Network Management Information Technology Management Thesis

Length: 8 pages Sources: 8 Subject: Education - Computers Type: Thesis Paper: #99856119 Related Topics: Computer Network, Wireless Network, Internet Protocol, Information Technology
Excerpt from Thesis :

). Such security should also preplan strategic responses to attacks associated with the network (Dawkins et al.).

A book entitled "Surviving Security: How to Integrate People, Process, and Technology" explains that the rapid expansion networking and networking technologies necessitates greater security needs. The author asserts that parts of the network such as routers, switches and even network printers are vulnerable (Andress). The article further explains that the router or switch contained between the firewall and the internet access or between the firewall and the internal network are often vulnerable. Organizations with networks should work hard to secure them at these points. The article also states that if attackers can gain access to a network at these points, they can gain access to sensitive information and compromise the stability of the network. Also attackers who gain access to a network at one of the aforementioned points will also be able to develop man in the middle attacks that often involve rerouting internet traffic so that consumers cannot gain access to the organizations sits (Andress). This can result in a loss of revenue and a loss of customers.

Because converged networks are even more vulnerable than conventional networks, it is important that network managers properly secure the network. A failure to do so can result in catastrophe. For businesses a poorly designed network security system could result in loss of revenue. For organizations such as emergency responders' poor security can result in not having the capacity to respond to emergencies in a timely manner. Regardless of the type of organization that utilizes the network, security is essential to ensuring that the network operates successfully.

Both the advantages and disadvantages of converged networks are important for organizations to understand, so that the proper decisions can be made as it pertains to implementing a converged network. An article published in the Bell Labs Technical Journal, explains that successful converged networks have the capacity to allow subscribers to get access to voice, video and data in a manner that is effortless. It is evident that organizations must develop a network that is consistent with their needs.

Conclusion

The purpose of this research suggests that converged networks are emerging as an organizational norm. Such networks care convenient and cost effective. In fact the popularity of such networks exists because they allow businesses and organizations to cut cost dramatically. Such reductions in costs, lead to greater profitability for businesses and the ability to reduce costs for other types of organizations. In addition convergent networks are easier to manage because it combines various functions into a single network.

Additionally such networks allow remote employees to have access to the internet, organizational internal networks and voice and data communication. The research also found that converged networks can also be difficult to secure. As such organizations must develop network security that ensures that networks are less vulnerable to outside attacks. Overall it is evident that the presence of converged networks is sure to increase in coming years. As technology and security options continue to improve organization will view converged networks as a viable option to meet the needs of the organization.

Works Cited

Strong Case for converged Networks." 24 October, 2008 http://www.networkmagazineindia.com/200206/cover2.shtml

Andress, Amanda. Surviving Security: How to Integrate People, Process, and Technology. Boca Raton, FL: Auerbach Publications, 2003

Bates, R.J. Voice and Data Communication Handbook. McGraw-Hill Professional, 2007

CRITICAL INFRASTRUCTURE PROTECTION Further Efforts Needed to Integrate Planning for and Response to Disruptions on Converged Voice and Data Networks. United States Government Accounting Office, 2008. http://www.gao.gov/new.items/d08607.PDF

Dawkins, J., K. Clark,1 G. Manes,1and M. Papa. A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks Journal of Network and Systems Management, Vol. 13, No. 3, September 2005. 253-267

Dong Sun, Jean-Philippe Joseph, Francis R. Magee, Jr., Amit Mukhopadhyay, Benjamin Tang. A SIP-enabled all-IP architecture for converged next-generation networks. Bell Labs Technical Journal

Volume 9 Issue 3, 2004. 15-37

Godwin-Jones, Robert. "Skype and Podcasting: Disruptive Technologies for Language Learning." Language, Learning & Technology 9.3 (2005): 9+.

Johnston, Randolph P. "A Tour of Tomorrow's Technology: Don't Let the Future Sneak Up on You." Journal of Accountancy 200.4 (2005): 95+.

Network Management. Glossary. 24…

Sources Used in Documents:

Works Cited

Strong Case for converged Networks." 24 October, 2008 http://www.networkmagazineindia.com/200206/cover2.shtml

Andress, Amanda. Surviving Security: How to Integrate People, Process, and Technology. Boca Raton, FL: Auerbach Publications, 2003

Bates, R.J. Voice and Data Communication Handbook. McGraw-Hill Professional, 2007

CRITICAL INFRASTRUCTURE PROTECTION Further Efforts Needed to Integrate Planning for and Response to Disruptions on Converged Voice and Data Networks. United States Government Accounting Office, 2008. http://www.gao.gov/new.items/d08607.PDF


Cite this Document:

"Network Management Information Technology Management" (2008, October 27) Retrieved October 22, 2021, from
https://www.paperdue.com/essay/network-management-information-technology-27274

"Network Management Information Technology Management" 27 October 2008. Web.22 October. 2021. <
https://www.paperdue.com/essay/network-management-information-technology-27274>

"Network Management Information Technology Management", 27 October 2008, Accessed.22 October. 2021,
https://www.paperdue.com/essay/network-management-information-technology-27274

Related Documents
Network Management Define Network Management
Words: 909 Length: 3 Pages Topic: Business - Management Paper #: 58042983

Another aspect of the security management area of a network management system is the development of policy-based auditing and alerts by role in the organization (Merilainen, Lemmetyinen, 2011). This is one of the areas of knowledge-enabled security management, specifically in the area of role-based access and advanced auditing and reporting. Fault management is also an area that no single suite of network management systems can completely meet per the ISO standards

Information Technology Change Management in Home Health
Words: 1391 Length: 5 Pages Topic: Business - Management Paper #: 68049573

Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized

Information Technology an Effective Project
Words: 1908 Length: 6 Pages Topic: Business - Management Paper #: 85343597

It is possible to avoid becoming a victim of such crimes through some basic precautionary methods. Firstly, it is essential to store or discard personal information in a careful manner. This means personal documents should not be left lying around or shared through internet. All personal information should be stored in a secure place. All sorts of old receipts, expired cards, bank statements and checks should be disposed of

Information Technology One of the Main Sources
Words: 1522 Length: 4 Pages Topic: Business - Management Paper #: 5039202

Information Technology One of the main sources of development of human beings is through the development of knowledge and in this exercise; we shall be talking about a group in our society who are mainly interested in the development of knowledge -- a university. In these organizations also, information technology now plays an important role as the storage and transfer of knowledge within the organizations and from outside the organization. In

Information Technology -- Communication Issues
Words: 721 Length: 2 Pages Topic: Business - Management Paper #: 37193771

Even worse, the technology supplying signals from NYFD commanders to firefighters in the field were never properly tested in high-rise emergency scenarios. Had they been appropriately tested in advance, the NYFD could probably have avoided the greatest loss of life among its service members in the organization's long history in September of 2001 because evacuation orders would have been received by hundreds of personnel inside the Twin Towers before

Information Technology a Home Network
Words: 1182 Length: 4 Pages Topic: Education - Computers Paper #: 46236766

Processing examples are conversion of encoded or typed words to printable format or running of computer programs such as the Statistical Package for Social Sciences (SPSS). Lastly, controlling ensures that all other four operations of the computer are efficiently working together, while at the same time, ensuring also that each operation does not interfere with the other operations. Examples of control measures in the computer are warnings or prompts