Verified Document

Network Management Information Technology Management Thesis

). A book entitled "Surviving Security: How to Integrate People, Process, and Technology" explains that the rapid expansion networking and networking technologies necessitates greater security needs. The author asserts that parts of the network such as routers, switches and even network printers are vulnerable (Andress). The article further explains that the router or switch contained between the firewall and the internet access or between the firewall and the internal network are often vulnerable. Organizations with networks should work hard to secure them at these points. The article also states that if attackers can gain access to a network at these points, they can gain access to sensitive information and compromise the stability of the network. Also attackers who gain access to a network at one of the aforementioned points will also be able to develop man in the middle attacks that often involve rerouting internet traffic so that consumers cannot gain access to the organizations sits (Andress). This can result in a loss of revenue and a loss of customers.

Because converged networks are even more vulnerable than conventional networks, it is important that network managers properly secure the network. A failure to do so can result in catastrophe. For businesses a poorly designed network security system could result in loss of revenue. For organizations such as emergency responders' poor security can result in not having the capacity to respond to emergencies in a timely manner. Regardless of the type of organization that utilizes the network, security is essential to ensuring that the network operates successfully.

Both the advantages and disadvantages of converged networks are important for organizations to understand, so that the proper decisions can be made as it pertains to implementing a converged network. An article published in the Bell Labs Technical Journal, explains that successful converged networks have the capacity to allow subscribers to get access to voice, video and data in a manner that is effortless. It is evident that organizations must develop a network that is consistent with their needs.

Conclusion

The purpose of this discussion was to examine network management as it pertains to a converged network (i.e. voice, data, and video). The research suggests that converged networks are emerging as an organizational norm. Such networks care convenient and cost effective. In fact the popularity of such...

Such reductions in costs, lead to greater profitability for businesses and the ability to reduce costs for other types of organizations. In addition convergent networks are easier to manage because it combines various functions into a single network.
Additionally such networks allow remote employees to have access to the internet, organizational internal networks and voice and data communication. The research also found that converged networks can also be difficult to secure. As such organizations must develop network security that ensures that networks are less vulnerable to outside attacks. Overall it is evident that the presence of converged networks is sure to increase in coming years. As technology and security options continue to improve organization will view converged networks as a viable option to meet the needs of the organization.

Works Cited

Strong Case for converged Networks." 24 October, 2008 http://www.networkmagazineindia.com/200206/cover2.shtml

Andress, Amanda. Surviving Security: How to Integrate People, Process, and Technology. Boca Raton, FL: Auerbach Publications, 2003

Bates, R.J. Voice and Data Communication Handbook. McGraw-Hill Professional, 2007

CRITICAL INFRASTRUCTURE PROTECTION Further Efforts Needed to Integrate Planning for and Response to Disruptions on Converged Voice and Data Networks. United States Government Accounting Office, 2008. http://www.gao.gov/new.items/d08607.PDF

Dawkins, J., K. Clark,1 G. Manes,1and M. Papa. A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks Journal of Network and Systems Management, Vol. 13, No. 3, September 2005. 253-267

Dong Sun, Jean-Philippe Joseph, Francis R. Magee, Jr., Amit Mukhopadhyay, Benjamin Tang. A SIP-enabled all-IP architecture for converged next-generation networks. Bell Labs Technical Journal

Volume 9 Issue 3, 2004. 15-37

Godwin-Jones, Robert. "Skype and Podcasting: Disruptive Technologies for Language Learning." Language, Learning & Technology 9.3 (2005): 9+.

Johnston, Randolph P. "A Tour of Tomorrow's Technology: Don't Let the Future Sneak Up on You." Journal of Accountancy 200.4 (2005): 95+.

Network Management. Glossary. 24 October, 2008 http://www.precidia.com/support/glossary.html

Sources used in this document:
Works Cited

Strong Case for converged Networks." 24 October, 2008 http://www.networkmagazineindia.com/200206/cover2.shtml

Andress, Amanda. Surviving Security: How to Integrate People, Process, and Technology. Boca Raton, FL: Auerbach Publications, 2003

Bates, R.J. Voice and Data Communication Handbook. McGraw-Hill Professional, 2007

CRITICAL INFRASTRUCTURE PROTECTION Further Efforts Needed to Integrate Planning for and Response to Disruptions on Converged Voice and Data Networks. United States Government Accounting Office, 2008. http://www.gao.gov/new.items/d08607.PDF
Network Management. Glossary. 24 October, 2008 http://www.precidia.com/support/glossary.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Network Management Define Network Management
Words: 909 Length: 3 Document Type: Assessment

Another aspect of the security management area of a network management system is the development of policy-based auditing and alerts by role in the organization (Merilainen, Lemmetyinen, 2011). This is one of the areas of knowledge-enabled security management, specifically in the area of role-based access and advanced auditing and reporting. Fault management is also an area that no single suite of network management systems can completely meet per the ISO standards

Information Technology Change Management in Home Health
Words: 1391 Length: 5 Document Type: Essay

Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized

Information Technology One of the Main Sources
Words: 1522 Length: 4 Document Type: Term Paper

Information Technology One of the main sources of development of human beings is through the development of knowledge and in this exercise; we shall be talking about a group in our society who are mainly interested in the development of knowledge -- a university. In these organizations also, information technology now plays an important role as the storage and transfer of knowledge within the organizations and from outside the organization. In

Information Technology an Effective Project
Words: 1908 Length: 6 Document Type: Essay

It is possible to avoid becoming a victim of such crimes through some basic precautionary methods. Firstly, it is essential to store or discard personal information in a careful manner. This means personal documents should not be left lying around or shared through internet. All personal information should be stored in a secure place. All sorts of old receipts, expired cards, bank statements and checks should be disposed of

Information Technology -- Communication Issues
Words: 721 Length: 2 Document Type: Essay

Even worse, the technology supplying signals from NYFD commanders to firefighters in the field were never properly tested in high-rise emergency scenarios. Had they been appropriately tested in advance, the NYFD could probably have avoided the greatest loss of life among its service members in the organization's long history in September of 2001 because evacuation orders would have been received by hundreds of personnel inside the Twin Towers before

Information Technology a Home Network
Words: 1182 Length: 4 Document Type: Essay

Processing examples are conversion of encoded or typed words to printable format or running of computer programs such as the Statistical Package for Social Sciences (SPSS). Lastly, controlling ensures that all other four operations of the computer are efficiently working together, while at the same time, ensuring also that each operation does not interfere with the other operations. Examples of control measures in the computer are warnings or prompts

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now