Professional Documents
Culture Documents
The primary concern of making a private network available to employees who are
outside the office is security. Company makes it network more vulnerable to hackers
when they start making connection over the internet. Employee of the company can
lose the ability to monitor and control what and how data is being shared across
devices. This is because they are unprotected. Data leakage can be happen when
employees utilize the cloud on their own terms, sharing files over unsecured device
and if there is no cloud encryption.
2. What technologies did Del Monte employ to address this primary concern?
Del Monte employ to address this primary concern by using technologies VPM
authentication and Ciscos Secure Access Control Server. Del Monte also use
technologies of Cisco ASA 5500 Series Adaptive Security Appliance, a network
device that provides a firewall and intrusion prevention system (IPS) to keep hackers
out, and virtual private networking (VPN) to encrypt and safeguard data flowing over
the network. Telecommuters connect their PCs and telephones to the device to enjoy
the same quality of network service as those in corporate headquarters.
3. What benefits do Del Monte and its employees enjoy by providing extranet access to
the Del Monte network?
Benefits Del Monte and its employees get by providing extranet access to the Del
Monte network are employees at home offices and remote locations can communicate
with employees anywhere to collaborate more effectively over one integrated network
for voice, video, and data. Del Monte The system saves money by allowing the
company to remove expensive T1 lines from remote offices and replace them with
high-speed Internet connections. The system is also easy to manage and expand. Del
Monte could easily add new security features, as they are needed.
4. If you could choose whether to work at home or in a corporate office, which would
you choose and why?
Corporate office. Because the data and information of the company are very
confidential. Working in corporate office can minimize the risk of leakage data or
stolen data from occur even there is a lot of technology that help the company
overcome the security issue, this technology still have a bug and need to do
maintenance. Beside, working onsite are easier to manage every worker or managing
file data and information.
B. Identify the locations UTHM where wireless LAN connections are available. Visit
at least THREE (3) locations and write a brief paragraph discussing your
experience at each location trying to connect to the Internet.
i. Location : Masjid Sultan Ibrahim (MSI) UTHM
Masjid Sultan Ibrahim with an area of 45 square feet provide wireless LAN
to all students, staffs and visitors. PTM provide seven access point at every
part of Mosque, three access point at level 1 and 4 at the ground level. As
long as visitor are within Wi-Fi ranged, they can connect with this WLAN.
I try connecting WLAN connection from level 1 and i got full signal. With
the speed of 11 Mbps, I can access the internet from mobile phone from
any location within the ranged. The Access Point connects to the wired
network from a fixed location using standard cabling. The access point
receives and transmits data between the wireless LAN and the wired
network infrastructure. Beside, a single access point can support a small
group of users and can function within a range of less than one hundred to
several hundred feet. End users access the wireless LAN through the
wireless-LAN adapters installed in their computers or mobile phone. The
WLAN is much easier to install, no wired needed and anyone can access
WLAN within range. Is there any risk of data leakage or stolen in this
mosque of Sultan Ibrahim network? Probably not, because PTM provide
password and ID for every staff and student in UTHM only. Outside user
cannot access to internet server without ID and password.
ii. Location: Faculty of Computer Science & and Information Technology
(FSKTM), UTHM
C. Choose server or mobile operating systems to evaluate. You might research and
compare the capabilities and costs of Linux versus the most recent version of the
Windows operating system or UNIX. Alternatively, you could compare the
capabilities of the Android mobile operating system with the most recent version
of the iPhone operating system (iOS).