Number of Users – Number of network users, printers, scanners, servers, data centers and security measures.
Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.
Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range.
Network …show more content…
Describe 3 ways a hacker can try to intrude a system.
To protect from unwanted intrusion, viruses or hacking, we should consider the following points:
Antivirus protection:
This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.
This antivirus program installed in our system it runs in background and protects your computer always. We have to update them and keep our computer protected and safe. Proper virus protection is the best way to avoid unwanted intrusion.
Firewalls:
Firewall acts as a defense weapon against hacking into your network. There are lot of software’s are available in the market but the best and highly recommended would be Zone Alarm. It sets you for individual Internet access for individual programs and allows automatic programs. It also blocks intrusion if anyone trying to hack into your system.
Virus scanner and removal:
Virus scanner and removal are included with our antivirus software’s because antivirus software will be running in background, your computer is protected from new viruses. We need to update it frequently that helps our computer getting infected with new virus. Meanwhile we have to scan the system on daily/weekly basis to avoid viruses from different sources and also this program will either automatically quarantine or remove any