It has been said that it is the age of wireless computing that has conveyed unprecedented flexibility and mobility for computer schemes users in a kind of circumstances. Even in the dwelling setting, a wireless network at dwelling endows each family constituent to get access to the internet and be creative without the constraints of one room set apart for the computer or affray for get access to the line. The report is based on the designiong of a network with three locations and a number of computers in each building or location. The main portion of the network is based on the network security and WAN connectivity. The building is based on the three different locations, Location 01 has two sub-buildings in it and 30 computers are need to be used in eeach of the building. Similarly, location two is based on one building with 35 computer user in it. Lastly, the third location of the building consists of 35 computer users. Each of the building is based on the WAN connection and different softwares and equipments.
A Wide Area Network (WAN), such as the Internet is a type of computer network that covers a broad area and connects multiple other networks in order to make communications and data exchanges between users and machines at various geographically dispersed locations possible. A Wide Area Network (WAN) is a type of computer network that covers a broad area and connects multiple other networks in order to make communications and data exchanges between users and machines at various geographically dispersed locations possible.
Explanation Of Equipment And Software Used
While any organization wants to protect its sensitive data, to detect tampering of data and to limit access to authorized individuals, various industries must also comply with an array of regulatory and industry requirements and guidelines. These include among others, the Sarbannes Oxley Act, the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act, the Criminal Justice Information Services Division (CJIS) Security Policy, and the PCI (Payment Card Industry) Data Security Standard. (Gundavelli et al, 2010)
One common requirement, especially for government organizations, is that sensitive data that is stored or communicated over public networks must be encrypted using certified algorithms. For instance, the Wireless Policy of the CJIS Security Policy1 states "All new wireless upgrades contracted after the close of federal fiscal year 2002 (September 30, 2002), shall support a minimum of 128-bit encryption for all data." The National Institute of Technology and Standards (NIST) FIPS 140-2 is a widely cited requirement.
Another common requirement is for users to authenticate themselves using two-authentication, generally achieved by a ...