Paper Details  
 
   

Has Bibliography
12 Pages
3017 Words

 
   
   
    Filter Topics  
 
     
   
 

Designing A Network

he right to be able to access the rights to Word Perfect, Excel, Power Point, etc. TheFaculty will also have rights to the classes with read, copy, write and send. Networks are subject to hacking, or illegal access, so shared files and resources must beprotected. A network intruder could ease drop on packets being sent across network or sendfictitious messages. For important information, data encryption (scrambling data usingmathematical equations) renders captured packets unreadable to an intruder. This server will usean authentication scheme to ensure that a request to read or write files or to use resources is froma legitimate client (faculty or CIS majors) and not from an intruder. The system will have asecurity measure of telling whether or not the user is a CIS major or not by given each CIS majorand faculty a code or password.. The CIS majors will be given a code in which they will have toenter in every time he or she gets to the computer and wants information from a CIS class. Everytime the student enters in the code the computer will keep it in memory so if the same passwordis entered somewhere else the person wil! l not be allowed in. This station restrictions will keep students from going in and messing aroundwith the students information while that CIS student is working. There will be disk restrictions toassure that storage space is evenly allocated. The CIS users will also have to change thepassword every now and then to keep confidentiality of his or her passwords. This will put anaccount to have an expiration date to it so that the user will have to change his or her passwordas the semester goes on to insure the security of their account. Under no circumstance should an administrator put an entire system at risk for theconvenience of a few users. Certain measures and precautions should be implemented to ensurethat the network will operate effectively and efficiently. Another major concern when...

< Prev Page 7 of 12 Next >

    More on Designing A Network...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA