business communication term report1

Upload: talal-khan

Post on 04-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 Business Communication Term Report1

    1/13

    Term ReportBusiness Communication

    12/14/2012

    Umar Salman

    BS-2-CS

  • 7/30/2019 Business Communication Term Report1

    2/13

    1| P a g e

    Introduction

    Wireless networking is not new to this generation where computers and

    internet has become a part of almost everyone's daily life. Wireless internet

    was invented back in 1991 by the NCR Corporation/AT&T initially meant for

    cashier systems. Wireless internet was made commercial in 1999 by the Wi-Fi

    Alliance, a trade association that promotes wireless technology.

    Background:

    Present Scenario:The current situation of the company is that there is no Wi-Fi

    connection installed in the company and the employees and workers

    have to face great difficulties and inconvenience whenever they are

    required to surf the web for getting important information related to

    their field of expertise. The only place where the internet connection is

    available is a small lab which is mostly occupied by finance department

    of the company to keep the records. Also the workers with Laptops and

    Smart phones face great difficulty as there is no wireless connection

    available.

    Companies with Wi-Fi NetworkIn this technological era even the smaller companies have decided to

    remain updated and work efficiently by installing Wi-Fi network. This

    not only helps employees of the company but also it helps in the

    transference of data and information from one department to another

    effectively and efficiently.

  • 7/30/2019 Business Communication Term Report1

    3/13

    2| P a g e

    Problem:

    The problem your company has asked you about is the security issue involved

    in the installation of Wi-Fi network. There is a risk of the classified company

    information of being leaked through unauthorized use of wireless network

    which can be used for personal benefits and against the company as well.

    Purpose of Report:

    The purpose of this report is to justify the installation of a wireless network.

    Also, to convince the management council that wireless networks can be

    secure and is really helpful in the development and progress of the company.

    Scope of Report:

    The research of the report is based on case studies on the installation of

    wireless network in the companies which were conducted through electronic

    research. The case studies include the reason why the company felt the needof installing a wireless network, the installation of the network, the

    precautions they took in case there was a problem in the wireless network

    and how their company benefited from the wireless network.

    Interviews were conducted of people working in the IT department of

    different companies and their views and advices were taken on the topics

    such as security issues and the solutions to prevent such any kind of security

    threats.

    The following research is a combination of information I gathered from both

    the primary and secondary research.

  • 7/30/2019 Business Communication Term Report1

    4/13

    3| P a g e

    Discussion

    What is Wi-Fi :

    A popular wireless networking technology that uses radio waves to provide

    wireless high-speed Internet and network connections.

    The term Wi-Fi is an abbreviation ofwireless fidelity'. The technology used in

    Wi-Fi was developed in 1997 by the Institute of Electrical and Electronics

    Engineers (IEEE).

    Wi-Fi Device

    Wi-Fi connections are easy to maintain and can be easily installed and used by

    all the employees of the organization. Wi-Fi devices send out signals which are

    received by laptops, smartphones and computers equipped with wireless

    network adapters. These signals can obviously be received by other laptops

    and computers that come in range of the Wi-Fi connection. The range of the

    Wi-Fi can be limited by the host and the accessibility of the Wi-Fi can also berestricted through protected key or password.

    How Wi-Fi Works

    Wi-Fi works with no physical wired connection between sender and receiver

    by using radio frequency (RF) technology. The cornerstone of any wireless

    network is an access point (AP). The access point broadcasts a wireless signal

    that computers can detect and "tune" into. In order to connect to an access

  • 7/30/2019 Business Communication Term Report1

    5/13

    4| P a g e

    point and join a wireless network, computers and devices must be equipped

    with wireless network adapters.

    Wi-Fi Network System

    Advantages of Wi-Fi:

    Mobility: Free flow of information. Wireless network enables us toconnect to the world with a free flow of information in both directions.

    That is, information can flow in and out of the system without anyhindrance.

    Cheap:Installing a Wi-Fi costs less than network cables, since we mustsubtract from the budget the network cables and connectors. For

    equipment, an access point plus a wireless card for computer and

    sufficient peripheral. No software is required, only a simple operating

    system

    Simplicity: Elimination of the need of complex cabling andconstruction. Using wireless connection helps us in getting rid of

    excessive wires making the workplace look more clean and organized.

    Easy to Use: All kinds of devices installed with a wireless networkadapter can catch the signals and connect to the internet. This has

  • 7/30/2019 Business Communication Term Report1

    6/13

    5| P a g e

    made working even easier as people can connect to the internet from

    anywhere using all kinds of devices.

    Allow mobile working with a PDA or other mobile device, you can be

    constantly connected to your company network. This makes office

    workers constantly contactable. So you can carry around our work

    wherever you want to.

    Both the case studies I've included in my report show that following

    challenges were faced by their company during the installation of the wireless

    network connection.

    Here I have stated the problems from both the case studies that I found

    relevant to the problems our company might face upon the installation of

    wireless network.

    Planning and Financing for Installation:

    This includes planning for the installation of wireless network around the

    company. That is, all that places where the wireless router needs to be

    installed and how many routers will be sufficient for the company.

    Financing includes all the companies that are ready to sponsor the installationof wireless network in our company, if there are any. If not, then planning the

    total amount of money that the company can afford to spend on the

    installation of wireless network. This also includes finding out whether the

    installation company will take any extra charges for annual service of all the

    routers and whether or not they will provide free service in case of any

    problem.

    Technology and Standard Selection:

    This depends on the cost decided by the company. If the company's cost is

    enough for the installation of the latest technology, the company will have the

    latest technology installed. But if not, the company will have to do with

    whatever comes within the cost.

    Technology and standard selection both depend on the cost decided by the

    company.

  • 7/30/2019 Business Communication Term Report1

    7/13

    6| P a g e

    Security:

    As with any new technology, the security of Wi-Fi is subject to constant

    review and improvement. When you buy Wi-Fi equipment its security settings

    are set on default which allows maximum access to the wireless network. Thisallows unauthorized access and use of your network.

    An unsecured Wi-Fi connection can be used to perform illegal acts. The user

    can also easily find out everything you do over the internet. From everything

    you type to even the graphics that your computer displays. This can be a

    serious threat to the security of the company.

    To prevent this kind of mishaps different companies different kinds of security

    modes most precisely using different types of keysFollowing is a pie chart to describe what security modes are used by

    companies and at what scale they are used.

    Security Modes

    Open - not ISP

    Open ISP

    WPA - not ISP

    WPA - ISP

    WEP

    WPA - PSK

  • 7/30/2019 Business Communication Term Report1

    8/13

    7| P a g e

    Solutions:

    The solution is to turn on the security settings in order to avoid any

    unauthorized use of your network as hackers can extract the company

    information and secrets using the wireless network. They can also access theprivate company data and use it for their personal benefit.

    Wireless connections are not entirely safe and all the threats cannot

    completely be eliminated. But security threats can be reduced to the

    maximum limit which makes it very unlikely for the company information to

    become accessible to other. For the threat of hackers within the office,

    different routers can be installed for the offices where private data is accessed

    or those offices can use the wired internet connection for completely

    eliminating the threat of office data being hacked or abused.

    The level of security can be varied depending upon the amount of security

    required. So there can be different security measures at different levels of the

    organizational hierarchy.

    Following measures can be taken to minimize the security threats:

    Create a unique password on your router. Reduce the range of the wireless signal Use the anti-Wi-Fi paint Upgrade you router's firmware

    Above are the non-technical measures the company can take in order to

    minimize the threats of network hijacking.

    Create a unique password for your router:Creating a unique password would prevent others from accessing the

    router. You can change the password from the administration settings on

    your router's settings page.

    Reduce the range of the wireless signal:Set a specific range of the wireless connection that is enough to cover your

    entire office. This does not allow outsiders to receive your wireless

    connection's signals.

  • 7/30/2019 Business Communication Term Report1

    9/13

    8| P a g e

    Although this involves technical assistance but the range of the wireless

    signals have to be determined by the users.

    Use anti-Wi-Fi paint:Researchers have developed an anti-Wi-Fi paint that prevents signals from

    coming in and going out. This will not let any outsider have access to the

    company's wireless internet, protecting it from hackers.

    Anti-Wi-Fi Paint

    Upgrade your router's firmware:Following will be the company's IT department's responsibility.

    The company should check the manufacturers site occasionally to make

    sure that the router is running the latest firmware. The existing firmware

    version of your router can be found from the routers dashboard at

    192.168.*.

    These were the measures that the company can take on its part in its

    attempt to keep their wireless network safe.

  • 7/30/2019 Business Communication Term Report1

    10/13

    9| P a g e

    Conclusion

    Views of Employees:

    Working staff and Employers of the company are very much interested in

    installing the Wi-Fi Network in the company as they face great difficulties

    without this facility and it would help them get their work done effective,

    precisely in time and efficiently.

    Views of the Management:

    Management of the company is interested in installing the Wi-Fi network

    system in the company but at the same time they are very much

    concerned about the security risks that would come with the installation of

    Wi-Fi Network and security threats that company might have to face after

    the installation of the Wi-Fi Network.

    Organizations and individuals benefit when wireless networks and devices

    are protected. After assessing the risks associated with wireless

    technologies, organizations can reduce the risks by applying

    countermeasures to address specific threats and vulnerabilities. These

    countermeasures include management, operational, and technical

    controls. While these countermeasures will not prevent all penetrations

    and adverse events, they can be effective in reducing many of the common

    risks associated with wireless technology.

  • 7/30/2019 Business Communication Term Report1

    11/13

    10| P a g e

    Recommendations

    Internet is certainly the most unique and greatest gift of technology to

    mankind. Today internet has become an indispensable part of every aspect of

    our life. It is not only the fastest mode of providing information but today it is

    serving us in various other ways.

    Internet is an important technology that every company, institution,

    organization is using to prosper and grow. It is very important for every

    company to have access to the world's information. The positive impact of

    internet has been largely felt by the business fraternity. In fact, with the

    introduction of internet, the definition of business development has gone for

    a permanent changeover. Unlike the past, today quality and quantity are not

    the only benchmarks for the growth and development of a business. Today

    visibility in the market is a bigger factor. Your brand should reach the global

    market. Your products should be visible everywhere. People across the world

    should recognize your brand. Today product promotion and campaigning are

    the most important criteria for achieving success in a business. And for

    successful product promotion and campaigning you need to improve your

    communication and interaction with people.

    With its modern tools, internet helps you to do that. The days of publishing

    advertisements in newspapers are over. You need to reach people faster and

    you can do that through online marketing. People can get to know about you,

    your company and every detail about it just with a click on the mouse at any

    time and from any place. Regular communication between all entities of the

    business, such as manufacturer, supplier, buyer, seller, wholesalers and

    dealers is very important.

    In order to achieve the above our company needs an internet connection that

    is fast and available for everyone at all times for maximum productivity.

    Wireless internet connection provides us with all of that including ease of use

    and flexibility.

    According to me, wireless connection is a very good option for the company

    and it should be implemented in our company so we could keep up with the

    fast paced world.

  • 7/30/2019 Business Communication Term Report1

    12/13

    11| P a g e

    References

    Digital inspiration.(2011, Jan 1).How to Secure Your Wireless (Wi-Fi)Home Network. Retrieved Dec 11, 2012 from

    http://www.labnol.org/internet/secure-your-wireless-wifi-

    network/10549/

    Bokehmon (2012, May 3). How to Secure Your wireless Home Network.http://www.wikihow.com/Secure-Your-Wireless-Home-Network.

    Retrieved Dec 11, 2012

    Webopedia. Wi-Fi.http://www.webopedia.com/TERM/W/Wi_Fi.html. Retrieved May 14,

    2012

    Wikipedia. Wi-Fi. Retrieved Dec 12, 2012 fromhttp://en.wikipedia.org/wiki/Wi-Fi

    iBlue. Wi-Fi Technology - What is it & How it Works?http://iblue.hubpages.com/hub/Wi-Fi-technology. Retrieved Dec 12,

    2012

    Wikipedia. Wireless network. Retrieved Dec 13, 2012 fromhttp://en.wikipedia.org/wiki/Wireless_network#General

    HOW WIRELESS TECHNOLOGY CAN HELP YOU WORK ANYWHERE.Retrieved Dec 13, 2012 from

    http://www.connectingsomerset.co.uk/tips/e-business/WiFi.pdf

    Shailandra Kaushik. An overview of Technical aspect for WiFi NetworksTechnology.http://www.ijecse.org/wp-content/uploads/2012/01/PP-28-34.pdf. Retrieved Dec 13, 2012

    http://www.labnol.org/internet/secure-your-wireless-wifi-network/10549/http://www.labnol.org/internet/secure-your-wireless-wifi-network/10549/http://www.labnol.org/internet/secure-your-wireless-wifi-network/10549/http://www.wikihow.com/Secure-Your-Wireless-Home-Networkhttp://www.wikihow.com/Secure-Your-Wireless-Home-Networkhttp://www.webopedia.com/TERM/W/Wi_Fi.htmlhttp://www.webopedia.com/TERM/W/Wi_Fi.htmlhttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Wi-Fihttp://iblue.hubpages.com/hub/Wi-Fi-technologyhttp://iblue.hubpages.com/hub/Wi-Fi-technologyhttp://en.wikipedia.org/wiki/Wireless_network#Generalhttp://en.wikipedia.org/wiki/Wireless_network#Generalhttp://www.connectingsomerset.co.uk/tips/e-business/WiFi.pdfhttp://www.ijecse.org/wp-content/uploads/2012/01/PP-28-34.pdfhttp://www.ijecse.org/wp-content/uploads/2012/01/PP-28-34.pdfhttp://www.ijecse.org/wp-content/uploads/2012/01/PP-28-34.pdfhttp://www.ijecse.org/wp-content/uploads/2012/01/PP-28-34.pdfhttp://www.ijecse.org/wp-content/uploads/2012/01/PP-28-34.pdfhttp://www.ijecse.org/wp-content/uploads/2012/01/PP-28-34.pdfhttp://www.connectingsomerset.co.uk/tips/e-business/WiFi.pdfhttp://en.wikipedia.org/wiki/Wireless_network#Generalhttp://iblue.hubpages.com/hub/Wi-Fi-technologyhttp://en.wikipedia.org/wiki/Wi-Fihttp://www.webopedia.com/TERM/W/Wi_Fi.htmlhttp://www.wikihow.com/Secure-Your-Wireless-Home-Networkhttp://www.labnol.org/internet/secure-your-wireless-wifi-network/10549/http://www.labnol.org/internet/secure-your-wireless-wifi-network/10549/
  • 7/30/2019 Business Communication Term Report1

    13/13