-
Essay / Running Head Discussion
Some Boeing virtual teams are having discussions focused on military aircraft. Research unified communications security mechanisms on the Internet and identify and briefly describe several that Boeing should implement to ensure the confidentiality and integrity of these discussions. As organizations have begun to rely more on unified communications, managing voice, video, and messaging through a unified system has raised concerns about the security of this IP-based communications infrastructure. This is because UC is IP-based, but there are many potential modes of communication, from video, instant messaging, and web collaboration to presence, email, and voicemail. . Over time, we see the situation has grown with an increase in the number of mobile devices that are used more frequently in business environments and devices that are not as secure as those hosted within the business organization. professional environment (Manyika, Chui, Brown, Bughin, Dobbs, Roxburgh). and Byers, 2011). The main security problem in unified communications is eavesdropping. This is the idea that external parties can access the IP connection to listen to a web conference, receive instant message exchanges or other communication media. Therefore, the greatest concern arises when organizations extend their unified communications capabilities across borders, that is, to external partners. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get Original Essay Additionally, SIP trunking is another service that allows organizations to use Voice over IP over the Internet connection. This has caused a lot of concern as the organization moves from a digital connection to an IP-based connection in order to receive and make phone calls regarding hacking increases. The best way to mitigate this problem is to ensure that the system includes SIP-enabled firewalls or session boundary control as protection mechanisms. In addition to this, there are many products in the SIP security market that will help mitigate the risks. Another growing concern is denial of service. It is an attack method most commonly associated with the Internet, although it has become a growing threat to unified communications. This has led to an increase in the number of mobile devices within the workforce, leading to the newest entrant entering the UC infrastructure. This is a valuable addition, allowing workers to participate in meetings and collaborative activities from anywhere, but it also presents challenges. In most organizations, this allows employees to use their own cell phones. For example, there are concerns about password protection as well as how to erase phone data if lost and how to ensure call data records are intact. not compromised. For the device, best practices include closing unused services and ports and changing default passwords. For networking, best practices include deploying firewalls, router access control lists, virtual LANs, port-level switch security, and authenticated network access. Securely authenticate all mobile users of the organization's assets. Implement security managementfrom a distance. Implement end-to-end encryption of messages and data. Install remote device lock and remote device wipe in case of theft or loss. Other proactive measures include implementing host- and network-based intrusion detection and prevention systems or proxy servers to protect SIP trunks. Although unified communications security has come a long way in recent years, it is getting better. Not only are SIP security capabilities greatly improved, but there is also a lot of interest in security certificate authentication mechanisms. Once this is in place, users placing a call over an IP network would be able to validate the identity of the person on the other end of the line (Bradley and Shah, 2010). To what extent do Boeing's unified communications benefits reflect those of other companies that have deployed unified communications capabilities over converged IP networks? Boeing could take advantage of desktop sharing and online meeting capabilities that involve collaboration capabilities before and after the creation of the unified IP network. It is important to note that Boeing continues to subscribe to many of the collaboration services it used before implementing its unified communications solutions (Bradley and Shah, 2010). With this, it is best to observe that unified communications are a complement and not a replacement to the collaboration systems already in place. One of the major changes associated with Boeing's unified communications system was the ability for employees to use the same softphone headset to support both office systems. and cell phone calls. Telephony capabilities follow the mobile worker who can specify on the fly which device to route calls to. Their Boeing phone number is always the same, whether they're in the office, at home, on the road, or working halfway around the world. Detailed team member presence information is provided through Lync's location and activity feed features. Supply chain partners can also view the presence information of their key contacts at Boeing; this facilitates their interactions with the engineering and maintenance teams of the Boeing organization (Manyika, Chui, Brown, Bughin, Dobbs, Roxburgh, & Byers, 2011). Benefits of Unified Communications for Boeing: Boeing's converged IP network and unified communications capabilities enable employees to share information and knowledge faster and more efficiently, regardless of their location. Boeing's geographically dispersed engineers use these systems to share their expertise, just as they would if they were in the same place at the same time. The ability to support unified communications capabilities over the unified IP network facilitates knowledge sharing and has become an important facet of Boeing's collaboration and knowledge management strategies (Bradley and Shah, 2010). The company's unified communications system allows employees working at remote sites to benefit from the same capabilities as in their home office. Virtual teams benefit from the ability to adjust their interactions to the mode of communication that works best for them. For example, they are able to switch from instant messaging to voice communication and/or a desktop sharing session depending on the needs of the situation. The UC system's enhanced attendance capabilities also provide real-time information on availability and activities., 2011)