By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 456 |
Page: 1|
3 min read
Updated: 16 November, 2024
Words: 456|Page: 1|3 min read
Updated: 16 November, 2024
This project will require cabling to set up the network. There are a number of cabling options to be considered. These include the following.
UTP-CAT5e is a copper cable that can transmit at speeds up to 1 Gbps. Multimode Fiber Optic Cable will be used within the offices as they are cheaper than single-mode, which is mostly used for long-distance telecom networks (Tomsho, 2012). With each floor having over two hundred connections, there will be a need for wiring closets that will make handling the myriad of wiring much easier. The closets should also provide a place where troubleshooting operations can begin. Since these are rectangular buildings, the wiring closets will be placed at a corner on the third floor together with the data center. This will ensure that the computing equipment for the whole building is controlled from a single place. This particular area also provides for easier ventilation as it can be supplemented by opening it up. From a security perspective, the third floor also makes sense as it would be difficult for burglars to access it (Tomsho, 2012).
A primary way to prevent attackers will be through physical security measures. With the two buildings going three floors each and the company being the sole occupant of the buildings, this can be done easily. There should first be a CCTV camera system that covers the entire perimeter of the buildings. A central control room should be established at both locations to ensure that they can be monitored at all times. Access control to the buildings should include smart cards provided to all employees. Taking into account the extra security required for the Atlanta location with the two development teams, an added layer will be needed. The initial access to the building will require a smart card and a code that is changed daily. Further into the building will be biometric locks that provide access to the development areas as well as the data center. These biometric measures can include fingerprint and iris scanners. This will ensure that only those with the appropriate authorization can access the secure areas (Peltier, 2016).
Logical security will be very important for both locations. This is especially so for the Atlanta location that will also be housing the database and corporate web servers. The first task will be closing off all unnecessary services. The more services on a server, the more ports will be open, and this provides conduits for attacks on the system. This should also lead to higher performance as more resources are released. With the web servers, the application files and scripts should be kept on a separate drive or even partition than the operating system, system files, and logs. Regular security audits and vulnerability assessments should be conducted to ensure that the systems remain secure. Additionally, implementing intrusion detection systems (IDS) can help in identifying and responding to potential threats in real-time.
In conclusion, the successful implementation of network cabling and security measures is crucial for the project's success. By carefully considering both physical and logical security, the company can ensure the safety and reliability of its network infrastructure. Continuous monitoring and updates to security protocols will be essential in adapting to new threats and maintaining a secure environment.
Tomsho, G. (2012). Guide to Networking Essentials. Cengage Learning.
Peltier, T. R. (2016). Information Security Fundamentals. CRC Press.
Browse our vast selection of original essay samples, each expertly formatted and styled