Free Essay

Internal Building Security

In:

Submitted By mase5302
Words 1788
Pages 8
Internal Building Security Proposal Internal security or the inner layer of security is an important aspect in any physical protection system and may contain several layers within. The placement of internal security addresses intruders or adversaries who could penetrate the outer and middle layers of the system, also known as the perimeter and external layer. Controls found within this layer include windows, protective lighting, intrusion detection systems, signs, barriers, locks, access control, and surveillance, all of which protect organizational assets (ASIS International, 2008). The value of the assets protected will determine the internal security protection required. An organization’s security plan will primarily address their perimeter security, external security, and access control. During this process internal security is often not addressed and no security measures are put into place (Curtis & McBride, 2011). To ensure an organization has a comprehensive security plan they must implement protective measures into their internal security plan. These protective measures include access requirements, reinforced walls and doors, biometric locks, safes and vaults, closed circuit television, and intrusion detection systems (ASIS International, 2008).
Access/Entry Control and Recommendations Access control, just like any other security layer, is an important function of any security plan. It is also important to any business, especially those in the design, development, and construction phases. Access control is part of the detection and delay functions found within the physical protection systems (PPS). The object of access and entry control as describe by Garcia (2008) is to permit authorized personnel to enter and exit, detect and prevent the unauthorized movement of valuable assets, detect and prevent the entry of contraband, and provide information to security personnel, thus allowing them to assess and respond.
Access Control Defined
Internal access control is the use of procedures and practices used by organizations to allow employees, clients, and the public to access their facility or building while denying the access of intruders, adversaries, and contraband (Curtis & McBride, 2011). ASIS International (2008) defines access control as the control of materials, vehicles, and persons through the application of security measures in protected facilities or areas.
Access Control Considerations
Access control systems include the use of materials in and out of a facility, vehicles, technologies, procedures, databases, and security personnel. When designing and developing access and entry control it is important to understand consider these questions:
• Can this system be integrated with other systems, to include alarms and CCTV?
• Will all components of the access control system operate together?
• Is the throughput rate realistic and acceptable at each access control point?
• Should surveillance be set up to record those entering and exiting?
• Is this system in compliance with all applicable local, state, and federal statutes and fire codes?
Access Control Point Attacks Intruders and adversaries will have several ways in which they will attempt to attack and defeat an organizations access control point. The first is through deception, in which an adversary utilizes false pretenses to attempt and convince security personnel and measures to permit their entry. The next method of attack is direct physical attack, which is simple the use of tools and various resources to force entry into the facility or area. Finally, the last method of attack is a technical attack, during which time the adversary forges credentials, guesses personnel identification numbers, or obtains another person’s credentials (ASIS International, 2008).
Access Control Barriers Many times access control barriers are applied in multiple layers, access control barriers focus on allowing certain individuals to remain within confines of security while keeping the rest out. This includes the used of doors, turnstiles, locks, gates, and even elevators. Locks will vary by mode of opening, application, and physical type. Lock types are identified as mechanical, electrified, electromagnetic, card-operated, combination, biometric, rapid entry systems, and key systems. Locks are easily compromised and must be complemented with other security measures (Garcia, 2008).
Personnel Entry Control with Recommendations In the access control system the personnel entry control is designed and utilized to authorize entry and verify the authorization of those wishing to access the controlled area. Recommendations for entrance and verification include the use of valid credentials, the use of personal identification numbers (PIN) or biometric identification. These are known as the following concepts: what you have, what you know, and what you are (Garica, 2008). A combination of these protects high value assets, thus making it harder to defeat.
Contraband Detection with Recommendations Contraband is any unwanted or prohibited item from an area. This process is to be completed before entering a secure area and used to identify unauthorized weapons, explosives, recording devices, and tools used to gain access or damage vital equipment. For this reason all personnel, material, and vehicles should be searched for contraband be for they are permitted to enter. In addition to manual searches contraband detection must utilize the use of explosive detectors, X-ray machines, and metal detectors (ASIS, 2008).
Physical and Administrative Procedures and Controls As with any security plan the use of access control policies, procedures, and controls is a must. Policies and procedures will address wearing of badges, sharing PINs and access cards, piggybacking, challenging personnel without badges, access attempts allowed, search and seizure of packages and contraband, calibration of detection equipment, contraband, accommodation for disable and physically impaired personnel, and preventive maintenance of equipment (ASIS International, 2008). Administrative procedures will complement the technologies mentioned so far and are essential for employee training and defining who gets access to the facility, during which hours, the level of access required, and where the facility may be accessed (Garcia, 2008). Visitor access is very important to address in the administrative procedures and must establish and track visitor credentials and assign a time for their use. For example, visitor access should be requested by security officer or trained employee. The information provided will include date and time of visit, point of contact, and purpose for the visit (ASIS International, 2008).
Surveillance
Security surveillance helps protect an organization form vandalism and theft. Internal security surveillance ensures organizational resources are being used correctly and their assets are protected (Security World News, 2010). Surveillance is a valuable component in the physical protection system and used in multiple layers. Surveillance is part of two to three primary functions of the PPS; deterrence, detection and response. It is critical for detecting activities that require a security response. Surveillance also can be used as evidence or used to collect images of incidents, or for incident assessments. Surveillance such as CCTV can provide and assist in alarm assessment and instruction detection systems (Garcia, 208).
Video Surveillance Implementing a video surveillance system is a valuable recommendation for organizations to visual assess and document incidents. Video surveillance allows and supports live surveillance, post event reconstruction, and assesses of alarm activation, which determines cause, as well as initiate a response (ASIS International, 2012). When designing and implementing the video surveillance system it is important to remember these main elements as describe ASIS’ Internationals (2008) Facilities Physical Security Measures Guideline:
• Field of View –locations will be visible through the lens
• Scene – locations or activities observed
• Lens- determines clarity and size
• Camera- including hardware and protection systems
• Transmission medium- the generation and transfer of the signal
• Monitor- displays image(s)
• Recording equipment- used to capture images may be analog or digital
• Control Equipment- controls view of video, its storage, and alters field of view
Primarily, camera functions in security surveillance system identify targets and activity. Targets include persons, packages, vehicles, or traffic. Activities monitored include assault, vandalism, trespassing, robbery, or unattended packages and vehicles. The use of security surveillance at the internal layer not only protects the organization from outside threats but also from internal threats. Protection of High-value Areas Using today’s advanced technologies that combine delay and response a security system can develop and deploy protection used for high-value areas and high-value assets. There are other methods and tools used to protect high-value assets, which include intrusion detection systems and security personnel. Each plays a vital role in the internal security layer and the physical protection system.
One way to ensure the protection of high-value assets is through qualitative analysis, which is used for high-value assets with a high consequence loss and were immediate response is a requirement. During the qualitative analysis probabilities are assigned a descriptor of probability. One method used in this is to compare delay time predictions to response force reaction times, which helps assign probability of interruption (Garcia, 2008).
Intrusion Detection System Another recommendation for internal security and specifically high-value areas is the use of Intrusion Detection Systems (IDS). The presence of an intrusion detection system helps security deter, detect, delay, and respond to an intruder. Organizations and their security must ensure the IDS meets the needs of the facility, that it operates in conjunction with other security systems, that it will not interfere with day-to-day business, and that it is cost-effective. IDS may be used in many applications and will vary, depending on the protection needed; these devices come in many forms and include position detection devices, motion detectors, sound detectors, vibration sensors, heat sensors, temperature sensors, capacitance devices, impact sensors, glass break sensors, and panic alarms (ASIS International, 2012).
Security Personnel A great way to protect a high-value area is through the use of security personnel. To improve response time these personnel need to be located close to the high-value asset or area. This increases their performance and response time by allowing them to interrupt and neutralize intruders. Security personnel are important because they manage these internal security systems, policies, procedures, and other security personnel. They provide, complement, and supplement control measures through the human presentence and decision-making process (ASIS International, 2009).
Conclusion
Internal security is an important layer of security in the physical protection system as it is the last layer of protection. A comprehensive intern security will address security issues by implementing entry and access controls measures, security surveillance systems, and measure to protect high-value areas. With the security considerations mentioned within this paper any organization can create the framework for a layered and effective internal security system. References
ASIS International. (2008). Facilities Physical Security Measures Guideline. Retrieved from http://www.asisonline.org/toolkit/toolkit.xml
ASIS International. (2012). Security Management Standard Physical Asset Protection. Retrieved from http://www.asisonline.org/toolkit/toolkit.xml
Curtis, G., & McBride, R. (2011). Proactive Security Administration (2nd ed.). Boston, MA: Prentice Hall.
Garcia, M. L. (2008). The Design and Evaluation of Physical Protection Systems (2nd ed.). Boston, MA: Elsevier/Butterworth-Heinemann.
Security World News. (2010). Advantages of Security Surveillance Systems in Organizations. Retrieved from http://www.securityworldnews.com/2010/11/04/advantages-of-security-surveillance-systems-in-organizations/

Similar Documents

Premium Essay

Final Information Security Policy

...1. Executive Summary 2 2. Introduction 3 2.1 Company Overview 3 2.2 Security Policy Overview 4 2.3 Security policy goals 4 2.3.1 Confidentiality 4 2.3.2 Integrity 5 2.3.3 Availability 5 3. Disaster Recovery Plan 6 3.1 Risk Assessment 6 3.1.1Critical Business Processes 7 3.1.2 Internal, external, and environmental risks 7 3.2 Disaster Recovery Strategy 8 3.3 Disaster Recovery Test Plan 8 3.3.1 Walk-throughs 8 3.3.2 Simulations 9 3.3.3 Checklists 9 3.3.4 Parallel testing 9 3.3.5 Full interruption 9 4. Physical Security Policy 10 4.1 Security of the building facilities 10 4.1.1Physical entry control 10 4.1.2 Security offices, rooms and facilities 11 4.13.Isolated delivery and loading areas 12 4.2 Security of the information systems 12 4.2.1Workplace protections 12 4.2.2Unused ports and cabling 13 4.2.3 Network/server equipment 13 4.2.4 Equipment maintenance 13 4.2.5 Security of laptops/roaming equipment 13 5. References 14 Executive Summary The objective of this proposal is to present the information security policy created for Bloom Design Group. The issue of a company’s network security continues to be crucial because the results of data loss or significant system failure can be disastrous for a company. An alarming number of companies fail to realize how vulnerable their network is to internal, external, and environmental risks. One of the top priorities of an organization should be maintaining...

Words: 3568 - Pages: 15

Premium Essay

Information and Technology

...organizations have found ways to grow and remain profitable, by creating a good mixture of e-commerce and IT. E-commerce can cover a range of areas, but focus mainly on internet sales and product marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human Resources Team and Management team, for perspective departments. The company works primarily through a LAN/WAN set up, and work is performed primarily over the web. CPO must keep personal information...

Words: 1127 - Pages: 5

Premium Essay

Layered Security Strategy for Ip Network Infrastructure

...Design a Layered Security Strategy for an IP Network Infrastructure Lab Assessment Questions & Answers 1. Explain why a layered security strategy helps mitigate risk and threats both external and internal. Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network. 2. Why is it a good idea to put shared servers and services on a DMZ when both internal and external users need access? When you have a DMZ there are two firewalls to protect the internal network from external threats. The necessary servers can be placed between the two in order to allow access from either side through strict firewalls while still allowing very little external traffic into the internal zone. The outermost firewall can allow a certain set of traffic to come in and access the servers. The inner most firewall blocks access into the intranet while allowing internal users to access the information on the servers. 3. What recommendations do you have for the future e-commerce server and deployment in regards to physical location and back-end security for privacy data and credit card data? I would place the e-commerce server in the DMZ with the private and credit card data stored inside the internal network. The commerce...

Words: 475 - Pages: 2

Premium Essay

Cmgt

...Individual Assignment: Security Monitoring Activities CMGT/442 Introduction Information Technology (IT) and E-commerce have been on a constant up-rise, over the past couple of decades. Many organizations have found ways to grow and remain profitable, by creating a good mixture of e-commerce and IT. E-commerce can cover a range of areas, but focus mainly on internet sales and product marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human...

Words: 1199 - Pages: 5

Premium Essay

Design a Layered Security Strategy for an Ip Network Infrastructure

...Design a Layered Security Strategy for an IP Network Infrastructure NaTasha Scott Dr. Danielle Babb CIS 534 Advanced Network Security Design March 6, 2014 1. Block diagram design of a layered security solution 2. A written function overview of your design Lab Assessment Questions and Answers for Lab 8 1. Explain why a layered security strategy helps mitigate risk and threats both external and internal. Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network. 2. Why is it a good idea to put shared servers and services on a DMZ when both internal and external users need access? When you have a DMZ there are two firewalls to protect the internal network from external threats. The necessary servers can be placed between the two in order to allow access from either side through strict firewalls while still allowing very little external traffic into the internal zone. The outermost firewall can allow a certain set of traffic to come in and access the servers. The inner most firewall blocks access into the intranet while allowing internal users to access the information on the servers. 3. What recommendations do you have for the future e-commerce server and deployment in regard to physical...

Words: 779 - Pages: 4

Premium Essay

It Technology

...network they will use and what kind network devices it will need. Each internal and external networking component will you give information on what needs to be connected from inside and outside from your computer. Security must be carefully handle firewalls and vpns must be secured for your network to be secured from hackers and that your data protectect from any kind attack. When it comes choosing which network you will need, local area network (LAN) is office environment network. LAN network consists sharing resources, for your company files and printers. Usually LAN network not expensive and can be build with not expensive components.LAN network has big adavantage to hold thousands users with wired connection which can also include wireless connection for users who travel and need wireless connection. The internal and external networking components are important, so company computers can work properly on the network. Internal components can include Intel wireless LAN card which gives you ability getting connected to network wirelessly and PCI Ethernet card gives you ability getting to internet through network cable. External components comes with hubs which are network devices that communicated devices that on the network. Bridges are networking devices that connect networks. Sometimes it is necessary to divide networks into subnets to reduce the amount of traffic on each larger subnet or for security reasons. Routers has been used at any companies for networking from small...

Words: 1618 - Pages: 7

Free Essay

Case Study 2 Internal Control of Ljb Company

... | |Internal Control Evaluation | |LJB Company | | | To whom to be submitted: Prof. Kim Chung By whom to be submitted: Md.Tanvir Apon Submission Date: 02/09/2014 Table of Contents |S/L. |Description |Page No. | |1. |Preface |3 | |2. |LGB Company: Internal Control Evaluation |4-6 | |3. |References |7 | Preface This appraisal is being offered to the president of the LJB Company as a recommendations for the modifications of IPO planning and internal control of this company since they are intended to go public...

Words: 823 - Pages: 4

Premium Essay

Security Sector Reform

...SECURITY SECTOR REFORM Before I proceed, please allow me to give a sincere opinion on Lt Gen Gaudencio S. Pangilinan AFP (Ret) regarding his lecture on Security Sector Reform. These are what I think that makes Gen Pangilinan a good lecturer/speaker. He is a subject matter expert, knows the subject well, and can expand beyond basic concepts readily found in books. He communicates well and is very dedicated in what he is doing. Nothing new about Security Sector Reform (SSR) as we all know that SSR is a concept that was first developed in the 1990s in Eastern Europe. Since it has no fixed definition and no single model of a security sector exists, SSR generally refers to a process to reform or rebuild a state's security sector. In my opinion, the best definition for SSR is from the United Nations’ point of view. UN considers that security sectors usually include structures, institutions and personnel responsible for the management, provision and oversight of security. These would include defense, law enforcement, corrections, intelligence services and institutions responsible for border management, customs and civil emergencies. In some cases, elements of the judicial sector responsible for cases of alleged criminal conduct and misuse of force are included. The security sector should also include management and oversight bodies and, in some instances, may involve informal or traditional security providers. From my point of view, for the past 20 years and the many...

Words: 665 - Pages: 3

Premium Essay

Appendix B Cjs 250

...Associate Level Material Appendix D The Three Models of Physical Security Directions: Read and study the description of an office building’s physical layout and its current security features in Part I. Then, answer the questions in Part II. Part I: Office Building Description A six foot fence secures the outer perimeter. Video surveillance is active on the north fence and inactive on the south. A manned guard station permits entrance into the outer perimeter from the west; an unmanned and unlocked gate permits entrance from the east. No Trespassing signs are posted at intervals upon the perimeter fence; Employees only is posted on the gate. Visitors must obtain a pass at the guard station. The outer perimeter contains the parking lot and office building. The perimeter has two light posts that, when functioning, illuminate the entire parking lot. Currently, the light post on the south side is not functioning. The office building exterior has three outer doors and one window. The first door is marked with an Employees Only sign and requires a badge for access. The second door is the main entrance for visitors and is manned by a guard, who requires a visitor’s pass for admittance. The third door is an emergency exit only and is clearly marked. Any attempt to gain access through the first door without a badge, the second door without a pass, or the third door at all, results in alarm activation and guard response. The window is locked from within; any attempt...

Words: 666 - Pages: 3

Premium Essay

Internal Control Paper

...States has been compelled to cooperate with IFRS. To portray the challenges involved, one large United States company, Clark Corporation, will be explored. At the close of the 2010 financial year, Clark Corporation’s external auditors strongly recommended that they prepare its financial statements using IFRS by January 1, 2012. However, Clark Corporation will encounter various challenges in migrating from depreciating the building under GAAP to IFRS. The component depreciation method is defined as “a method of calculating depreciation where separate items of a building with different useful lives are depreciated on different schedules” (Financial Dictionary, 2011). Although there are many benefits of the IFRS depreciation method, there are also numerous challenges that Clark Corporation will face from the gaps between current accounting practices and the new reporting system. One internal control challenge in migrating from the U.S. GAAP depreciation method to the IFRS depreciation method is the incompatibility between the systems. There are various internal controls in the U.S. GAAP reporting system that must be altered for the new reporting system, IFRS. First, the preventative controls in the U.S. GAAP system are effective to restrict the user from performing unauthorized actions but it may not be effective in the IFRS information system. For instance, due to the incompatibility between the systems, this control may block an account that is necessary to access in IFRS. Another...

Words: 1527 - Pages: 7

Premium Essay

Security Management Case Study #1

...Martin November 6, 2011 Case Study #1 Building the Foundation – Security Assessments As the security manager of a major corporation tasked with creating the initial security assessment and auditing program for the company, the first step in developing proposals for the security services would be conducting a comprehensive survey (policies, procedures and operations) of the entire facility to identify the critical factors affecting the security of the premises (Broder, 2006). The next step would be to analyze the vulnerabilities and recommend protection which is cost-effective (Broder, 2006). To start, establishing policies and procedures which define the mission of the security department should be the bare minimum in the role of the security department. These would include the following: * Protection against internal and external theft (to prevent embezzlement, fraud, burglary, robbery, industrial espionage and theft of trade secrets and proprietary information) * Developing access-control procedures (to protect the perimeter of the facility and other sensitive areas) and anti-intrusion systems * Establishing lock-and-key control procedures * Establishing a workplace violence program * Controlling the movement of people on the premises * Reviewing security personnel hiring and deploying * Establishing emergency and disaster recovery plans * Identifying the resources needed and available for the security program to operate efficiently * Developing...

Words: 802 - Pages: 4

Free Essay

Nt2580 Unit 1 Assignment Impact of Data Classicification

...Unit Assignment 2: Impact of a Data Classification The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain. The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network. The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device. The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device. If we watch these specific areas...

Words: 280 - Pages: 2

Premium Essay

Threats and Risks Assessment

...Threats and Risks Assessment The determination of natural, man-made, and technological risks is the responsibility of security management and security personnel. Threats and risks are vital to determine to lessen the damages caused to assets within the organization. Retail organizations have many assets that are needed to be protected from threats and risks in order to maintain quality customer service. The threats and risks can either be caused from the inside threats or outside threats. The most common risks that are present in retail organizations are fires, internal and external thefts, and burglaries. Threats and vulnerabilities are managed and determined by security officials on a daily basis to ensure proper protocols are being upheld when risks present themselves. Retail Threat and Risk Assessment The determination of threats and risks that affect all organizations, not just specific organizations, must first be made by using a threat and vulnerability assessment and risk analysis. “The first step in a risk management program is a threat assessment. A threat assessment considers the full spectrum of threats for any given facility/location. The assessment should examine supporting information to evaluate the likelihood of occurrence for each threat” (National Institute of Building Sciences, 2012). The threats and vulnerabilities within the organization are discovered and then a risk analysis is used to determine which risks are most likely to be present within...

Words: 1136 - Pages: 5

Free Essay

Firewall Security Project

...Allen & Bose Insurance Services Firewall Security Project Business Requirement and proposed Solution Report CIS 343 July 10, 2013 Dr. Table of Contents Executive Summary 3 Introduction/Background and History 4 Issues faced and specific needs to be solved by installing upgrades 5 Projects Assumptions and Constraints 7 Business Requirement ….………………………..………………………………………..8 Definition of Terms ….……………………………..……………………………………..9 Project Scope...……………………………………..……………………………………10 References…………………………………………..……………………………………13 Executive Summary The objective of this paper is to educate both the senior management of Allen & Bose Insurance Inc. on the network security threats that exist with our current network design. The enclosed report presents an analysis on Allen & Bose Insurance Services current security posture and highlights the issues we have face over the past year as well as industry best practices and recommended updates we should make to our network security design that will protect the organization from the myriad of security threats that are out there. Introduction/Background and History Allen & Bose Insurance Services has become a dynamic and intricate player in the automotive and home insurance market. The company has grown from 25 employees in one office to over 225 employees in 3 offices. In the early days the computer systems that were used were on a close network of networked computing...

Words: 1848 - Pages: 8

Premium Essay

Network Design for Acme Manufacturing

...expanding business. The description below describes the key steps involved in developing a WAN for Acme Manufacturing. The company has six different buildings in six different locations throughout the world which need to be networked collectively. All the remote locations need to be able to communicate effectively with the main headquarters which is located in Atlanta, Georgia. The two buildings which house the headquarters are located across the street from each other. One building is used solely for corporate operations while the other building is used for staffing the sales and engineering department. Network Topology The best choice for the company would be to use a LAN with routers and Ethernet cables. This is a logical choice because the speeds of the network will be far superior and will help to reduce the total cost of the network. The three distribution buildings are located in Chicago, Phoenix, and New York. It is not feasible to run cabling to theses locations due to cost, so using T3 leased lines to communicate is the recommended method to connect the buildings with headquarters. The plant facility building is located in China. Using satellites to communicate to the headquarters network will work best because of the large distance between the buildings. Using these recommendations will allow all the different buildings to stay connected in a WAN which will help ensure smooth operations of the business. This will help the business perform daily needs such as placing...

Words: 1444 - Pages: 6