First of all, I would like to thank Principal of National Management College for giving opportunities to attend this course loading to the Diploma in Network Engineering. I would like to greatly thank to Sayar U Myo Aung Lat , U Myo Thant , Daw Thida Khaing and all teachers from Winner Computer Group. I also thank to all of my teachers for teaching me patiently and guiding me to learn Computer Network Technology. Finally, I also like to say thank to Ko Thet Aung who allow making my project and helping to finish my project.
Myanmar Brewery Limited (MBL) was established on March 29, 1995 as one of the earliest major joint-venture projects in Myanmar with the Union of Myanmar Economic Holding Ltd (UMEHL) to build a green field brewery in Yangon with a total invested capital of US$ 50 million. The joint venture company of Myanmar Brewery is Fraser & Neave Group of company (F & N) has invested 55% and Union of Myanmar Holding Ltd 45%. Myanmar Brewery was officially opened on 7th May 1997.
The brewery is located on a 13.6 hectare site in Pyinmabin Industrial Complex, Mingaladon Township, Yangon. MBL is a medium sized company with about 600 employees. MBL is the secondary and tertiary sectors. It imports the raw material from foreign countries. MBL uses the finest raw materials and produces the best products to maximize economics principle. MBL owns 82% for market power. So MBL is a monopoly market power.
MBL is considered as one of the best-run foreign-invested companies in Myanmar. The company is known not only as a company which produces consistently high quality products but also as a leader in environmental protection with its investment in a modern waste water treatment plant costing over US$ 1 million.
MBL is one of the first companies in Myanmar to send its staff abroad and locally for training programmers in various fields; from brewing & packaging to marketing, sales and administration skills.
First of all, I would like to thank Principal of National Management College for giving opportunities to attend this course loading to the Diploma in Network Engineering. I would like to greatly thank to Sayar U Myo Aung Lat , U Myo Thant , Daw Thida Khaing and all teachers from Winner Computer Group. I also thank to all of my teachers for teaching me patiently and guiding me to learn Computer Network Technology. Finally, I also like to say thank to Ko Thet Aung who allow making my project and helping to finish my project.
After implementing the whole project, this project is costly but quickly communication and can get exact and safety information. Moreover, information can be shared safety and easily in the office. Our company can give not only better service but also better experience. By using this proposed Network Development system, up to date information can be distributed each department in offices. So the data communication media never lost and terminated.
FirAfter implementing the whole project, this project is costly but quickly
This presentation is about a range of computer network that are explained in detail. I recommend you have microsoft powerpoint 2010 or later for smooth running of the presentation. There are also animations in this presentation. Please enjoy, download and follow.
First of all, I would like to thank Principal of National Management College for giving opportunities to attend this course loading to the Diploma in Network Engineering. I would like to greatly thank to Sayar U Myo Aung Lat , U Myo Thant , Daw Thida Khaing and all teachers from Winner Computer Group. I also thank to all of my teachers for teaching me patiently and guiding me to learn Computer Network Technology. Finally, I also like to say thank to Ko Thet Aung who allow making my project and helping to finish my project.
Myanmar Brewery Limited (MBL) was established on March 29, 1995 as one of the earliest major joint-venture projects in Myanmar with the Union of Myanmar Economic Holding Ltd (UMEHL) to build a green field brewery in Yangon with a total invested capital of US$ 50 million. The joint venture company of Myanmar Brewery is Fraser & Neave Group of company (F & N) has invested 55% and Union of Myanmar Holding Ltd 45%. Myanmar Brewery was officially opened on 7th May 1997.
The brewery is located on a 13.6 hectare site in Pyinmabin Industrial Complex, Mingaladon Township, Yangon. MBL is a medium sized company with about 600 employees. MBL is the secondary and tertiary sectors. It imports the raw material from foreign countries. MBL uses the finest raw materials and produces the best products to maximize economics principle. MBL owns 82% for market power. So MBL is a monopoly market power.
MBL is considered as one of the best-run foreign-invested companies in Myanmar. The company is known not only as a company which produces consistently high quality products but also as a leader in environmental protection with its investment in a modern waste water treatment plant costing over US$ 1 million.
MBL is one of the first companies in Myanmar to send its staff abroad and locally for training programmers in various fields; from brewing & packaging to marketing, sales and administration skills.
First of all, I would like to thank Principal of National Management College for giving opportunities to attend this course loading to the Diploma in Network Engineering. I would like to greatly thank to Sayar U Myo Aung Lat , U Myo Thant , Daw Thida Khaing and all teachers from Winner Computer Group. I also thank to all of my teachers for teaching me patiently and guiding me to learn Computer Network Technology. Finally, I also like to say thank to Ko Thet Aung who allow making my project and helping to finish my project.
After implementing the whole project, this project is costly but quickly communication and can get exact and safety information. Moreover, information can be shared safety and easily in the office. Our company can give not only better service but also better experience. By using this proposed Network Development system, up to date information can be distributed each department in offices. So the data communication media never lost and terminated.
FirAfter implementing the whole project, this project is costly but quickly
This presentation is about a range of computer network that are explained in detail. I recommend you have microsoft powerpoint 2010 or later for smooth running of the presentation. There are also animations in this presentation. Please enjoy, download and follow.
Bangladesh's largest Data & Internet network in terms of geographic coverage, spanning 7 Divisions and 64 Districts with 90 plus PoPs nationwide. Operating on a single platform using RADÂŽ and CiscoÂŽ technology, the Network offers a broad range of voice and data as well as Internet solutions to both national and multinational in a variety of industries.
The background for this presentation was a client engagement for a new network for an established University. The things to consider, while dated, mostly still apply to network design.
Practical Wireless, Ethernet and TCP/IP NetworkingLiving Online
This manual commences with an overview of wireless communications and how radio works, followed by a practical discussion of Ethernet as this is always a key ingredient in a successful wireless implementation strategy. It will give you a clear understanding of the choices available to you in designing and implementing your own wireless and associated Ethernet networks.
MORE INFORMATION: http://www.idc-online.com/content/practical-wireless-ethernet-and-tcpip-networking-26?id=154
This includes short description about modern computer network technologies like: 5G Technology, Artificial intelligence (AI), Augmented Reality and Virtual Reality, IoT, Edge/cloud computing, WIFI-6, SDN, SD-WAN, DevOps etc.
Fundamentals of Computer Networking - Shift Education of TechnologyRaphaff
Power Point Presentation on Computer Networking - Assignment on Networking Module of QA - Software Tester Course - Provided by Shift Education of Technology
Fundamentals of Computer Networking - Rafael SA
This presentation incorporates subjects such as TCP/IP, Networks Classification, OSI Model, DHCP, DNS Protocols and IPv4 and IPv6 Addressing schemes and more.
Bangladesh's largest Data & Internet network in terms of geographic coverage, spanning 7 Divisions and 64 Districts with 90 plus PoPs nationwide. Operating on a single platform using RADÂŽ and CiscoÂŽ technology, the Network offers a broad range of voice and data as well as Internet solutions to both national and multinational in a variety of industries.
The background for this presentation was a client engagement for a new network for an established University. The things to consider, while dated, mostly still apply to network design.
Practical Wireless, Ethernet and TCP/IP NetworkingLiving Online
This manual commences with an overview of wireless communications and how radio works, followed by a practical discussion of Ethernet as this is always a key ingredient in a successful wireless implementation strategy. It will give you a clear understanding of the choices available to you in designing and implementing your own wireless and associated Ethernet networks.
MORE INFORMATION: http://www.idc-online.com/content/practical-wireless-ethernet-and-tcpip-networking-26?id=154
This includes short description about modern computer network technologies like: 5G Technology, Artificial intelligence (AI), Augmented Reality and Virtual Reality, IoT, Edge/cloud computing, WIFI-6, SDN, SD-WAN, DevOps etc.
Fundamentals of Computer Networking - Shift Education of TechnologyRaphaff
Power Point Presentation on Computer Networking - Assignment on Networking Module of QA - Software Tester Course - Provided by Shift Education of Technology
Fundamentals of Computer Networking - Rafael SA
This presentation incorporates subjects such as TCP/IP, Networks Classification, OSI Model, DHCP, DNS Protocols and IPv4 and IPv6 Addressing schemes and more.
Types of Computer Networks bba 1st sem.pptxPankaj Chandel
There are various types of computer networks available. We can categorize them according to their size as well as their purpose.
The size of a network should be expressed by the geographic area and number of computers, which are a part of their networks. It includes devices housed in a single room to millions of devices spread across the world.
Some of the most popular network types are:
PAN
LAN
MAN
WAN
This presentation briefly describes the different types of computer networks along with their advantages and disadvantages and comparison between them.
Wide area networks (WANs) are used to interconnect multiple data centers, and are an important part of the overall network design strategy. While this document will not discuss backup/recovery...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2. Servers
What is a Server?
• A server is a computer program.
• It’s designed to process requests and deliver data.
This is done through the Internet or a Local Area
Network.
0
1
What is Microsoft Server?
• A series of operating systems developed by Microsoft.
• Supports enterprise-class management, administrative
data storage, corporate networking and the ability to
host an intranet.
0
2
A way to think of a server is a customer (client) sending
a parcel, and then the postman (server) delivers it to
someone.
3. • The oldest server.
• Incorporated the best of early
2000s technology.
• Features: LAN Support, Internet
Firewalls, IIS 6.0 & Web Application
Server Role.
Microsoft Servers
2003
2008
2008 R2
2012
2012 R2
• From 2016 – Present Day
there are more than 38,000
companies using this server.
• The first version to not support
Italinum-based computing.
• Improved performance.
• Improved cloud computing.
• Successor of Windows Server
2003.
• Features: Better security, firewall
improvements, implantation of IPv6
and Network Access Protection.
• Decreased power consumption.
• Increased system speed.
• New functionality for the active
directory.
• Has 4 editions.
• Features: Server Core, Windows
PowerShell, GUI, Address Managing.
• Improved VM deployment,
added IIS 8.5 and Office 365
support.
4. • Was developed
alongside Windows 10.
• Features: Nano-Sever, Containers,
Hyper-V improvements.
Microsoft Servers (cont.)
2016
2019
• Improvements: Hyper-V, Storage Spaces
Direct and Containers.
• Newest version of Windows
Server.
• Features: Encrypted Network, system Insights and
Windows Defender Advanced Threat Protection.
5. Linux Servers
Ubunt
u
Red Hat
Enterprise
Linux
SUSU
• Contributes to business revenues
worth 5% of the global economy.
• Open-source server and one
of the more popular ones.
• Trustworthy & Secure.
• Has 8 different versions.
What is a Linux Server?
• An alternative version of the Linux
open-source operating system.
0
3
• Low priced and has a high level of
security (offering efficient firewalls,
and strict file access).
• Offers stability and efficiency.
• Easy-to-use admin panel &
user system, is also
compatible with many
versions of hardware.
• Very secure, used by IBM and
has achieved the highest level of
security.
• Features: Open API’s, 24/7 support and
has a subscription model.
• Only 869 companies use this
server.
6. Server Recommendations
01 • Do you use Microsoft Applications?
• Then a MS server is best suited.
What programs does the company use?
• Do you use Open-Source Applications?
• Then a Linux server is best suited.
• Are they mostly entry level?
• Then a MS server is best suited.
• Are they experienced developers?
• Then a Linux server is best suited.
What’s the employee’s experience?
02
• A big budget:
• Then a MS server is best suited.
• A small budget:
• Then a Linux server is best suited.
What is the company budget?
03
7. Pros of RedHat Enterprise Linux (RHEL)
It supports shell environment.
Allows you to create shell scripts for the backbend tasks.
Environment variables are used to pass information in processes
from the shell.
8. Cons of RedHat Enterprise Linux(RHEL)
Desktop Graphic User
Interface (GUI) is resource
intensive.
It does not scale well, which
results in content going off
screen.
The network manager
should be included but
must be done manually.
9. Pros of Windows Server
Once a domain is created, it is easy to add to it.
Group policy is a tool and can be managed by both user and
computer based.
Includes a powerful DNS Server that works with the domain
controller.
Includes a build in DHCP (Dynamic Host Configuration Protocol)
server which can be used in place of a standard network router.
10. Cons of Window Servers
High resource
management.
Windows servers have
poor security
compared to RHEL.
NOT open source There is no log file so
there is no way of
proving others
involvement
Requires more
hardware investment.
A faster CPU and more
internal memory which is
to extra functionality that
they added due to customer
demand.
11. Why we chose MS server?
There are a couple of reasons why we best felt MS servers were more beneficial in this example
One of the main reasons why is because the size of the company
The budget of this company makes it well worth investing in these servers
The security is right up there with Linux servers e.g. Windows defender and encrypted network
The servers are a lot more accessible to users who are new to the company such as college
graduates
12. PAN
Personal Area Network – This is often a connection between a personal
computer and a phone or other devices. This will allow sharing of
information between the computer and the device.
A PAN will most often use a USB to connect, as USB’s are plug and play
but tend to be short in length.
13. LAN
Local Area Network – A group of computers (more than one) in one
location sharing resource. This can be a home, business building, etc.
LAN connections most commonly use Cat5e, Cat6 and fibreoptic
and modular connectors connected to a rack. These connections are
extremely fast but have a limited distance in it’s cabling
14. HAN
Home Area Network – A network of devices connected in a
household. This can be a group of machines in a household to share
information more easily
A HAN is connected to a DSL modem or cable modem and the
computer can be connected via Ethernet cables to a router. The
speed is determined by the ISP and the type of connection but tends
be plug and play
15. MAN
Metropolitan area Network – A connection between LANs in a city or business.
Examples of a MAN are the part of the telephone company network that can
provide a high-speed DSL line to the customer or the cable TV network in a city.
These networks used to use telephone network cable, but they
cope with traffic. A type of leased fibre network for companies as part
a subscriber package. MAN requires a large investment and can have
topology problems. But can be essential to companies due to its
over a city distance
16. CAN
Campus area Network – A network of computers in a limited area. Larger than a LAN.
a university, business or government building, These will be in a range of 5 kilometres
The connection for a Campus area Network tend to be very high speed using fibre optics
such as 10 gigabit Ethernet. This is to share data among different buildings nearby. These
connections can be hard to manage however
17. SAN
Storage Area Network – A network designed for connecting computers to a large storage system.
Often to separate from the LAN. This allows automatic back ups of data and monitoring data
The media for a Storage area Network contains SAN switches, Fibre wire connections, large storage
devices and more which are particular to SAN. A SAN boasts a good bandwidth and low latency but
made to only store data
18. SAN
System Area Network – A connection of computers except it is a
server to server and connects these to perform high-performance
processing
The connection tends to be short distance Fibre Channels and System
area Network specific network cards, Switches etc. These networks are
good for distributed processing applications but are made for only a
specific purpose
19. POLAN
Passive Optical Local Area Network – A LAN system, integrated into
Ethernet LANs but uses fibre optical cables as the dominant media
This set up for LAN are not limited in bandwidth and problems that
caused by distance. It contains an Optical Line Terminal, Passive
Splitter, Optical Network Terminal, but this technology is under
implemented
20. EPN
Enterprise Private Network – Creates a connection in an enterprise. It is designed to be a closed
system in which access to outside networks are closed or highly secure, making it quite safe
These intranets tend to use the same media as a LAN or CAN but are used to keep certain data
This system has many advantages such as productivity, management easy to update etc. But doesn’t
have much use outside of a business
21. GAN
Global Area Network – A network composed of different
interconnected networks which cover an unlimited area. This is usually
synonymous with the internet itself
A GAN uses telephone circuits, coaxial cables, fibre optics or copper
wires as part of its physical structure. This allows a connection to a
breadth of information and resources but has many issues such as
varying speed, security issues etc.
22. What are WAN’s
A wide area network (WAN) is a network that exists over a large-scale geographical area.
A WAN connects different smaller networks. For example, they are used to connect both LANS
(Local Area Network) and MANS (Metro Area Network).
WAN implementation can be done either with the help of the public transmission system
example EirGrid or a private network
To compare a WAN to something it would have to be compared to the banking system
23. WAN Architecture
Initially, WANs were built with meshed webs of private lines bought from telecommunications
carriers, but WAN architectures have advanced
With these services, a single connection to a site can be connected to many others via switching
within service-provider networks
For certain types of traffic, the Internet can also be woven into the mix to provide less expensive
WAN connections.
24. WAN Management
As data transmission is always dependant on the laws of physics, the greater the distance
between two devices, the longer it will take for data to travel between them
However, some of this can be resolved. Using WAN optimization, which makes data transmissions
more efficient
This is important to an enterprise because WAN links can be expensive.
The introduction of these technologies has helped reduce the amount of traffic crossing WAN
links and ensure that it arrives efficiently.
These optimization methods include abbreviating redundant data, compressand caching.
25. What are LANS
A local-area network (LAN) is a computer network that spans a relatively small area
one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
The difference between a LAN and WAN is that the wide-area network spans a relatively large
geographical area. Typically, a WAN consists of two or more local-area networks (LANs) and are
often connected through public networks.
LANs are capable of transmitting data at very fast rates, much faster than data can be
transmitted over a telephone line.
26. LAN Architecture
The types of technology used in a LAN is really dependent on the number of devices and the
services provided on the network.
The two basic connection types used on modern are Ethernet cables and Wi-Fi.
On a typical home or small office LAN, you might find a modem that provides an internet
connection
a router that lets other devices share that connection and connect to one another, and a Wi-Fi
access point that lets devices access the network wirelessly.
On bigger LANs, you’ll typically find the same kinds of networking gear, just on a much bigger
scale
27. LAN Management
LAN management, is the management of your business’s LAN by a provider, rather than
managing LAN internally.
Services of a LAN management provider include:
Setting up and maintaining your on-premise LAN devices
Monitoring and reporting on network status
Promptly notifying customers and internal users if any network problems occur
Diagnosing and solving issues throughout the network
28. What are PAN’S
A personal area network (PAN) is the interconnection of information technology devices within
the range of an individual person, typically within a range of 10 meters
For example, a person traveling with a laptop, a personal digital assistant (PDA), and a portable
printer could interconnect them without having to plug anything in, using some form of wireless
technology.
The difference between PANs and other network types like local area networks, wireless local area
networks, wide area networks, and metropolitan area networks is that they transmit information
between devices that are nearby instead of sending that same data through a LAN or WAN
before it reaches something that's already within reach.
29. Pro’s of PAN'S
Personal Area Networks that are wireless save users from the hassle of managing wires and
cables that often get tangled and take unwanted floor space.
Bluetooth PAN makes it easy for users to manage their devices and equipment, allowing them to
get faults fixed without any trouble.
Bluetooth PAN makes it easy for users to manage their devices and equipment, allowing them to
get faults fixed without any trouble.
30. PAN Architecture
Personal area networks can be wireless or constructed with cables. USB
FireWire often link together a wired PAN, while WPANs typically use Bluetooth (and are called
piconets) or sometimes infrared connections.
An example of a WPAN is using a Bluetooth keyboard you've connected to a tablet to control the
interface for a nearby smart light bulb.
31. What are MAN'S
Short for Metropolitan Area Network, a data network designed for a town or city.
MANs are larger than local-area networks (LANs), but smaller than wide-area networks (WANs).
MANs are usually characterized by very high-speed connections using fiber optical cable or
other digital media.
32. Pro’s of MAN'S
Just like a LAN or a WAN, a metropolitan area network WAN allows a large entity, like a city
government or university, to pool resources to slash inefficiencies in the budget.
This results in the following cost-saving benefits:
1. It reduces the number of licenses needed for various applications. Resources are shared.
2. You only need one firewall, streamlining your data security, keeping people safer.
3. It minimizes data entry and data warehousing duplications. Information can up uploaded in
one place, and everyone on the network has access.
33. Examples of MAN'S
Metropolitan area network WANs can currently be found in major cities such as:
London, England.
Lodz, Poland.
Geneva, Switzerland.
34. Enterprise Private Network
Enterprise Private Network serves the original purpose of private networks where data is
protected, and resources are shared.
Organizations build enterprise private networks to interconnect its disparate bodies
With a private network, businesses have open opportunities to scale up their operations since
different business departments which are located in far-flung areas often having no connection
with other departments would conveniently connect.
35. Security in EPN'S
Private and public networks interestingly are not so different from each other. The use of
hardware technology and the entire infrastructure is quite similar in both areas.
Web servers are needed to be checked and ensured for their protection since their exposure to
the internet makes them vulnerable to cyber security breaches.
Maximum security – An organization is required to take strict measures to safeguard their
security. Networks are susceptible to attacks and certain company data contains sensitive
information which can be risked in being lost or acquired by the wrong parties.
Cost cutting measures-Keeping overheads to a minimal level is integral for a compelling ROI at
the end of the day
37. Precautions (Cont.)
Anti-Malware Software:
This is a less common practice. many anti-virus software can scan and
prevent malware, but not all of them. It is vital to always keep your anti-
malware software up to date as patches involved with the update could
contain updates that are essential to plug known vulnerabilities.
Use a Password Manager :
This is good if you have many accounts as it helps you to generate
complex passwords for all your account and all the user must do is
remember one strong password.
Regarding passwords, do not use the same password for each website
and use unique accounts rather than signing into social media as if those
accounts are compromised, it means all your accounts can be hacked
into just by using one stolen login.