can reduce its costs by using the technology. Nonetheless, web conferencing users always ponder on whether the use of web conferencing is safe. This situation is further aggravated by security threats from hackers who could expose an organization’s secrets. It appears that the alternative of face-to-face meetings is more secure than web conferencing. The question is; is this true?
To begin with, Web conferencing has the capacity to become a cost effective alternative for face-to-face meetings. This is highlighted by the cost of transport because air travel is expensive. In fact, American airline organizations warned that their operations would be affected as an effect of the increased security from the central government. Therefore, businesses will try to reduce their travelling costs by embracing web conferencing. Furthermore, the technology saves on time, which would otherwise have been spent travelling to and from meetings (Suduc, Bizoi and Gheorghe, 2009). In addition travelling is always accompanied by exhaustion, which has a negative effect on the productivity of employees. Web conferencing eradicates the need to travel to meetings. This saves employees the energy, which could be spent on activities that are more productive. Why then are organizations not using web conferencing abundantly? The Problem with web conferencing is the possibility of leaking or even loosing sensitive information to unwanted parties.
It is evident that web conferencing is an effective way for organizations to cut their costs and increase their return on equity. However, many organizations shy away from embracing this technology for fear of insecurity. Such organizations should appreciate that even though web conferencing could be insecure, using adequate measures can ascertain that web conferencing is as secure as face-to-face meetings. For instance, using non-persistent data flow and security socket layer are examples of mechanisms that can ensure the safety of web conferencing. According to RAD (2013), the data is encrypted to ensure that only verified people access the contents of the meeting. Its security is further enhanced by the migrating or switching the encrypted data constantly between different computers. The use of intrusion control works like scanning the network for unauthorized users also improves the security of web conferencing. These are the main mechanisms that could prevent information from web conference meetings from leaking out to third parties.
In addition to the security mechanisms provided by web conferencing enterprises, organizations using the technology should improve the security using the following tips. First, an organization should check the entry requirements before beginning the meeting. This will ensure everyone with access to the meeting has been verified to attend the meeting. This could be done using private and secure invitations, maintaining a strict policy on passwords, and voice authentication before the meeting begins. Secondly, access to information should be controlled during the meeting. Different participants should have access to different information based on their management levels (Suduc, Bizoi and Gheorghe, 2009). Controlling the access to information is also achievable by releasing information in parts. The last security tip is data security and protection. Data should be protected by complying with regulatory standards on data protection, using high levels of encryption, and deleting confidential information from third party servers after the meeting.
Using third party audits is also an important tool that can aid in improving the security of web conferencing. Some companies depend on other organizations to provide web conferencing services. Companies that provide web conferencing activities always make promises on the security of data. However, there have been instances where organizations make promises that they cannot fulfill. It follows that organizations willing to hire web conferencing services should conduct due diligence before hiring such services from any organization (Parker, and Hoffman, 2013). For instance, it is advisable to check for third party audits before outsourcing web conferencing services. In some instances, it may be necessary to ask for certification from regulatory bodies prior to outsourcing web conferencing services from any organization. It is also important to check whether the web conferencing provider has organizational objectives that complement the hiring company. This will enable the hiring company to hire the best and most secure company.
Web conferencing is unpopular owing to the use of face-to-face meetings. As mentioned before, the main reason why organizations prefer face-to-face meetings to web conferencing is because of the security threat accompanied by web conferencing. Are face-to-face meetings safer than web conferences? Some organizations are justified to refrain from using web conferencing because it could be insecure. However, inclusion of the measures highlighted above can improve the security of web conferencing tremendously. In any case, if a third party is willing to take the trouble of passing all the security measures above, the same ...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • The Ten Codes
    Description: This sample is supposed to bring out my ability to research and compress information without leaving any important details out....
    1 page/≈275 words| APA | Technology | Essay |
  • Internet Effects on Children
    Description: Firstly, internet acts as an education outlet for our children. It contains unlimited information hence its a rich source in the provision of knowledge....
    1 page/≈275 words| APA | Technology | Essay |
  • Concurrent Engineering
    Description: What are the major challenges to managing projects in a concurrent engineering process?...
    4 pages/≈1100 words| APA | Technology | Essay |
Need a Custom Essay Written?
First time 15% Discount!