Essay Undergraduate 534 words Human Written

Securing Telecommunications Networks Through Risk Analysis

Last reviewed: ~3 min read Business › Telecommunication
80% visible
Read full paper →
Paper Overview

Telecommunications & Network Security, Application Security and Operations Security The ubiquity of smartphone technology within the world modern business has necessitated a greater emphasis on the use of telecommunications and network security within the pursuit of information security on an organizational level. Corporations and other complex institutions...

Writing Guide
Mastering the Rhetorical Analysis Essay: A Comprehensive Guide

Introduction Want to know how to write a rhetorical analysis essay that impresses? You have to understand the power of persuasion. The power of persuasion lies in the ability to influence others' thoughts, feelings, or actions through effective communication. In everyday life, it...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 534 words · 80% shown · Sign up to read all

Telecommunications & Network Security, Application Security and Operations Security The ubiquity of smartphone technology within the world modern business has necessitated a greater emphasis on the use of telecommunications and network security within the pursuit of information security on an organizational level. Corporations and other complex institutions require a tremendous amount of data transmission -- in the form of standard telephone calls, text messages, and downloaded data -- which is facilitated by the construction of multilayered networks combining local area, wide area, and remote access networking capability.

Networks of all size, scope, and purpose are dependent on fundamental tenets of security architecture and design, properties which are typically derived after the completion of a Network Security Architecture Evaluation based on multiple telecommunications methodologies (Layton, 2007).

This evaluation process invariably leads information security officers to utilize the adaptable virtual private network (VPN), which is defined as "a secure private network that uses the public telecommunications infrastructure to transmit data," to secure "both extranets and wide area intranets using encryption and authentication & #8230; maintaining privacy and security" (Peltier, Peltier & Blackley, 2005). Information security officers have also become highly cognizant of the effects that properly ensured application security can have on an organization's internal operations.

The advent of in-house coding has enabled companies to develop proprietary software applications designed specifically to address particular functions of the business, with employees and customers encouraged to make use of the applications to facilitate e-commerce activity, customer service interaction, and other essential components of daily management.

With thousands of applications being developed, tested and released by companies and corporations across the globe since smartphone technology became the preferred communicative medium, IT have been forcefully reminded that "when a custom application is written for your organization, each component or module of the application must be checked for security holes and proper coding practices" (Peltier, Peltier & Blackley, 2005).

Having to contend with an integrated array of threats within the realms of application, network, and operations security on a simultaneous basis, information security officers must be capable of ascertaining which risks warrant diversion via preventative resources vs. those that require direct intervention. Although the complete elimination of systemic risks would obviously be preferable from an information security officer's standpoint, managers, executives, and financial analysts require a company to remain productive and profitable while risk factors are still identified and aggressively mitigated.

Protecting valuable data from intrusion and shielding proprietary knowledge from prying eyes often requires a concerted effort to effect risk analysis, which describes the process of objectively ascertaining "the business risks of an.

107 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial then $9.99/mo
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
3 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Securing Telecommunications Networks Through Risk Analysis" (2014, May 22) Retrieved April 17, 2026, from
https://www.paperdue.com/essay/securing-telecommunications-networks-through-189356

Always verify citation format against your institution's current style guide.

80% of this paper shown 107 words remaining