Need a unique essay?
Order now

Paper Example on Chevrons Use of Seismic Imaging Technology

2021-08-25
4 pages
899 words
University/College: 
Wesleyan University
Type of paper: 
Case study
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Seismic imaging is a tool that works by bouncing the sound waves off the underground rock structures to reveal crude oil and natural gas-bearing formations (Chevron, 2015). Ultrasensitive devices called geophones are applied by seismologists to record the sound waves as they echo within the earth. Sophisticated 3-D imaging creates a high definition of pictures of the subsurface geology, which is almost similar to X-ray in medicine that covers thousands of square miles and extends 10 miles(Chevron, 2015).

Chevron has been applying the proprietary seismic imaging technology, and the company achieved an exploration rate of 66% in 2014(Chevron, 2015). The technology allows the Chevron scientists to see what is beneath the surface of the earth accurately and clearly than ever before. Proprietary tools have enabled the scientists to find significant amounts of oil and gas in areas that are challenging to access such as thick salt mountains, in the deep-water portions of the U.S. Gulf of Mexico(Chevron, 2015).

Security Vulnerabilities Associated with SCADA and Digital Industrial Control Systems

SCADA systems are widely distributed and networked and are dependent on the open protocol for the internet, and hence they are vulnerable to security threats and concerns (Kim, 2012). One of the threats is unauthorized access to the control software whether human access or the changes that ate made deliberately or unintentionally by the virus infections and other software threads that exist in the control host machines. The second thread is the packet access to the networks segments that host the SCADA and other digital control systems(Kim, 2012).

The following measures can be taken to mitigate the issue; first, there should be strict limitations and authority control for the external connections(Kim, 2012). Second, reinforcing security systems in the demilitarized zones, third; enhancing security using virtue private networks and integrity tools of the servers(Kim, 2012). Fourth, minimizing the access paths to the internal networks and enhance monitoring. Encryption of emails, files and directories need to be enhanced and inspecting any security and vulnerabilities including the development of controls and monitoring methods for handling any contingencies(Kim, 2012).

The pros and cons of Moving Enterprise-wide Applications that have traditionally been supported on Premises to the Cloud

The pros of cloud-computing enterprise-wide applications according to Reilly, Wren & Berry (2011) include:

Easy implementation, which implies that it is easy to oversee the web which helps the business recover a similar application and handle business without backend holster.

It is easier to access information from any location in a proficient and profitable manner

Disaster recovery and back-up is automated

There is no need of physical stockpiling because cloud facilitates everything

The technology is financially efficient

It also allows for efficient recuperation, that it, it allows for fast and exact recoveries of information use

It is also flexible during development because resources can be included or subtracted based on need.

The cons of cloud computing in enterprise-wide applications according to Reilly et al., (2011)include:

The fact the organization is no longer in full charge of information, that it the in-house staff cannot deal with issues by themselves

It offers limited accessible elements due to constraints and restrictions

It also offers limited servers, which can be expensive especially when keeping up data centers and cloud networks

The capacity gadgets often have limited arrangement of data centers

Identity Management and Single Sign-on Systems its importance in Business Intranets and Extranets

Identity management encompasses multiple facets of access and authentication. The building blocks of identity management systems include password reset, password synchronization, single sign-on and access management software (Milberg, 2018). Single Sign-On is used to enforce uniform enterprise authentication as well as authorization policies across the enterprise. It provides the users with the convenience of having to remember a single set of credentials, which improves security because users will easily remember the credentials without having to write them down(Milberg, 2018). The importance of identity management and Single Sign-On include its ability to reduce password fatigue from different usernames and password combinations, it improves user experience through automatic login, it improves security, and it facilitates easier accounts management(Milberg, 2018).

Why it is important for a CIO or IT Executive who oversees Geographically-Distributed Enterprise Networks to be Business Literate

Business literacy is the ability to understand and make decisions that would help the organization achieve success (Calderon, Cunha & De Giorgi, 2013). It is the role of every employee in the workplace to have the working knowledge of organizational goals and objectives, how to measure success and how their work impacts the success of the organization. Business literacy is essential according to Calderon et al., (2013) because:

The business environment is becoming competitive and fast paces; and

Employees at many levels have bottom-line accountability.

Also, an IT personnel should be able to make business decisions that are sufficient for improving the business.

It also ensures that the individual is highly accountable in the company, especially when it comes to financial matters.

References

Calderon, G., Cunha, J. M., & De Giorgi, G. (2013). Business literacy and development: Evidence from a randomized controlled trial in rural mexico (No. w19740). national Bureau of economic research.

Chevron. (2015). Seismic Imaging Technology. chevron.com. Retrieved 30 January 2018, from https://www.chevron.com/stories/seismic-imaging

Kim, H. (2012). Security and vulnerability of SCADA systems over IP-based wireless sensor networks. International Journal of Distributed Sensor Networks, 8(11), 268478.

Milberg, K. (2018). Identity management and single sign-on (SSO). SearchDataCenter. Retrieved 30 January 2018, from http://searchdatacenter.techtarget.com/tip/Identity-management-and-single-sign-on-SSO

Reilly, D., Wren, C., & Berry, T. (2011). Cloud computing: Pros and cons for computer forensic investigations. International Journal Multimedia and Image Processing (IJMIP), 1(1), 26-34.

Have the same topic and dont`t know what to write?
We can write a custom paper on any topic you need.

Request Removal

If you are the original author of this essay and no longer wish to have it published on the thesishelpers.org website, please click below to request its removal: