In: Computer Science
In Option #1 you have been hired as an IT expert by a small firm to set up an office for 20 staff members, half of whom will work with desktop computers, and the remaining with laptop computers using wireless networks. The office will use one networked laser printer, accessible from both the desktop and laptop computers. The desktop computers will use a wired network, while the laptop computers will employ a wireless network to print and access the Internet.
Assumptions and Constraints: Write a description of any assumptions and constraints regarding the project. Are there any assumptions made so far or constraints identified in the project? Are there any constraints or anything that would restrict the ability to achieve the IT project objectives successfully?
Project Deliverables: Write a description of what is necessary to acquire and install the computer and network security hardware and software.
Select the appropriate security measures (hardware and software) to be implemented on the business network. Include the following with their features in the project deliverables section: Firewalls (hardware and software options)
Network Intrusion Detection Systems
Antivirus software
Windows built-in security features
Any other network security hardware or software.
Describe the security practices for your business operation, such as the following:
Security policies for your business
Password use policies
Authentication technologies
Encryption technologies
Social engineering awareness
Updating security software and installing security patches.
Data disposal and destruction
Wireless security measures.
Being an IT expert, it is our job to create the secured network within an organization and to maintain the integrity of the network and secure it from the hackers and the intruders.
As per the given description :
Hardware requirements :
1. Access Point (For Wired Connection)
2. Wireless Router (Most Important)
3. Print Server
4. Dial Up Modem (For Backup access)
5. Multiport Ethernet Switch
Software Requirements :
1. Firewall (Optional if it is built-in)
2. Licensed Antivirus and Spyware protection tools
3. NIDS tools (such as Snort)
4. Paid VPN (for secure data transmission)
Proposed Network Setup :
?Security Practices :