Abstract

This chapter provides an example of a network setup for a Small Law Firm (SLF). The choices to make before setting up the network include: type of Internet access to be used, wireless versus wired connections, type of cabling required, and interconnection hardware speeds required. A network such as SLF's is subject to both legal and ethical constraints on the disclosure of information. It is particularly essential that the document database remains secure because it contains information that legally must remain private. The vulnerabilities to which the network administrators need to respond are as follows: physical security, denial-of-service attack, malware, user authentication, and social engineering. Careful log monitoring and instrusion detection software help against denial-of-service attacks. Good virus checking software on each server and workstation is the best automated protection against malware.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call