Question

In: Computer Science

In Option #1 you have been hired as an IT expert by a small firm to...

In Option #1 you have been hired as an IT expert by a small firm to set up an office for 20 staff members, half of whom will work with desktop computers, and the remaining with laptop computers using wireless networks. The office will use one networked laser printer, accessible from both the desktop and laptop computers. The desktop computers will use a wired network, while the laptop computers will employ a wireless network to print and access the Internet.

Assumptions and Constraints: Write a description of any assumptions and constraints regarding the project. Are there any assumptions made so far or constraints identified in the project? Are there any constraints or anything that would restrict the ability to achieve the IT project objectives successfully?

Project Deliverables: Write a description of what is necessary to acquire and install the computer and network security hardware and software.

Select the appropriate security measures (hardware and software) to be implemented on the business network. Include the following with their features in the project deliverables section: Firewalls (hardware and software options)

Network Intrusion Detection Systems

Antivirus software

Windows built-in security features

Any other network security hardware or software.

Describe the security practices for your business operation, such as the following:

Security policies for your business

Password use policies

Authentication technologies

Encryption technologies

Social engineering awareness

Updating security software and installing security patches.

Data disposal and destruction

Wireless security measures.

Solutions

Expert Solution

Being an IT expert, it is our job to create the secured network within an organization and to maintain the integrity of the network and secure it from the hackers and the intruders.

As per the given description :

Hardware requirements :

1. Access Point (For Wired Connection)

2. Wireless Router (Most Important)

3. Print Server

4. Dial Up Modem (For Backup access)

5. Multiport Ethernet Switch

Software Requirements :

1. Firewall (Optional if it is built-in)

2. Licensed Antivirus and Spyware protection tools

3. NIDS tools (such as Snort)

4. Paid VPN (for secure data transmission)

Proposed Network Setup :

  • Access Points supports upto 20 wired connection, are well suited for efficient usage of bandwidth. Once the wired connection is established,we can connect all the computers to the broadband connected computer and share the high speed internet across all the computers.
  • Wireless Router increases the flexibility of the network, we don't have to rely upon the cables. Plus we can secure out network by placing the firewall at the router, so that we don't have to install the firewall on each laptop.
  • Print server can be used for both wired and wireless connections, It does't matter. It will work seamlessly.
  • Antivirus and malware protection needs to be installed on each host, so as to protect from attackers. Extra security in data transmission can be provided by use of VPN. VPN creates secured end-to-end tunnel between two nodes, and all the traffic passes through it. The traffic is in encrypted format.

?Security Practices :

  • always keep your firewall on since it is a first level of security.
  • Update your Antiviruses regulary
  • Passwords and pins should be well protected, one should not save them anywhere, nor should write them down.
  • While sending data, Public and Private keys should be used, which gurentees the authentication of both the sender and receiver. as well as it assures that the data is not tempered while transmission.
  • It's been observed than many of the times hacker is somehow associated with the organization or the people working in it. thus he can use the social engineering tricks to get the information about the vulnerebilities of the network and can plot his attack.
  • Windows releases its security updates and patches on 2nd or 3rd Tuesday on each month, these updates should be done on each system.
  • Data disposal and data destruction is an major concern, since it is possible to retrieve the deleted data. many tools are available for that purpose. one of the ways of destroying the data is physical damage to the disks or drives. which assures the complete eradication of the data.
  • All the security factors will keep your network secured, but still it is always recommended to take extra precautions on security concerns.  

Related Solutions

You have been hired as an IT expert by a small firm to set up an...
You have been hired as an IT expert by a small firm to set up an office for 20 staff members, half of whom will work with desktop computers and the remaining with laptop computers using wireless networks. The office would use one networked laser printer, accessible from both the desktop and laptop computers. The desktop computers will use a wired network, while the laptop computers will employ a wireless network to print and access the internet. Start making a...
You have been hired as an expert witness by an attorney for a trial involving a...
You have been hired as an expert witness by an attorney for a trial involving a traffic accident. The attorney's client, the plaintiff in this case, was traveling eastbound toward an intersection at 13.2 m/s as measured just before the accident by a roadside speed meter, and as seen by a trustworthy witness. As the plaintiff entered the intersection, his car was struck by a northbound driver, the defendant in this case, driving a car with identical mass to the...
You have been hired as an expert witness by an attorney for a trial involving a...
You have been hired as an expert witness by an attorney for a trial involving a traffic accident. The attorney's client, the plaintiff in this case, was traveling eastbound toward an intersection at 13.8 m/s as measured just before the accident by a roadside speed meter, and as seen by a trustworthy witness. As the plaintiff entered the intersection, his car was struck by a northbound driver, the defendant in this case, driving a car with identical mass to the...
Imagine that you are an expert in Website Analytics, and you have been hired to manage...
Imagine that you are an expert in Website Analytics, and you have been hired to manage a company’s websites. A successful website is one where visitors come and spend time on the site. More time spent on the site is desirable because you can then convince advertisers to pay you to place their ads on your sites. You have been asked to analyze the performance of the following websites: 1. With 99% confidence, calculate an interval that estimates the true...
You have recently been hired by Jones & Co, a small public accounting firm as an...
You have recently been hired by Jones & Co, a small public accounting firm as an internal auditor. One of the firm's partners, Joe Jones, has asked you to deal with an unhappy client. The client, Susan Swan, is the owner of the city's largest jewelry store, DiamondsRUs. Ms Swan wants to remodel her store and is applying for $80,000 loan with Planters National Bank. The bank requires the use of accrual basis accounting for financial statements.  Ms Swan insists that...
You have been hired as an expert witness in a case involving an automobile accident. The...
You have been hired as an expert witness in a case involving an automobile accident. The accident involved car A of mass 1500 kg, which crashed into stationary car B of mass 1100 kg. The driver of car A applied his brakes 15 m before he skidded into car B. After the collision, car A slid 18 m while car B slid 30 m before coming to rest. The coefficient of kinetic friction between the locked wheels and the road...
You have been hired as an expert witness in a federal antitrust case. You are planning...
You have been hired as an expert witness in a federal antitrust case. You are planning your strategy for determining whether or not your client (the defendant in the case) has engaged in predatory pricing. How will you get started? In general what is your strategy? What must you do to successfully defend your client?
You have been hired as an expert witness in a court case involving an automobile accident....
You have been hired as an expert witness in a court case involving an automobile accident. The accident involved car A of mass 1430 kg which crashed into stationary car B of mass 1160 kg .The driver of car A applied his brakes 15 m before he skidded and crashed into car B. After the collision, car A slid 18 m while car B slid 30 m.The coefficient of kinetic friction between the locked wheels and the road was measured...
You have been hired as an expert witness in a court case involving an automobile accident....
You have been hired as an expert witness in a court case involving an automobile accident. The accident involved a car of mass 1870 kg (car A) which approached a stationary car of mass 1020 kg (car B). The driver of car A applied his brakes 10 m before he crashed into car B. After the collision, car A slid 17 m while car B slid 30 m. The coefficient of kinetic friction between the locked wheels and the road...
1. Suppose you have been hired by a research firm trying to understand the market for...
1. Suppose you have been hired by a research firm trying to understand the market for Widgets (a hypothetical product). Your analysis of the data indicates that the Demand curve for Widgets is estimated to be linear and given by equation Qd = 100 – 2P and the Supply curve for Widgets appears to be linear as well and is estimated as Qs = 2P – 20. Graphically draw these two curves, labeling all relevant points (such as intercepts for...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT