Question: In this assignment we are to developing a unified networking framework for a Pennsylvania school district. Though the district, as well as the technologies discussed,
In this assignment we are to developing a unified networking framework for a Pennsylvania school district. Though the district, as well as the technologies discussed, are real, this is, of course, only a class project meant to demonstrate how important an understanding of networking technologies can be, even in a domain as common as our Elementary-High School educational system. This project is divided into different tasks and one section includes security. What should I say for the following on the basis that this is involving a school districts network?
Security Review
For the Part 1 overview, the discussion on security measures is a more general review of current security technologies and policies.
Schools are more exposed to malware and spam because children tend to be much less guarded in their online usage. That requires a more proactive approach to security than may be needed in other organizations and facilities.
Your general discussion should include some aspect of these topics:
Antivirus protection you need to consider things like central server updates and end point protection
Automated patch management not only end-user but servers and security devices such as firewalls and intrusion detection devices need to be keep up-to date.
Wireless network security ease of use may be important but the risks will outweigh the advantages. Include a discussion of how access control and network-monitoring tools must be used to make sure that the network is not being exploited. This includes a review of the various networking protocols that can provide inherent encryption and password-protection point.
Content filtering as we are dealing with children, it is important to include some mention of managing content which can include the use of proxy servers.
Hardware review Include a review of security hardware that could be implemented including: o Firewalls o Proxy servers o Virtual Private Networks o Intrusion Detection Sensors and Systems
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
