Top-Rated Free Essay
Preview

Unit 7 Assignment 1

Satisfactory Essays
351 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 7 Assignment 1
Implementing a WLAN in a school would require several user groups. These could include:
Students
Teachers
Support Staff (i.e. Councilors)
Administration
Network Administration

In a school environment, there are several risks that need to be taken into account. Being wireless in nature, it opens up more avenues for an unauthorized person or hacker to access the network as they do not need to be physically connected to the network, just be in the vicinity. Users would have to be careful to safeguard their passwords, as someone else accessing in their name could cause problems. For example, if a student looks over his teacher’s shoulder as they log in, the student could then log in themselves as the teacher and change their grades.

The WLAN should be encrypted to help prevent unauthorized access to the network. Strong password policies should be in place just as it should for a normal LAN. Users should be trained to not access sensitive data across the WLAN as it is more easily intercepted than a hard line connection.

A sample classification plan could have the following categories:
Public
Sensitive
Confidential
Restricted
Depending on the individuals position and job requirements, they should only be able to access the information that they need to do their job and nothing more.

As far as applications students would need, I would recommend using a student portal to host any education related applications they students may need. Anything outside that should not be used on the school’s WLAN to help reduce network traffic and additional avenues of a breach. Teachers could have a portal of their own with the same restrictions, to use for their gradebooks and course materials. Administrators would need to be able to access all student information, and email would probably be a good idea to implement for all but the students.

I believe PDAs should be limited to Administrators of the school and IT individuals on call. This would help reduce the risk of unauthorized access or disclosure of restricted information, while keeping those who need to up to date on what is happening.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 7 Assignment 1

    • 609 Words
    • 3 Pages

    Switched circuit- A circuit created by the phone company in reaction to signaling (the user tapping telephone keys or a modem sending in the same digits), with the telco tearing down the circuit when the user is finished.…

    • 609 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 431 Words
    • 2 Pages

    7. Convert the While loop in the following code to a Do-While loop: int x;…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 128 Words
    • 1 Page

    Do you have a DNS Server set up with your company? If so, what kind?…

    • 128 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 383 Words
    • 2 Pages

    Video Connectors – Video Graphics Adapter (VGA), Digital Video Interface (DVI), and S-Video (TV connection)…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 261 Words
    • 2 Pages

    2. A pretest loop is a loop tests the conditions before performing the iteration. A posttest loop performs the iteration then test the condition.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Activity 1

    • 667 Words
    • 3 Pages

    Although the freedom to roam the facility and always be connected to the LAN can be a great advantage for network users, the amount of support needed to manage the system and users is much higher than that required by a wired network. Due to the broadcasting nature of a wireless system, security is an important concern and provisions should be made for guest / unauthorized users to use the system in a limited and controlled way. Additional support by the IT Team is often required to configure a user to use the wireless network, to ensure the wide variety of hardware will work with the College’s wireless system, and to provide Help Desk support for wireless…

    • 667 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Netw410 Week 2 Lab

    • 393 Words
    • 2 Pages

    4. Provide open wireless access for the students and the local population in the areas outside of each building.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 3 Assignment 1

    • 375 Words
    • 2 Pages

    1. Research the following organizations and explain their involvement with the Internet public IP addresses:…

    • 375 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Bristol School Case Study

    • 1068 Words
    • 5 Pages

    As stated in Tinker v. Des Moines, “...[i]t could not be justified by a showing that the students’ activities would materially and substantially disrupt the work and discipline of the school”(Tinker v. Des Moines School District). This case justifies how important it is that the court repeatedly emphasizes the need to guarantee the absolute authority of the States and of the school officials, persistent with fundamental constitutional safeguards, to determine and control the conduct in the schools. Additionally, as expressed in the Bristol Student Handbook, “Access to the School District’s Technology is provided as a privilege and as an educational tool. In order to continue enjoying access to the Technology, each student must take responsibility for appropriate and lawful use of this privilege. Students are responsible for their behavior with the Technology just as they are in a classroom, school hallway or other School District property” (Upper Arlington Schools Students’ Handbook…

    • 1068 Words
    • 5 Pages
    Better Essays
  • Good Essays

    IS3120 Week 5 Lab

    • 914 Words
    • 3 Pages

    Prior to implementation we’ll need to see what kind of network the campus would need. The requirements of the campus call for an infrastructure network, as ad-hoc is merely computer to computer, but the requirements call for wireless access to the campuses internal network and provide access to the internet. Next to that we’ll need to identify what speed/capabilities the network will need to provide. Seeing how the campus has thousands of students as well as the admin and faculty, there is probably a need for strong wireless capabilities and so I recommend a 802.11g. You also need to identify security issues and ensure they’re implemented before putting the network online; this is to ensure there is no weakness in the network from the start.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It-242 Wlan Check Point

    • 265 Words
    • 2 Pages

    There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 260 Words
    • 1 Page

    Living with Hodgkin’s disease is not easy. Being diagnosed with Hodgkin's disease changes everything in your life, and the lives of those around you. People living with cancer may worry about what the future holds. They may worry about holding their jobs, caring for their families, personal relationships, or continuing with daily activities. Concerns about tests, treatments, hospital stays, and medical bills are also common. Doctors, nurses, and other members of the health care team can answer questions about treatment, working, or other activities. Meeting with a social worker, counselor, psychologist, or member of the clergy can be helpful to people who want to talk about their feelings or discuss their concerns. Often, a social worker can suggest groups that can help with rehabilitation, emotional support, financial aid, transportation, or home care.…

    • 260 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    IS3350

    • 588 Words
    • 3 Pages

    The potential user groups and users of WLAN in a school environment would be District office and administration can streamline procedures. Classroom applications can track each student’s progress to facilitate reporting, provide up-to-date student information on hand held computers, respond to emergency situations, and handle disciplinary incidents, security enforcement, and parent communications. IT department can optimize performance and cost savings. WLANs can accommodate rapid expansion, which is particularly important for schools using mobile classrooms, which can make wiring very challenging. WLANs are also more economical than traditional wired connections, especially where wired connections would be prohibitively difficult like, schools that have no space for computer labs or that anticipate future renovations that would require rewiring in classrooms. Teachers can be more proactive and accessible. WLAN access increase interaction between teacher and students; complement classroom instructions with online applications including digital whiteboards and online testing; real time access to administrative resources and design curricula that better meets individual learning styles Students can learn more efficiently. WLAN provides the opportunity for more free flowing collaboration among peers, with teachers and digital resources and the Internet. While higher education deployments focus broadly on delivering high-performance, pervasive wireless coverage across large campus environments, K-12 schools with tighter budgets and limited IT resources tend to deploy wireless to support specific mobility applications, such as mobile carts, wireless IP telephony, video surveillance, mobile classrooms, and so on. In order to support these and other emerging wireless applications for example, educational videos, location tracking, and cafeteria point-of-sales systems, schools need a wireless infrastructure that can deliver reliable performance in dynamic, high-density…

    • 588 Words
    • 3 Pages
    Good Essays

Related Topics