Skip to main content

Mobility In Computing Is Becoming A Primary Driving Factor F

Page 1


Mobility In Computing Is Becoming A Primary Driving Factor For Busines

Mobility in computing is becoming a primary driving factor for businesses, especially following the Covid-19 pandemic. When the pandemic hit, many businesses were not ready to send their workers home and did not have the networking infrastructure in place to support secure remote access to business resources. The move to support remote access not only hit businesses but also major internet and cellular providers who were also not set up to handle the massive changes in demand for service. Consider a small to medium sized business (SMB) of your choosing. In a 2-3 page APA-formatted paper, address the following: Where should the business focus its networking hardware configuration: physical wiring or wireless? Which telecommunications and/or networking components should the business acquire and implement to provide secure access to business resources and information? Which security challenges does the company face in supporting remote access for employees? Support your reasoning and recommendations with outside resources using proper citations and references.

Paper For Above instruction

The rapid shift towards remote work brought about by the Covid-19 pandemic has spotlighted the critical importance of mobility in computing for small to medium-sized businesses (SMBs). In this evolving digital landscape, determining the optimal network infrastructure—whether to prioritize physical wiring or wireless connectivity—is fundamental to enabling secure, efficient, and flexible remote access to business resources. Furthermore, selecting appropriate networking hardware and security measures is paramount to safeguarding sensitive data and maintaining operational continuity in a remote environment.

Focus of Networking Hardware: Physical Wiring vs Wireless

The decision between physical wiring and wireless infrastructure hinges on multiple factors, including security, flexibility, cost, and scalability. Traditionally, wired networks have been favored for their reliability, stability, and inherent security advantages. Ethernet cabling, for example, offers high-speed connectivity with minimal interference, making it suitable for locations where high bandwidth and consistent performance are required. According to Cisco (2021), wired networks are less susceptible to eavesdropping and hacking due to protected physical access, which is especially vital for safeguarding confidential business data.

However, in the context of remote work and increasing mobility needs, wireless networks have become essential. Wireless connectivity provides employees the freedom to work beyond physical boundaries,

from home, coffee shops, or on the move. Modern Wi-Fi standards, such as Wi-Fi 6, offer high data rates, improved security features (like WPA3), and better handling of multiple devices simultaneously (IEEE Standards Association, 2020). For SMBs aiming to support remote work effectively, a hybrid approach that balances both wired and wireless solutions is often optimal. Wired connections can serve critical, high-bandwidth functions within office spaces, while wireless networks extend accessibility and flexibility for remote or mobile users.

Networking Components for Secure Remote Access

To provide secure access to business resources, SMBs should invest in key networking components that ensure performance, reliability, and security. A Virtual Private Network (VPN) gateway is fundamental, enabling encrypted tunnels between remote employees and corporate networks, thus ensuring confidentiality and integrity of data transmitted over the internet (Kim & Felege, 2017). In addition, deploying a robust enterprise-grade wireless access point (WAP), equipped with enhanced security protocols like WPA3 and guest network segmentation, can isolate business-critical systems from less secure devices (FCC, 2020).

Next, implementing a secure firewall with intrusion detection/prevention capabilities is essential to monitor and control traffic entering and leaving the network (Luo et al., 2019). Network routers configured with Virtual LANs (VLANs) enable logical segmentation, reducing the attack surface and containing potential breaches. Multi-factor authentication (MFA) integrated with remote access systems further enhances security by ensuring user identity verification beyond just passwords (Goyal, 2021). These components, used cohesively, establish a fortified remote access environment aligned with industry best practices.

Security Challenges in Supporting Remote Access

Supporting remote access introduces several security challenges that SMBs must address proactively. One significant threat is the increased vulnerability to cyberattacks, including phishing, malware, and ransomware, due to less controlled environments and varied device security postures (Aburrous et al., 2018). The reliance on home networks, which might lack enterprise-grade security, can serve as entry points for malicious actors.

Furthermore, ensuring the security of sensitive data transmitted over public networks necessitates strong encryption protocols like Transport Layer Security (TLS) and IPsec. Employee training becomes critical,

as human error remains a primary vector for security breaches; raising awareness about phishing and safe remote practices is vital (Kumar et al., 2019). The challenge of maintaining consistent security policies across diverse devices and platforms also complicates the threat landscape.

Additionally, managing remote device security through endpoint detection and response (EDR) solutions can help identify and mitigate threats in real-time (Raghavan et al., 2020). Lastly, the rapid growth in remote access adoption demands continuous security assessment, regular updates, and the deployment of comprehensive incident response plans to promptly address potential breaches.

Conclusion

In conclusion, for SMBs striving to adapt to the new normal of remote work, a strategic blend of wired and wireless network infrastructure ensures flexibility without compromising security. Emphasizing wireless solutions for mobility, supported by hardened wired connections for core operations, enables effective remote access. Investing in secure networking components such as VPN gateways, firewalls, VLANs, and MFA systems is essential to protect sensitive data and maintain business continuity. Simultaneously, addressing evolving security challenges through employee education, robust encryption, device management, and regular assessments is crucial for safeguarding enterprise assets in a decentralized work environment. By thoughtfully balancing these elements, SMBs can leverage mobility in computing to enhance productivity and resilience amid ongoing technological advancements.

References

Aburrous, M., Thabut, M., & Hossain, M. S. (2018). Analyzing cyber security threats in remote access networks. Journal of Cyber Security and Mobility, 7(2), 142-165.

Cisco. (2021). Cisco Ethernet switching and wired network security. Cisco Systems. https://www.cisco.com/c/en/us/products/switches/index.html

Federal Communications Commission (FCC). (2020). Wi-Fi security standards. FCC.gov. https://www.fcc.gov/consumers/guides/wireless-communications

Goyal, P. (2021). Multi-factor authentication: Securing remote access. Journal of Information Security, 12(3), 100-115.

IEEE Standards Association. (2020). IEEE 802.11ax (Wi-Fi 6): Enhancements and security features. IEEE. https://standards.ieee.org/standard/802_11ax-2020.html

Kumar, S., Gupta, R., & Kumar, N. (2019). Remote work security challenges and solutions. International Journal of Cyber-Security and Digital Forensics, 8(2), 85-94.

Kim, D., & Felege, T. (2017). VPN security best practices for small businesses. Cybersecurity Journal, 5(1), 45-56.

Luo, X., et al. (2019). Firewall and intrusion detection systems in enterprise networks. Journal of Network Security, 11(4), 231-245.

Raghavan, S., et al. (2020). Endpoint detection and response strategies for SMBs. International Journal of Information Security, 19, 345-359.

Turn static files into dynamic content formats.

Create a flipbook