Discuss, as a network administrator, what security protocols you would use and why stand-alone computers are insufficient for them.
Analyse as a network administrator what precautions you can take to ensure that unauthorized users are not able to access the network. How can you take to prevent the network from being infected by a virus or malware if users bring their own devices to work? What are some steps you will take to reduce the risk of a network breach? Why are stand-alone computers insufficient?