Case Study Boeing

Improved Essays
Discussion Points
1. Some virtual teams at Boeing have discussions focused on military aircraft. Do some Internet research on UC security mechanisms and identify and briefly describe several that Boeing should have in place to ensure the privacy and integrity of such discussions.

A 1. Boeing has completed centennial in aerospace industry in 2016 and manufactures defence aircraft, commercial jetliners and space and security systems. They are dispersed around the globe and has their footprints in 70 different countries. Spread across the length and breadth of the globe, they discovered compatibility issues in communication and shifted to different models of available communications. In 2000, they migrated to Unified Communications due to the
…show more content…
The UC Server should be backed up by reputed firewall which entrusts blocking unknown traffic into the network, enhancing the security level.
• VPN for Remote Users
VPN device is a must for unified communication because it creates encrypted tunnel over the public internet, thereby increasing the security and safety of the network. The VPN can be accessed by the trusted members of the organization, hence no unknown traffic can enter the realms of VPN. The VPN requires prior authentication to access the network.
• Strong & Unique Passwords
The passwords created to access the network should be strong and kept confidential to save the network from breach or been accessed by the hacker. The passwords should be changed periodically.
• Regular Software Updation of UC
The software should be updated regularly to fix bugs and security issues. The updation releases latest version of the software. It is imperative to take the backup of the existing data before going for software updates.
• Block Unused
…show more content…
To what extent do the UC benefits experienced by Boeing mirror those of other firms that have deployed UC capabilities over converged IP networks?

A2. Unified communications benefits are manifold and it directly boosts the business increasing its productivity. The employees of Boeing are scattered around the globe and the UC is the tool which unifies all for viable communication through various set of UC products. The amalgamation of set of products initiates the exchange of communication across multiple devices and different types of media, bringing in transparency in the system.
There are multiple benefits of UC, which we will discuss under.
Benefits of Unified Communications
• Cost Depreciation
Unified communications is one time investment and the direct leverage of UC is depreciation in recurring cost wasted on communication.
• 24*7 Availability
UC, being amalgamation of set of products, the entire system cannot collapse in one go. You are available on the network around the clock and if one set of interface goes wrong, the other interface will pull the communication.
• High

Related Documents

  • Improved Essays

    The lock should require multi-factor authentication, such as a card swipe and an access PIN, or a biometric id check and a PIN. Preferably, the PIN entry keypad would randomize the position of the digits for each PIN entry attempt. The system should be connected to the network, be centrally configured and record all access attempts in a log. c) Video Surveillance System: In order to keep records of who is physically accessing critical areas and devices, video monitoring cameras should be installed with good views of those areas. At a minimum, cameras should have a view of the inside of the wiring closet / server room, the entry point to the wiring closet / server room, and the main entrance to the company…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    To access to the computing device users will use their common access card to log on to the system. This will require them to provide a seven digit pin along with the digital certificate on the common access card. In addition to the login digital certificate there will also be an email certificate used for encrypting email traffic using a PKI system. Emails will also be required to be digitally signed ensure users are who they say they are. Users requiring access to the classified network will be issued an additional access…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Remote access to the UHS FUSION/Cerner Millennium Application Portal is available with the use of Citrix Web-Plugin once the user requests access through the Information Technology department. All passwords created to access the portal, which expires every 90 days, must be strong passwords in order maintain secure and protection from unauthorized access, as well as confidentiality. Since electronic health records are easier to access, making them also easer to exploit, access to patient information is based on criteria that is relevant to an individual’s position. As an additional measure of security, an Information Technology Security Officer conducts audits to the computer system’s activity at Summerlin Hospital Medical Center to check for any signs of abuse of the security policy. Other improved patient information security measures have been bar code technology in order to verify the medication and dosage, as well as warnings that alert healthcare providers about allergies and…

    • 1863 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    And the Utility, which is the availability to use the stored…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This LOTC was about United Health Care and Optum. I do not remember is Mike was a former Carlson student, but I do know that Grant was. These two men were really interesting to listen to because they talked quite a bit about their experience in business school and how they struggled with some of the material. They noted this was mostly because they felt that some information was unimportant. They also stated that now they wish they would have paid attention more because it turns out that almost all of the information actually was important.…

    • 882 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Strategic advantage Over the last decade, Honeywell has been able to increase annual sales exponentially and amplify its acquisitions. By diving the organization into three Strategic Business Groups (SBG), Aerospace, Automation and Control Solutions, and Performance Materials and Technologies, they have been able to better execute their strategy and focus on the global market (Honeywell.com, 2016). In an effort to continue the growth globally in the organization and to maintain a strong competitive advantage, the CEO has established an aggressive strategy, to align the acquisitions that are entered into with the current business model and those areas of market that the organization is presently operating. Therefore, the business has been able…

    • 769 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Question 2 Wal-Mart’s Rocky Path from Bricks to Clicks 1. Discuss the structural characteristics of the online retail Industry, from the point of view of the Five Competitive Forces (Porter) framework. Porter’s Five Competitive Forces model is used to analyze an industry’s value structure.…

    • 1745 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Airasia Case Study

    • 1214 Words
    • 5 Pages

    AirAsia has currently adopted information technologies strategically to integrate the operations and coordinate to the business and management function. b. Importance of Computerised MIS Importance of MIS that applied to a budget airlines service because mis is used for marketing, distributuin, reservation, sales and telecommunications. The system can link together to its departmental and outsider…

    • 1214 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays