preview

Network Physical Threats Essay examples

Decent Essays

Physical Threats Threats can come from many sources and can affect different parts of a system and network. There are physical threats that can compromise a system and deny the use of network resources. Damage can occur on any piece of hardware connected to the system such as servers, routers, switches, and workstations/ PC’s. Access should be controlled to the location where vital hardware is stored. Ensure all doors remain locked and only authorized individuals enter restricted areas. There can also be damage caused by electrical threats. A voltage spike or total power loss can shut down critical systems and cause negative impacts throughout the company. The APC Smart-UPS RT 5000VA 230V will continue to provide emergency power for …show more content…

A network administrator can also allow only specified MAC addresses onto the network. Internal threats can happen to any organization especially those with many employees. An internal threat can come from a current employee or vendor and usually they are disgruntled in some way. Preventative measures are similar to those for internet threats including spyware, anti-virus software, firewalls, and intrusion detection/prevention systems. External threats can occur virtually or in-house, depending on the skill level of the attacker and their ultimate goal. The attacks occur outside the company or organization.
LAN, WAN, Wireless A local area network (LAN) is a small grouping of computers and devices that are connected through various topologies in a small geographical area. A LAN is usually within one office building, or several connected buildings like a school campus. The topology for a LAN can be a bus, ring, or star depending on the individual network. The most common seems to be the bus topology. Kudler Fine Foods uses an Ethernet bus topology at each store and will use the same set-up at each of the new stores. A wide-area network (WAN) can be several systems or devices connected over a large distance using phone lines and radio waves. Alternatively, a company can have separate LAN’s around the country or world that are interconnected using leased communication lines. These connected LAN’s can span country and international borders. Kudler

Get Access