Wayward Pines Public Library: A Case Study

Great Essays
To understand how I need to proceed with my chosen solution to the problem experienced by the Wayward Pines Public Library, I must first identify the current state of the computer at the library and then decided on the best methodology to accomplish my chosen solution.

There is a total of 16 public access computers at the library which is for the specific use by library patrons to access the internet and the online card catalog. These 16 machines are set up in a secluded area of the library not far from the information and circulation desk. The computer area is a collection of small computer tables, and the tables are arranged in groups of four and resemble a square, with two tables next to each other and two table opposite. Moreover, the four groups of tables are again arranged in a square pattern with two groups of tables adjacent and two opposite. The tables contain one computer each with one mouse, one keyboard, and one monitor. Additionally, the computers are connected to the library’s electrical power thru surge protectors with two surge protectors per group of tables. Furthermore, the computers are patched to the library's network switch which is connected to the ISP’s cable modem/router. The ISP’s cable
…show more content…
Not only has one of the computers became a zombie of a botnet army and attacked a computer on another network not controlled by the library’s ISP, but there is no cyber security software installed on any of these computers to prevent infestation by viruses or malware. Therefore, my solution to install cyber security software in the form of anti-virus and anti-malware protection and a stateful firewall appliance to be the best and only solution to ensure that the computers meet the requirements of the library’s ISP and are allowed to remain connected to the

Related Documents

  • Improved Essays

    Here are some basic requirement to have a company network that can be fast and reliable I would like to have some time to talk to your IT manager to know where we are, and know the needs. Your IT manager might have most of this suggestion deployed already, in that case this can be used as a check list I will try to help as much as possible and I will be open to do any configuration of any device when you need me to ( I can do that from here) 1. The size of the company needs to be taken in consideration as well as the potential grown ( for space requirements)…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    The labs are named Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; every PC lab will have the closet. Every lab will have 32 PCs: 30 students PC, 1 educator PC, and 1 server in the server room for instructional utilization. Also, there will be a Student Computer Lab that will give PC access to students to get their work done. There will be 50 PCs in this lab and a server in the storage room. To permit student’s access to library assets, the library will have 10 PCs for students and 5 PCs for library staff.…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 3 Lab

    • 1162 Words
    • 5 Pages

    1. What was the average score you calculated for the lab? What does this number mean in terms of ergonomically correct workplace? a. The average score we calculated for the lab was approximately 6.9/10, and what this number means in terms of an ergonomically correct workplace is that the room is not very ergonomically correct.…

    • 1162 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Remote access is the one which helps us to get access to a computer or network form a remote distance. In many organizations branch offices, telecommuters, and people who are traveling may need access to the corporation’s network. Home clients gain admittance to the internet through remote access to an Internet Service provider(ISP). Dial-up association through work area, scratch pad, or handled PC modem over general phone lines is a typical technique for remote access. Remote access is additionally conceivable utilizing a committed line between a PC or a remote neighborhood and the central or main corporate local area network.…

    • 354 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    3- Specify alternative courses of action. 1- the anti-virus and fire-wall programs use the anti-virus and fire-wall programs for protection from hacking and the need of updating it constantly Because of that viruses are developed continuously and periodically, and don't think that anti-virus alone enough to protect you from penetration. 2- anti-loggers programs One of the most important programs that you need to have are the anti-loggers programs and its mission is to protect Your personal data such as passwords, data of bank cards, even your device can't figure out what you are writing.…

    • 253 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Gerlach Case Study

    • 1488 Words
    • 6 Pages

    Choose the possibility you see as most likely. You chose OPTION 1 These changes might result in a lowered school population, and therefore reduced sales and profits.…

    • 1488 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    “You Decide” Charter School Scenario Situation Analysis This proposal is for an evaluation of the current network at Leonard Cooper Charter School, as well as a list of recommendations to address concerns raised by system technicians and end-users. Leonard Cooper Charter has roughly 1,000 students and faculty, all needing a smooth connection to the school LAN. A new addition was added to the building a few years ago, and has resulted in numerous IT problems for the school. Overall, stakeholders have indicated general dissatisfaction regarding network speed and reliability.…

    • 520 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1310 Final Exam

    • 1640 Words
    • 7 Pages

    Introduction This week long course is intended to educate learners on the topic of computer technology, including computer hardware, computer software, and its effect on everyday life. Included in this course document are three evaluation strategies: a diagnostic evaluation, a formative evaluation, and a summative evaluation. The diagnostic evaluation that is included is a pre-assessment. The pre-assessment will be completed preceding the beginning of the course to determine the students’ prior knowledge of the subjects that will be taught throughout this course.…

    • 1640 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Central Processing Unit (CPU) which is made up of three major components, the arithmetic/logic unit (ALU), the control unit (CU) and memory by combining the ALU and CU together you get the CPU), (Englander, I. 2014). The arithmetic/logic unit holds data temporary and where calculation are processed the control units controls and deciphers the execution command and follow the instruction that goes with the sequence of actions. The control unit determines the particular instruction to be executed by reading the program counter (PC) (Englander, I. 2014). Primary memory holds program instructions and data and interacts directly with the CPU during program execution. The control unit also reads and interprets instructions from memory and transforms them into a series of signals to activate other parts of the computer.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Due to the lack of reliable technology within my school, troubleshoot issues and hardware problems are common occurrences when implementing technology. During the last school year, I have experienced issues with iRespond remotes and iPads that refuse to turn on Due to the limited amount of class time, I now believe it is important to check these issues prior to using them. This year, I was required to administer the Student Learning Objective or SLO assessment to my students. All teachers were required to implement this test using irespond.…

    • 719 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Saleema Aziz Dr. Shazia Ali English 1302-46405 August 4th, 2014 Computer Skills Should be a Fundamental Part of Education Curricula During the old days, computers were not used in many places so, computer skills were not necessary. In the recent times, computers have become widely and practically used everywhere including offices, business firms, hospitals, hotels, in the homes among other places. Nearly everything requires the use of a computer.…

    • 2113 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Introduction In the modern world, the word “smart” is used everywhere from homes, to the schools, hospitals, market and businesses-to mention but just a few. Generally, people have come to love the word smart and want to be smart or even have smart items with them. Parents would want their children to be smart; people want to buy smart products like the Smartphone. The reality is that, you cannot avoid smart products in the modern world.…

    • 977 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1210 Unit 3 Assignment

    • 1204 Words
    • 5 Pages

    According to the task given the office needs new computers along with a printer. The computers must be connected through a shared line so that data can be shared within the computers. The printer that is going to be used would also need to be connected with the computers so that every computers can share the printer which means the computers do not need individual printers to print something from them. So all in all we need LAN (Local Area Network) in this office.…

    • 1204 Words
    • 5 Pages
    Improved Essays