Seismic imaging is a tool that works by bouncing the sound waves off the underground rock structures to reveal crude oil and natural gas-bearing formations (Chevron, 2015). Ultrasensitive devices called geophones are applied by seismologists to record the sound waves as they echo within the earth. Sophisticated 3-D imaging creates a high definition of pictures of the subsurface geology, which is almost similar to X-ray in medicine that covers thousands of square miles and extends 10 miles(Chevron, 2015).
Chevron has been applying the proprietary seismic imaging technology, and the company achieved an exploration rate of 66% in 2014(Chevron, 2015). The technology allows the Chevron scientists to see what is beneath the surface of the earth accurately and clearly than ever before. Proprietary tools have enabled the scientists to find significant amounts of oil and gas in areas that are challenging to access such as thick salt mountains, in the deep-water portions of the U.S. Gulf of Mexico(Chevron, 2015).
Security Vulnerabilities Associated with SCADA and Digital Industrial Control Systems
SCADA systems are widely distributed and networked and are dependent on the open protocol for the internet, and hence they are vulnerable to security threats and concerns (Kim, 2012). One of the threats is unauthorized access to the control software whether human access or the changes that ate made deliberately or unintentionally by the virus infections and other software threads that exist in the control host machines. The second thread is the packet access to the networks segments that host the SCADA and other digital control systems(Kim, 2012).
The following measures can be taken to mitigate the issue; first, there should be strict limitations and authority control for the external connections(Kim, 2012). Second, reinforcing security systems in the demilitarized zones, third; enhancing security using virtue private networks and integrity tools of the servers(Kim, 2012). Fourth, minimizing the access paths to the internal networks and enhance monitoring. Encryption of emails, files and directories need to be enhanced and inspecting any security and vulnerabilities including the development of controls and monitoring methods for handling any contingencies(Kim, 2012).
The pros and cons of Moving Enterprise-wide Applications that have traditionally been supported on Premises to the Cloud
The pros of cloud-computing enterprise-wide applications according to Reilly, Wren & Berry (2011) include:
Easy implementation, which implies that it is easy to oversee the web which helps the business recover a similar application and handle business without backend holster.
It is easier to access information from any location in a proficient and profitable manner
Disaster recovery and back-up is automated
There is no need of physical stockpiling because cloud facilitates everything
The technology is financially efficient
It also allows for efficient recuperation, that it, it allows for fast and exact recoveries of information use
It is also flexible during development because resources can be included or subtracted based on need.
The cons of cloud computing in enterprise-wide applications according to Reilly et al., (2011)include:
The fact the organization is no longer in full charge of information, that it the in-house staff cannot deal with issues by themselves
It offers limited accessible elements due to constraints and restrictions
It also offers limited servers, which can be expensive especially when keeping up data centers and cloud networks
The capacity gadgets often have limited arrangement of data centers
Identity Management and Single Sign-on Systems its importance in Business Intranets and Extranets
Identity management encompasses multiple facets of access and authentication. The building blocks of identity management systems include password reset, password synchronization, single sign-on and access management software (Milberg, 2018). Single Sign-On is used to enforce uniform enterprise authentication as well as authorization policies across the enterprise. It provides the users with the convenience of having to remember a single set of credentials, which improves security because users will easily remember the credentials without having to write them down(Milberg, 2018). The importance of identity management and Single Sign-On include its ability to reduce password fatigue from different usernames and password combinations, it improves user experience through automatic login, it improves security, and it facilitates easier accounts management(Milberg, 2018).
Why it is important for a CIO or IT Executive who oversees Geographically-Distributed Enterprise Networks to be Business Literate
Business literacy is the ability to understand and make decisions that would help the organization achieve success (Calderon, Cunha & De Giorgi, 2013). It is the role of every employee in the workplace to have the working knowledge of organizational goals and objectives, how to measure success and how their work impacts the success of the organization. Business literacy is essential according to Calderon et al., (2013) because:
The business environment is becoming competitive and fast paces; and
Employees at many levels have bottom-line accountability.
Also, an IT personnel should be able to make business decisions that are sufficient for improving the business.
It also ensures that the individual is highly accountable in the company, especially when it comes to financial matters.
References
Calderon, G., Cunha, J. M., & De Giorgi, G. (2013). Business literacy and development: Evidence from a randomized controlled trial in rural mexico (No. w19740). national Bureau of economic research.
Chevron. (2015). Seismic Imaging Technology. chevron.com. Retrieved 30 January 2018, from https://www.chevron.com/stories/seismic-imaging
Kim, H. (2012). Security and vulnerability of SCADA systems over IP-based wireless sensor networks. International Journal of Distributed Sensor Networks, 8(11), 268478.
Milberg, K. (2018). Identity management and single sign-on (SSO). SearchDataCenter. Retrieved 30 January 2018, from http://searchdatacenter.techtarget.com/tip/Identity-management-and-single-sign-on-SSO
Reilly, D., Wren, C., & Berry, T. (2011). Cloud computing: Pros and cons for computer forensic investigations. International Journal Multimedia and Image Processing (IJMIP), 1(1), 26-34.
Request Removal
If you are the original author of this essay and no longer wish to have it published on the thesishelpers.org website, please click below to request its removal:
- Research Proposal Example: Responsive Web Design as the Future of Web Design
- Essay Example on System Request
- Incorporating Diabetes Management Software in Joslin Diabetes Center - Critical Thinking
- Written Analysis: Critical Thinking Questions
- Ethical Issues Facing IT Managers and Security Professionals
- Impact of ERP on Organization Performance - Paper Example
- Google vs. China Case Study Paper Example