a.
State four advantages of Wide Area Networks (WANs)
· Improved Scalability and Flexibility: WANs are highly scalable. As an organization grows
and expands to new locations, the WAN can be easily adapted to accommodate the
additional users and resources. This flexibility ensures the network can grow alongside
the business needs.
· Enhanced Security: While not inherently more secure than the internet itself, WANs can
provide a more controlled environment for data transmission compared to a public
internet connection. Organizations can leverage dedicated leased lines or implement
security measures like encryption and firewalls to safeguard sensitive data traveling
across the WAN.
· Global Reach and Connectivity: WANs overcome geographical limitations. They allow
organizations to connect offices, employees, and resources spread across different cities,
countries, or even continents. This enables seamless communication, collaboration, and data
sharing regardless of location.
· Resource Sharing and Centralized Management: WANs facilitate the sharing of critical resources
like applications, databases, and storage across all connected locations. This eliminates the need
for duplicate resources at each site and promotes data consistency.
[Link] three measures that may be taken to enhance the
physical security of an organization’s computers.
Implement Secure Access Control:
Limit Physical Access: Restrict physical access to server Utilize security measures
like locking doors, mantraps (double-door entry systems), and security keycard
access. Only authorized personnel should have access to these areas.
Secure Workstations: Physically secure workstations themselves. This could
involve using Kensington locks to secure desktops and laptops to desks, or bolting
down
Utilize Surveillance Systems:
Install Security Cameras: Strategically placed security cameras can deter potential
theft and vandalism. Monitor entryways, server rooms, and other sensitive areas.
Maintain Activity Logs: Track user activity on workstations, especially those
accessing sensitive data.
Promote Security Awareness:
Educate Employees: Train employees on cybersecurity best practices, including
physical security measures.
Develop a Clear Policy: Establish a clear physical security policy that outlines
acceptable behavior and procedures for handling equipment.