Reliance on data assets have forced network protocol architects to design more robust protocols that protect data assets in regard to the CIA objectives.

Reliance on data assets have forced network protocol architects to design more robust protocols that protect data assets in regard to the CIA objectives. In addition, telecommunications vendors such as Cisco, Juniper, Alcatel-Lucent, Huawei, Siemens, F5, Brocade, HP, and so on have designed their devices to support organizational security objectives. Network security designers have developed new security architectures and frameworks that align with the changing landscape of the risks that enterprise data assets continue to face in this e-infrastructure era. One of the things that network engineers learn today is that end users want access to computing resources from anywhere and at any time. The need to protect data assets is at an all-time high due to compliance, regulations, and other business objectives. Yet, providing access to authorized entities without regard for the location of the entities open up the network to possible attacks. As always, security engineers and architects need to design security solutions that support organizational business needs. Having said this, what are the advantages and disadvantages of virtual offices, including telecommuting? What are the security and management issues concerning virtual offices, especially hooked up into large virtual networks? Please comment on the views of your fellow students here.