Question: Question - Select a specific wired or wireless device and describe how it functions, list its benefits and uses to businesses. Then, discuss any security
QuestionSelect a specific wired or wireless device and describe how it functions, list its benefits and uses to businesses. Then, discuss any security concerns and how they can be dealt with.
What do you think about the response below to this question?
"The D printing business will require the use of a switch to network all the IT devices together. The business has a combination of D printers, computers, scanners, laser printers and mobile devices to process the D orders. A switch will operate at the OSI layer and connect all devices in the business passing data packets between them. The switch will be able to reach each device by accessing the unique MAC address and can transmit full duplex data over a fiber optic, copper wire or wireless connection. The switch will benefit the business because it provides the capability to move large amounts of data traffic between devices. Switches can provide full duplex traffic and optimize bandwidth utilization. Switches can provide power over ethernet to support VoIP telephones and security cameras.
Cybersecurity is a primary concern with a network switch. The network switch communicates with each device and if compromised, can disrupt every device in the network. Network configuration can prevent unauthorized access to the switch. Creating management profiles, separated from the network and prohibiting remote access, will limit the number of local employees that can access the switch configuration. Assigning switch ports to individual devices and excluding all other MAC addresses can prevent access from unauthorized devices. Configuring VLANs to segment traffic would prevent a hacker from moving between different devices horizontally in the switch that are connected. Implementing the X protocol used in conjunction with Extensible Authentication Protocol EAP will require devices to authenticate to the network and prevent a hacker in the middle of the connection from authenticating."
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
