
You are working as a network infrastructure intern for TP-LinkSys Network Solutions and you were invited, together with their experts in one of their client’s work place. Westgate Financing Inc. is seeking assistance in improving their network infrastructure focusing primarily on security. Being a financial company, they’ve been subjected to several security breaches over the years and the number is constantly growing.
Upon further inspection of the existing network infrastructure, you found out that there are currently 60 workstations, 3 24-port switches and 1 wireless router, with the SSID Westgate, and uses WEP for security. You were also informed by the IT department head that the company primarily relies on software firewalls installed on each PC. However, the migration to mobile and cloud computing posed further security concerns as the former won’t usually come with pre-installed firewall.
Required:
- Discuss the common threats and their impact to Westgate Financing’s day-to-day operation.
- Propose various technologies and methods such as but not limited to VPN, hardware firewall, and stronger authentication that would address Westgate's network security issues.
- Prepare a routine maintenance to ensure constant protection of Westgate's network infrastructure.

Trending nowThis is a popular solution!
Step by stepSolved in 3 steps

- You've decided to use WPA2 as your wireless security protocol. Give reasons as to why this choice is better than the others in this group. Security and risk issues may be addressed by what you're proposing. Then why don't you elaborate further?arrow_forwardWhat security characteristics do you anticipate from a secure email system, as well as the machines that execute it? Which protocol layer is best for a security service like this? Make a distinction in your response between services that seek to provide anonymity and those that don't?arrow_forwardLet's say you've decided that WPA2 is the best wireless security protocol. Why is this option superior to the others in this group? Is your solution capable of addressing security and risk issues? Why don't you elaborate on it more?arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education





