Number of Users – Number of network users, printers, scanners, servers, data centers and security measures.
Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.
Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range.
Network Infrastructure and Layout - Network intended to link up computers locally or in peer to peer and to provide remote access as well. Security and Privacy – Security needs to be established from the very beginning. We should maintain certain protocols and software’s to avoid spam, advertisements and malware entering our network. All operating systems and user applications should be updated and upgraded. Strong passwords should be used for all the accounts, files and encrypted data. Wireless Requirements – Based on the requirement we should use access points, wireless routers over wide range to serve all the users or guests. Budget - Budget is most important thing in networking hardware such as routers, switches, cabling, Wi-Fi hot spots, backup system and firewalls should be selected for the required hardware and software that is purchased and installed. Maintenance – Networks need to be rightly installed, monitored and maintained to operate effectively. Some companies takes care of designing, installing and maintaining the business network. Whereas the maintenance is the most important aspect for any company or client. Services in future – In future if a company has to accommodate branch offices, they might need virtual private network connections. Video conferencing and VIOP’s are few applications that every business needs to add them in future. So we should also consider while designing …show more content…
Describe 3 ways a hacker can try to intrude a system.
To protect from unwanted intrusion, viruses or hacking, we should consider the following points:
Antivirus protection:
This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.
This antivirus program installed in our system it runs in background and protects your computer always. We have to update them and keep our computer protected and safe. Proper virus protection is the best way to avoid unwanted intrusion.
Firewalls:
Firewall acts as a defense weapon against hacking into your network. There are lot of software’s are available in the market but the best and highly recommended would be Zone Alarm. It sets you for individual Internet access for individual programs and allows automatic programs. It also blocks intrusion if anyone trying to hack into your system.
Virus scanner and removal:
Virus scanner and removal are included with our antivirus software’s because antivirus software will be running in background, your computer is protected from new viruses. We need to update it frequently that helps our computer getting infected with new virus. Meanwhile we have to scan the system on daily/weekly basis to avoid viruses from different sources and also this program will either automatically quarantine or remove any