Explain the available security measures in general terms

Assignment Help Computer Networking
Reference no: EM131048719

Your Business Case:

You are an eager new networking consultant, and a school district has hired you for your first consulting job.

Currently, the district has no links between its buildings. School personnel share files by transferring CDs and diskettes between the buildings. The district is putting in new school management software for student and financial records. The software requires that the buildings be networked together.

That district has a grade school, junior high, and high school. The grade school and the junior high are smaller buildings on the same plot of land but they are in separate buildings about 50 yards apart. The high school is newer and larger; it is several miles away on the other side of town.

The school district has thirty teachers, three principals, three administrative assistants, fifteen staff members, and 500 students.

Security is always an issue. The school offers courses in computer science at the high school. The principal is concerned that the students will be tempted to hack into the school management software. The superintendent requests a security plan to help prevent student hackers from accessing the school management software. Also, the superintendent has a vague worry about students accessing pornography on the Internet. The district would like to know if you can configure routers and/or switches to prevent this. Or, is extra equipment or software needed to prevent students from accessing pornography from school computers?

The school superintendent bought some equipment and then realized that no one knew how to make it work. The equipment includes one 2600 series router, two 2500 series routers, and six 1900 series switches.

Milestone 3: The two previous milestones in a Word document, formatted nicely. Plus, a security plan to prevent high school students from accessing the school management software. Explain the available security measures in general terms. Please be sure to include your cited sources for the security plan.

A good security recommendation has the following features:

1. A page break so that it starts on a new page.

2. A heading for this section of your document.

3. Single-spaced paragraphs with a blank line between each paragraph.

4. Separate paragraphs for each main point.

5. Enough details in each paragraph to show that you know security, but not too much to confuse your audience. Impress them with your recommendations, but keep it short.

Please add your security recommendations to the Word document that contains Milestones 1 and 2. Then, submit that document to your instructor.

Compare OSPF and RIPv1. Be sure to list advantages/disadvantages.

Can You please put the answer with the question and please use the worksheet that I sent or put them on different document with labels of the assignment name thanks

Attachment:- Assignment Semester Project Milestone.rar

Reference no: EM131048719

Questions Cloud

Wrongly reject any of the three null hypotheses : Dogs, friends, and stress. In Exercise 29.3, the ANOVA F test had a very small P-value, giving good reason to conclude that mean heart rates under stress do differ depending on whether a pet, a friend, or no one is present. Do the means for the tw..
Disadvantages of businesses offshoring to another country : 1. What are the advantages and disadvantages of businesses offshoring to another country? 2. What is extrinsic rewards and what are their advantages and disadvantages? Provide example
Improvement in organizational performance : A manager applied leadership theory to the way that he directed the organization, and found some improvement in organizational performance. The manager noticed how some individuals seemed to flourish and perform better than others, and began to ev..
What is the share price at the end of supernormal growth : Kale Co. is growing quickly. Dividends are expected to grow at a rate of 25 percent for the next three years, with the growth rate falling of to a constant 5 percent thereafter. If the required return is 15 percent and the company just paid a $2.88 d..
Explain the available security measures in general terms : Explain the available security measures in general terms. Please be sure to include your cited sources for the security plan.
Describe likely average risk capital budgeting project : Briefly describe a likely "average" risk capital budgeting project for the company. Consider its possible life, cash flow pattern and investment size relative to the company
Write what you bought everyday for 2 weeks : Write what you bought everyday for 2 weeks ( am a girl so write girls stuff salon.....). Do a pie chart. Write the inflation rate.
In the percentage of sales model : In the percentage of sales model, which one of these is least apt to increase in a linear fashion as sales increase? Select one below
Aluminium tank as well as the steel and fibreglass tank : The engineer of problem 4 now wants to consider an aluminium tank as well as the steel and fibreglass tank. The steel tank costs $225,000 and is expected to last 15 years. The aluminium tank is expected to last 25 years.

Reviews

Write a Review

Computer Networking Questions & Answers

  Identify why the competition between the 4g lte carriers

Identify why the competition between the 4G LTE carriers has been so fierce and describe the benefits of this competition to the subscribers.

  Identify the critical path and other paths through network

Construct the project activity network using AON methodology and label each node. Identify the critical path and other paths through the network

  Fiction corporation a large national retail chain of 10000

fiction corporation a large national retail chain of 10000 employees and 500 retail outlets is migrating its one

  How are cloud technologies impacting servers

How are cloud technologies impacting servers and network electronics used in local area networks of companies subscribing to cloud / SAS services

  Consider a tcp connection between host a and host b

Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number x and the destination port number y. What are the source and destination numbers for the segments traveling ..

  Process routers and switches

Do you think that one day, routers and switches will not be needed? Why?

  One-way to solidify the concepts of clientserver computing

one-way to solidify the concepts of clientserver computing and interprocess communication is to develop the

  Design the network for this new building

Two server rooms have been allocated, one on the first floor and one on the second floor. Your task is to design the network for this new building with the following criteria: Student-accessed computers should be on separate network from the staff-ac..

  Why are protocols important for networking

Why are protocols important for networking. How does SSH differ from Telnet? How does HTTPS differ from HTTP

  Report on big o as a measure of computational complexity

Develop a report on big O as a measure of computational complexity. What environments use big O as a measure of complexity?

  Describe the tcp three-way handshake

Describe the TCP three-way handshake - What is the handshake used for? Which two of the six TCP flags were set in the packets used to cause the TCP session to be closed or terminated?

  Benefits and drawbacks of mentoring relationship

Using the Internet, research and read about mentoring. Based on your reading, post your responses to the following topics of discussion

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd