10
David Morales

Chapter 9 Presentation

Embed Size (px)

Citation preview

Page 1: Chapter 9 Presentation

David Morales

Page 2: Chapter 9 Presentation

Free software with Google adds in side bar

Google ads don't dominate the page

Well Reviewed Economical option

It also allows further functionality beyond Network Management (Software Auditing, Inventory…)

Page 3: Chapter 9 Presentation

Pros▪ Reduced Cost

▪ Increased Scalability

▪ Simple installation compared to traditional LAN

Cons▪ Significant increase in Security Risk

▪ Reduced Network Speed

Page 4: Chapter 9 Presentation

A WLAN could be recommended for limited use if:

Risk Mitigations

▪ No financial or otherwise confidential or protected data will be process on a computer connected to a WLAN

▪ Password is on a need to know basis

▪ SSID is not broadcast

Page 5: Chapter 9 Presentation

Access Point approx. $100

Wireless Repeaters approx. $70 each

1-2 would be required depending on needs

Wireless adapters approx. $30 each

It is recommended these not be purchased except for the rare exception

▪ We already have a LAN everyone uses and this would be a pointless use of money

Page 6: Chapter 9 Presentation

Maintenance will be included with regular IT tasks

Maintenance and management of a WLAN is relatively low cost

The WLAN generally only needs much attention when there is a problem

Low TCO

Page 7: Chapter 9 Presentation

Everyone is responsible for

security!!!!!!

Page 8: Chapter 9 Presentation

Users’ responsibilities

Make strong passwords that are kept private

DO NOT write down your password and store it anywhere near your work station

Keep confidential and privileged data confidential and privileged

Page 9: Chapter 9 Presentation

IT Dept. responsibilities

Install and maintain firewalls, antivirus, and other security software

Educate users about computer security

Keep programs and operating systems updated

Page 10: Chapter 9 Presentation

Management’s responsibilities

Make an effective security policy

Ensure compliance with security policy

Establish corrective procedures for employees who violate security policy

Ensure employee’s understand security policy and consequences for violation there of