Mobility in computing

Mobility in computing is becoming a primary driving factor for businesses, especially following the Covid-19 pandemic. When the pandemic hit, many businesses were not ready to send their workers home and did not have the networking infrastructure in place to support secure remote access to business resources. The move to support remote access not only hit businesses but also major internet and cellular providers who were also not set up to handle the massive changes in demand for service. Consider a small to medium sized business (SMB) of your choosing. In a 3-page APA-formatted paper, address the following: • Where should the business focus its networking hardware configuration: physical wiring or wireless? • Which telecommunications and/or networking components should the business acquire and implement to provide secure access to business resources and information? • Which security challenges does the company face in supporting remote access for employees? Support your reasoning and recommendations with outside resources using 4-6 proper citations and references.

Sample Solution

  Where to Focus Networking Hardware Configuration The decision of where to focus networking hardware configuration depends on a number of factors, including the size of the business, the number of employees, the type of work that is done, and the security requirements.

Full Answer Section

  Where to Focus Networking Hardware Configuration The decision of where to focus networking hardware configuration depends on a number of factors, including the size of the business, the number of employees, the type of work that is done, and the security requirements. For small businesses with a few employees, a wireless network may be sufficient. However, for larger businesses with a large number of employees, a wired network may be necessary to provide the bandwidth and reliability that is required. The type of work that is done also plays a role in the decision of where to focus networking hardware configuration. If the business relies on applications that require a lot of bandwidth, such as video conferencing or streaming media, then a wired network may be necessary. Finally, the security requirements of the business also need to be considered. If the business has sensitive data that needs to be protected, then a wired network may be more secure than a wireless network. Telecommunications and Networking Components for Secure Access There are a number of telecommunications and networking components that can be used to provide secure access to business resources and information. These components include:
  • Firewalls: Firewalls are used to protect networks from unauthorized access.
  • VPNs: VPNs (virtual private networks) are used to create secure tunnels between two networks.
  • Intrusion detection systems: Intrusion detection systems (IDSs) are used to monitor networks for signs of attack.
  • Antivirus software: Antivirus software is used to protect computers from malware.
The specific components that are needed will depend on the specific security requirements of the business. However, all businesses should have a firewall and antivirus software in place to protect their networks and computers. Conclusion The decision of where to focus networking hardware configuration and which telecommunications and/or networking components to acquire and implement to provide secure access to business resources and information is an important one. The specific decision will depend on the specific needs of the business. However, all businesses should have a firewall and antivirus software in place to protect their networks and computers. Additional Thoughts In addition to the components mentioned above, there are a number of other things that can be done to improve the security of a network. These include:
  • Educating employees about security: Employees should be educated about security risks and how to protect themselves.
  • Implementing security policies: Security policies should be implemented to define the rules and procedures for accessing and using business resources.
  • Monitoring the network: The network should be monitored for signs of attack.
  • Keeping software up to date: Software should be kept up to date with the latest security patches.
By taking these steps, businesses can improve the security of their networks and protect their sensitive data.

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS