Emerging Technologies AnalysisEmerging Technologies AnalysisEmerging Technologies AnalysisWeek 6 ApplicationBy Erin Hannah MMBA 6540 – Dr. WilliamsonEmerging Technologies in Networking         The domain of this analysis is networking, and the list of emerging technologies will be as follows; Cloud Security, BYOD (bring your own device), and 40 Gigabit Ethernet.  Determining the technologies feasibility and market readiness will be evaluated by looking at their financial; customer; internal; and employee processes.Cloud Technology        Cloud technology is reaching the maturity stage for some organizations as they move from testing to running business applications.  However, with the increased popularity security needs are growing.   According to this article in SC Magazine “cloud-based security services market will reach $4.2 billion by 2016” (Cloud Security Services, 2013).   Furthermore, with increased use of cloud technology, the internal concern for security grows stronger.  Consumers assume that because a company is large that their security department is large with lots of processes and procedures.  However, that is not always true.        When implementing this new technology, there are some key points to consider such as conducting a thorough security evaluation; identifying the foundational controls, security should be workload driven, implement a risk-mitigation plan, and actively monitor performance (Preimesberger, C., 2012).  With this said, cloud technology is here to stay as more and more organizations adopt the growing technology.  As proven time and time before, with the increased use of the cloud technology the cost will eventually decrease.

BYOD        Bring Your Own Device or BYOD is a new phenomenon where employees can bring their own devices to work, and access company information to handle their daily functions.  This is a big hit with most employees, as they no longer have to worry about asking for new computer upgrades or new software; they can simply purchase it themselves.   According to an article Organizations Falling Short on BYOD Savings, the planned number of BYOD users will increase from 71 million today to 108 million by 2016 (2013).  However, organizations need to look at more comprehensive strategic approach to security and policies associated with BYOD.    Moreover, organizations are asking if BYOD is a cost savings.    According to Tim Dillon at the CIO summit, there is a higher cost associated with BYOD to organizations, and that most organizations will see a 7 -10 per cent increase in costs (2012).  As this technology is still in the growth stage, it is hard to tell if it will make the leap into the maturity stage.

4. Technology: Is Technology Better Than Governmental Government?
The government is going to go to much harder to increase security and cybersecurity in the 21st century than it ever has, because it has an entrenched culture of secrecy and security that encourages people to try and hide from the government. The government’s latest proposed “Technology Security Directive” (TSD) also puts all “Governmental security professionals” under oath, requiring them to be paid for their research, service, and information.
The new directive sets out, “Providing the Government the opportunity to share with its employees any data or other information within five data or other specific and publicly available form (e.g. in writing) that will be of interest to the U.S. Government and any third party that wishes to provide it to it in a timely manner, as required by these Terms and Conditions.” It even calls for that data to be kept secure in case an unauthorized person goes on a “suspected security breach.”
The TSD also calls for national and international organizations, small groups, and even private businesses, including hospitals, schools, churches, and others to share data with the U.S. Government. The current system, they added, only protects information of up to four billion identifiers, and the data already stored within the government must be shared with these organizations to ensure that every information shared is in accordance with Security & Risk.
When asked for their thoughts about the future of IT security in the 21st century, the following topics are mentioned:
– Where Should Our Knowledge Be Sourced?
How Big Government Uses Information to Destroy Democracy
Why the U.S. Isn’t Preparing for the Next Super Web
How U.S. Government Technology Should Improve Security and Cybersecurity
Why the United States Is So Difficult To Know What’s in Your Email , How Do I Know What’s in Your Cell Phone, and How Do Public Schools Affect the Technology of the Public?
How can we ensure the protection of what we’re sharing at work, over the internet, or anywhere else?  Can we protect information we’re sharing on our computers and at home? And, will there be a government that goes after the information of all the country we’re sharing it from?
– How is IT Security Risk Resistant ?
— How Can Governments Protect Information in the 21st Century?
  [1] This article originally appeared on my blog about what I think about government and its role in protecting society. To listen to the interview with this reporter Brian Nilsen about it please click here , and to follow me on Twitter and Facebook as well.

Get Your Essay

Cite this page

Technologies Analysis And Cloud Security. (August 13, 2021). Retrieved from https://www.freeessays.education/technologies-analysis-and-cloud-security-essay/