Indeed, several problems have been experienced even by the most advanced companies regarding interoperability issues, continuously increasing maintenance cost which was not predicted beforehand, and the ever present security issues. A number of possible solutions have been tested and implemented by these companies. CISCO particularly came up with the following possible options to eliminate interoperability issues in networks: usage of same radios or communication systems, the use of gateway devices, and the usage of IP networks for radio interoperability. (Cisco.com) Usually, the increasing maintenance cost in networks are unforeseen as these “required” maintenance were not predicted during the proposal and development stage of the project. On the other hand, security issues are a perennial problem and have become a major concern among both the organization and their clients. Several possible security measures starting from physical security to the use of firewalls, VPNs and other new technologies have been tried but still 100% security hasn’t been achieved.
In trying to address the above-mentioned issues, Windows particularly have find ways to utilize its control panel as a way to configure specific computer settings and the user accounts. This can specifically put controls on what can be and cannot be accessed on your computers and also a time limit or time configurations on when will the computer be used and when will some files be not accessible. This also enables one to block specific programs especially those who are not regularly used as a protection. (Microsoft.com)
Careful planning is also a key in the avoidance of these intermittent problems in networks. First, perimeter security must be taken into proper consideration. In securing the perimeter, firewalls, network-based antivirus and VPNs are good choices. Firewalls are usually placed on servers, as well as the anti-virus and the VPNs. Second, network security has to be provided. This means that Intrusion Detection systems and Intrusions Prevention systems has to be made well in place. Network vulnerability control and access controls needs to be taken into consideration too. (Ashley, 2003)
References:
Ashley, Mitchell (2003). Layered Network Security. Retrieved from www.stillsecure.com/docs/StillSecure_LayeredSecurity.pdf
Cisco.com (2013). Solutions for Communications Interoperability. Retrieved on 7 December 2013 at http://www.cisco.com/en/US/prod/collateral/ps6712/ps6718/prod_white_paper0900aecd80350fee.html
Microsoft.com (2013). Set up Parental Controls. Retrieved on 7 December 2013 from http://windows.microsoft.com/en-ph/windows-vista/set-up-parental-controls