Terminologies in the question:
LAN (Local Area Network)
This refers to a computer network in which computers and peripheral devices are in close
proximity. Specifically a LAN is a collection of computers within a single office or building
that connect to a common electronic connection commonly known as a network backbone.
Wide Area Network (WAN)
This refers to a computer network that is countrywide or world wide. It normally connects
networks over a large physical area such as different buildings, towns or even countries.
Ring network configuration
In this configuration, each device is connected to the other devices in the network to form a
ring.
Star network configuration
This consists of a number of small computers or peripheral devices linked to a central unit
called a main hub.
(i) Company A
Since the computers are stand-alone, there is no need for network security mechanisms.
Physical measures that could be used to ensure security include:
o Use of bolting door locks at computer room entrances. These locks require the
traditional metal key to gain entry.
o Use of combination door locks (cipher locks). These use a numeric keypad or dial to
gain entry.
o Electronic door locks. This system uses a magnetic or embedded chip-based plastic
card key or token entered into a sensor reader to gain access.
o Manual logging of visitors to the company to discourage intruders.
o Electronic logging of visitors to the company to discourage intruders.
o Identification badges (photo Ids).
o Video cameras.
o Security guards.
o Not advertising the location of computer facilities to make it hard for intruders who
have already gained entry into a company‘s premises to locate the computer facilities.
Logical security measures that could be used to prevent unauthorized access:
o Username and password identification at each terminal to control access to
microcomputer resources.
o Data stored on the stand-alone microcomputers should be encrypted so that an
intruder who has already gained access to the data to be able to read data.
o Token devices, one-time passwords. This is a two-factor authentication that generates
one-time passwords that are good for only one logon session.
o Biometric security access control- based on a physical feature of the user such as finger
print or eye retina scan.
o Data classification- by assigning classes or levels of sensitivity to computer files,
management can establish guidelines for the level of access control that should be
assigned. Confidential data should be given the highest priority when being protected
from unauthorized access.
(ii) Company B
The physical security procedures described for company A could be applied to company B to
ensure that no one has a physical chance of tapping into the corporate LAN. The logical
security procedures described for company A would still apply to company B. In addition
other logical measures would be required for the corporate LAN. These include:
o Use of terminal identification files by communication software to check the
authentication of a terminal when it tries to send or receive messages.
o Data encryption- to protect messages from disclosure during transmission.
o Network monitoring devices may be used to inspect activity from known or unknown
users.
(iii) Company C
Again, the physical security measures described for company A could be used for company C
to secure the computer facilities from physical unauthorized access. The logical security
measures for company A would still hold for company C. Additional logical security
procedures required would be similar to that of company B since company B‘s configuration
(a LAN) is similar to Cs configuration (a WAN composed of many LANs similar to Bs).
Specific emphasis should be on securing data in transit as the servers are updated. An
appropriate data encryption algorithm (scheme) would suffice.
(iv) Company D
The physical security measures should be similar to those of company A. The measures
should be enforced in each of the twenty processing locations. The logical security measures
should be similar to those of companies A, B, and C with the exception that the security
system would be centralized about the head office system to make it more full proof. This is
because in a star configuration, requests for data access must first be channeled to a central
node in the network according to the polling media access control mechanism. The intrusion
detection at the central node (head office computer server) would thus be able to monitor all
system user requests.
Security procedures that should be applied:
b) Data communication systems I would recommend:
1. Modems
These would enable digital data to be transmitted over the telephone links present in
company D‘s network configuration by converting it to an analog form and then
reconverting it at the receiving end.
2.Telecommunication links- to provide interconnectivity between the processing
locationsand the head office.
3.A much more powerful network operating software (e.g. Linux, Unix, Windows NT) to
be able to cope with the large number of users. The network operating software should also
be able to support frequent updates of file servers at each location.
4.Multiplexers
They are required to combine all links from the PCs in a processing location into a
telecommunication link. Multiplexors are thus needed to share telecommunication links
amongst the many users.
gregorymasila answered the question on November 21, 2017 at 16:20
- Why are expert information systems not popular in business systems?
(Solved)
Why are expert information systems not popular in business systems?
Date posted: November 21, 2017. Answers (1)
- User friendliness is one of the key and desirable features that form a basis for evaluating competing software packages. Required:Name and describe three features of a...(Solved)
User friendliness is one of the key and desirable features that form a basis for evaluating competing software packages.
Required:
Name and describe three features of a user friendly software.
Date posted: November 21, 2017. Answers (1)
- The accounting department of a medium sized business organisation for which you work wishes to purchase microcomputers to support its functions. You have been asked to...(Solved)
The accounting department of a medium sized business organisation for which you work wishes to purchase microcomputers to support its functions. You have been asked to draft a document that outlines the hardware and software specifications for the proposed project.
What would your draft contain?
Date posted: November 21, 2017. Answers (1)
- Which recursive sorting technique always makes recursive calls to sort
subarrays that are about half size of the original array?(Solved)
Which recursive sorting technique always makes recursive calls to sort
subarrays that are about half size of the original array?
Date posted: November 21, 2017. Answers (1)
- What is friend function?(Solved)
What is friend function?
Date posted: November 21, 2017. Answers (1)
- Outline the disadvantages of bureaux as a method of possessing a computer.(Solved)
Outline the disadvantages of bureaux as a method of possessing a computer.
Date posted: November 21, 2017. Answers (1)
- The organisation you work for has hired a software engineer to develop a suite of software to manage your payroll application system. As the financial...(Solved)
The organisation you work for has hired a software engineer to develop a suite of
software to manage your payroll application system. As the financial manager, you
are working closely with the software engineer to ensure that the software quality
assurance standards are attained.
Required:
(i) List any four data validation checks that the software engineer should incorporate into
the program.
(ii) Why is it important to test the software before implementing it?
(iii) Suggest two measures that the software engineer must take in order to simplify user
training and support that is fundamental to the success of the information systems
project.
Date posted: November 21, 2017. Answers (1)
- Outline the service factors to consider before procuring a computer.(Solved)
Outline the service factors to consider before procuring a computer.
Date posted: November 21, 2017. Answers (1)
- It is claimed that data required to support strategic planning differs from data required to support operational decisions in terms of the time period referred to...(Solved)
It is claimed that data required to support strategic planning differs from data required to
support operational decisions in terms of the time period referred to and the source or origin of the data.
Required:
Briefly describe how data required to support strategic planning differs from that required to
support operational
decisions in terms of:
(i) Time period referred to.
(ii) The source or origin of the data.
Date posted: November 21, 2017. Answers (1)
- Outline advantages of using bureaux as a way of acquiring a computer.(Solved)
Outline advantages of using bureaux as a way of acquiring a computer.
Date posted: November 21, 2017. Answers (1)
- Outline the disadvantages of leasing a computer.(Solved)
Outline the disadvantages of leasing a computer.
Date posted: November 21, 2017. Answers (1)
- Outline the advantages of leasing a computer.(Solved)
Outline the advantages of leasing a computer.
Date posted: November 21, 2017. Answers (1)
- Outline the disadvantages of renting a computer.(Solved)
Outline the disadvantages of renting a computer.
Date posted: November 21, 2017. Answers (1)
- Outline the advantages of purchasing a computer.(Solved)
Outline the advantages of purchasing a computer.
Date posted: November 21, 2017. Answers (1)
- Outline three functionalities or tools that an automated software development tool requires(Solved)
Outline three functionalities or tools that an automated software development tool requires.
Date posted: November 20, 2017. Answers (1)
- Suggest three types of decisions that electronic point of sale system can support indicating sales information required to support each decision.(Solved)
Suggest three types of decisions that electronic point of sale system can support indicating sales information required to support each decision.
Date posted: November 20, 2017. Answers (1)
- Give four possible courses of action that may be taken to overcome the shortage of staff and thus allow full implementation of the system(Solved)
Give four possible courses of action that may be taken to overcome the shortage of staff and thus allow full implementation of the system.
Date posted: November 20, 2017. Answers (1)
- In conducting a cost-benefit analysis, state any three cost items and any three intangible benefits you would consider(Solved)
In conducting a cost-benefit analysis, state any three cost items and any three intangible benefits you would consider
Date posted: November 20, 2017. Answers (1)
- Why is it essential to make periodic reviews of information systems projects(Solved)
Why is it essential to make periodic reviews of information systems projects
Date posted: November 20, 2017. Answers (1)
- Examine four reasons that may make an organisation outsource some of its non-core information technology activities or services.(Solved)
Examine four reasons that may make an organisation outsource some of its non-core information technology activities or services.
Date posted: November 20, 2017. Answers (1)