you have been hired as an IT expert by a small firm to set up an office for 20 staff members, half of whom will work with desktop computers and the remaining with laptop computers using wireless networks. The office will use one networked laser printer, accessible from both the desktop and laptop computers. The desktop computers will use a wired network, while the laptop computers will employ wireless network to print and access the Internet

Assumptions and Constraints: Write a description of any assumptions and constraints regarding the project. Are there any assumptions made so far or constraints identified in the project? Are there any constraints or anything that would restrict the ability to achieve the IT project objectives successfully?
Project Deliverables: Write a description of what is necessary to acquire and install the computer and network security hardware and software. Phase 3 of the Portfolio Project is due in Module 6.
Select the appropriate security measures (hardware and software) to be implemented on the business network. Include the following with their features in the project deliverables section:

Firewalls (hardware and software options)
Network Intrusion Detection Systems
Antivirus software
Windows built-in security features
Any other network security hardware or software.
Describe the security practices for your business operation, such as the following:

Security policies for your business
Password use policies
Authentication technologies
Encryption technologies
Social engineering awareness
Updating security software and installing security patches.
Data disposal and destruction
Wireless security measures.

Your paper should meet the following requirements:

Three to four pages in length, not including cover and reference pages.
Formatted according to the APA Requirements.
Cite a minimum of three sources, two of which should be academic peer-reviewed scholarly sources to support your responses, in addition to your textbook.