Question: Question - Select a specific wired or wireless device and describe how it functions, list its benefits and uses to businesses. Then, discuss any security

Question-Select a specific wired or wireless device and describe how it functions, list its benefits and uses to businesses. Then, discuss any security concerns and how they can be dealt with.
--> What do you think about the response below to this question?
"The 3D printing business will require the use of a switch to network all the IT devices together. The business has a combination of 3D printers, computers, scanners, laser printers and mobile devices to process the 3D orders. A switch will operate at the OSI layer 2 and connect all devices in the business passing data packets between them. The switch will be able to reach each device by accessing the unique MAC address and can transmit full duplex data over a fiber optic, copper wire or wireless connection. The switch will benefit the business because it provides the capability to move large amounts of data traffic between devices. Switches can provide full duplex traffic and optimize bandwidth utilization. Switches can provide power over ethernet to support VoIP telephones and security cameras.
Cybersecurity is a primary concern with a network switch. The network switch communicates with each device and if compromised, can disrupt every device in the network. Network configuration can prevent unauthorized access to the switch. Creating management profiles, separated from the network and prohibiting remote access, will limit the number of local employees that can access the switch configuration. Assigning switch ports to individual devices and excluding all other MAC addresses can prevent access from unauthorized devices. Configuring VLANs to segment traffic would prevent a hacker from moving between different devices horizontally in the switch that are connected. Implementing the 802.1X protocol used in conjunction with Extensible Authentication Protocol (EAP) will require devices to authenticate to the network and prevent a hacker in the middle of the connection from authenticating."

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!