Explain the available security measures in general terms


Your Business Case:

You are an eager new networking consultant, and a school district has hired you for your first consulting job.

Currently, the district has no links between its buildings. School personnel share files by transferring CDs and diskettes between the buildings. The district is putting in new school management software for student and financial records. The software requires that the buildings be networked together.

That district has a grade school, junior high, and high school. The grade school and the junior high are smaller buildings on the same plot of land but they are in separate buildings about 50 yards apart. The high school is newer and larger; it is several miles away on the other side of town.

The school district has thirty teachers, three principals, three administrative assistants, fifteen staff members, and 500 students.

Security is always an issue. The school offers courses in computer science at the high school. The principal is concerned that the students will be tempted to hack into the school management software. The superintendent requests a security plan to help prevent student hackers from accessing the school management software. Also, the superintendent has a vague worry about students accessing pornography on the Internet. The district would like to know if you can configure routers and/or switches to prevent this. Or, is extra equipment or software needed to prevent students from accessing pornography from school computers?

The school superintendent bought some equipment and then realized that no one knew how to make it work. The equipment includes one 2600 series router, two 2500 series routers, and six 1900 series switches.

Milestone 3: The two previous milestones in a Word document, formatted nicely. Plus, a security plan to prevent high school students from accessing the school management software. Explain the available security measures in general terms. Please be sure to include your cited sources for the security plan.

A good security recommendation has the following features:

1. A page break so that it starts on a new page.

2. A heading for this section of your document.

3. Single-spaced paragraphs with a blank line between each paragraph.

4. Separate paragraphs for each main point.

5. Enough details in each paragraph to show that you know security, but not too much to confuse your audience. Impress them with your recommendations, but keep it short.

Please add your security recommendations to the Word document that contains Milestones 1 and 2. Then, submit that document to your instructor.

Compare OSPF and RIPv1. Be sure to list advantages/disadvantages.

Can You please put the answer with the question and please use the worksheet that I sent or put them on different document with labels of the assignment name thanks

Attachment:- Assignment Semester Project Milestone.rar

Solution Preview :

Prepared by a verified Expert
Computer Networking: Explain the available security measures in general terms
Reference No:- TGS01394581

Now Priced at $75 (50% Discount)

Recommended (99%)

Rated (4.3/5)