Nt1310 Unit 3 Case Study

Improved Essays
Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish.

Number of Users – Number of network users, printers, scanners, servers, data centers and security measures.
Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.
Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range.
Network Infrastructure and Layout - Network intended to link up computers locally or in peer to peer and to provide remote access as well. Security and Privacy – Security needs to be established from the very beginning. We should maintain certain protocols and software’s to avoid spam, advertisements and malware entering our network. All operating systems and user applications should be updated and upgraded. Strong passwords should be used for all the accounts, files and encrypted data. Wireless Requirements – Based on the requirement we should use access points, wireless routers over wide range to serve all the users or guests. Budget - Budget is most important thing in networking hardware such as routers, switches, cabling, Wi-Fi hot spots, backup system and firewalls should be selected for the required hardware and software that is purchased and installed. Maintenance – Networks need to be rightly installed, monitored and maintained to operate effectively. Some companies takes care of designing, installing and maintaining the business network. Whereas the maintenance is the most important aspect for any company or client. Services in future – In future if a company has to accommodate branch offices, they might need virtual private network connections. Video conferencing and VIOP’s are few applications that every business needs to add them in future. So we should also consider while designing
…show more content…
Describe 3 ways a hacker can try to intrude a system.

To protect from unwanted intrusion, viruses or hacking, we should consider the following points:

Antivirus protection:
This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.
This antivirus program installed in our system it runs in background and protects your computer always. We have to update them and keep our computer protected and safe. Proper virus protection is the best way to avoid unwanted intrusion.

Firewalls:
Firewall acts as a defense weapon against hacking into your network. There are lot of software’s are available in the market but the best and highly recommended would be Zone Alarm. It sets you for individual Internet access for individual programs and allows automatic programs. It also blocks intrusion if anyone trying to hack into your system.

Virus scanner and removal:
Virus scanner and removal are included with our antivirus software’s because antivirus software will be running in background, your computer is protected from new viruses. We need to update it frequently that helps our computer getting infected with new virus. Meanwhile we have to scan the system on daily/weekly basis to avoid viruses from different sources and also this program will either automatically quarantine or remove any

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    I would install the Star topology which is the most common type of network topology that is used in offices. Star topology is the best since each node is connected by more than one link basically two connection to reach a node. The speed of most star configurations is hundred megabits of data per second with gigabit hub or switches and NIC cards speeds can be at one thousand megabits per second. In a star topology is possible to have all the important data back ups on the hub in a private folder so if the computers fails, the employees can still use the data using the next computer in the network and accessing the backup files on the hub. If the hub adds a device like a printer all the other computers on the network can access the new device by simple accessing the hub.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Technology Framework Design In this section, we combine the user domain needs described in Part 1 of this proposal, the physical framework requirements described in Part 2, and the technology selections described in Part 3 to create the final Digital Edge Manufacturing network infrastructure proposal. Choosing the Cabling Used in the Network We considered infrastructure costs, speed, and reliability for cabling and adaptors. Our network employed hybrid type of network sine we use Ethernet cable, Wi-Fi and fiber optic as our media.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Great Essays

    To understand how I need to proceed with my chosen solution to the problem experienced by the Wayward Pines Public Library, I must first identify the current state of the computer at the library and then decided on the best methodology to accomplish my chosen solution. There is a total of 16 public access computers at the library which is for the specific use by library patrons to access the internet and the online card catalog. These 16 machines are set up in a secluded area of the library not far from the information and circulation desk. The computer area is a collection of small computer tables, and the tables are arranged in groups of four and resemble a square, with two tables next to each other and two table opposite.…

    • 1106 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    In an effort to protect Zoeller Company assets and intellectual property from theft, disclosure, and/or destruction, it is important to exercise caution when browsing the Internet or utilizing e-mail systems from any computer device (includes desktops, laptops, tablets, and phones – company owned or personal) that has access to the corporate network. Please adhere to the following “Best Practices” to reduce the risk of infecting your computer or device with viruses and/or malware.…

    • 73 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Safe4Search: Threat Summary Safe4Search is a nasty Chrome extension by SafeForSearch.net that is labeled as a potentially unwanted program (PUP) and adware. So you should definitely be very careful if it has been installed on your computer without your knowledge. According to its official website, it has popular viral video from around the internet. But, this extension is generally referred as dubious adware. That is promoted through other free downloads as a tool, where this is especially useful to online shoppers because Safe4Search is to surf the Internet to its users.…

    • 292 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Illustrate the differences between digital forensics and network forensics. Digital forensic:  Digital forensic is a branch of forensic science and it talks about the recovery and investigation report found in the digital devices.  Digital forensics is about the "preservation, identification, extraction, documentation and interpretation of computer data"  In order to accomplish these goals, there are well-defined procedures, also derived from law enforcement, for acquiring and analyzing the evidence without damaging it and authenticating the evidence and providing a chain-of-custody that will hold up in court.  Digital forensic have variety of applications to supports a hypothesis before criminal and civil courts.…

    • 520 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    "Should you invest considerable time browsing the web, you'll need safety towards on the internet risks. Because of Norton Security Standard, you're guarded towards several harmful software program. Regardless of whether you're financial on the internet, contacting buddies or even talking by way of Immediate Messaging, your own safety is definitely upon as well as up-to-date. Crucial functions consist of: Quick as well as Light-weight. Super-fast generate check out period.…

    • 196 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    Security Onion intrusion detection system will be selected, installed, and evaluated. A trial deployment of the intrusion detection system will be attempted in a restricted environment, then a simulated attack will be carried out, and the results analysed. Security Onion is an IDS tool that is used to monitor network security, and log management. It contains other tools like sguil, snort, Bro, Suriacata, and OSSEC amongst others.…

    • 1488 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Project Description My company Fiserv Incorparated is using Windows server for network operations but those windows servers are not installed with all patches and updates. Now looking at the current network configuration it can been clealy said that seeing the growth of the organization the network needs to be upgraded before the network collapses. Seeing the current network , the company’s and client’s confidential data seems to be at risk.…

    • 1580 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    A network device should allow for wireless connection for the student lobby. Network devices should be able to be secured and maintained with ease. The network devices should fit the needs of 524 potential hosts. Proposed Network Devices Switches in the closets and server rooms should be used over hubs. One 48 port switch is used for each classroom closet and server room.…

    • 1558 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Qihoo 360 Case Study

    • 3674 Words
    • 15 Pages

    In March 2006, Sequoia Capital, IDG and Zhou Hongyi jointly invested US$20 million in the company. And in August 2006, Zhou Hongyi joined Qihoo as Chairman. At the beginning, Qihoo was positioned as a search technology provider, yet its efforts in the sector were not successful. Zhou later concluded, “At that time, Qihoo was too far ahead of the game in terms of its ideas and strategy. While the concept may have been right, it was the wrong moment.…

    • 3674 Words
    • 15 Pages
    Great Essays
  • Improved Essays

    Potential Threats There are many different threats that could potentially disrupt our network, steal or delete confidential data. Hackers are people that attempt to gain unauthorized access to the network by exploiting…

    • 1481 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In the today’s world of the high technology workplace and business environment there are several factors that need to be considered when designing a computer network. Integrity and vulnerability of data, cost of the network itself, accessibility, flexibility for expansion and ability to support the consumer. Other factors that should be considered when setting up a network include: What is the purpose of the network, what are the bandwidth requirements to efficiently operate the network and service clients, what kind of systems does the client want supported e.g VOIP, printing… and finally a ip routing plan. While these are not all of the considerations that can be examined they are among the most important.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Web architecture and Components In this report I will be talking about web architecture and components needed to allow internet and web functionality. Web architecture The first section is Web Architecture and I will be talking about Internet Service Provider, Web hosting service, Domain structure, Domain Register and World Wide Web. Internet Service Providers (ISP) are companies like SKY, Virgin and BT and they all provide internet access because it connects a variety of technologies to connect users to their network.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Firewall Vs Firewall

    • 1167 Words
    • 5 Pages

    This ability of the antivirus safeguards the computer at all times, especially in email protection and blocking…

    • 1167 Words
    • 5 Pages
    Improved Essays