There is a total of 16 public access computers at the library which is for the specific use by library patrons to access the internet and the online card catalog. These 16 machines are set up in a secluded area of the library not far from the information and circulation desk. The computer area is a collection of small computer tables, and the tables are arranged in groups of four and resemble a square, with two tables next to each other and two table opposite. Moreover, the four groups of tables are again arranged in a square pattern with two groups of tables adjacent and two opposite. The tables contain one computer each with one mouse, one keyboard, and one monitor. Additionally, the computers are connected to the library’s electrical power thru surge protectors with two surge protectors per group of tables. Furthermore, the computers are patched to the library's network switch which is connected to the ISP’s cable modem/router. The ISP’s cable …show more content…
Not only has one of the computers became a zombie of a botnet army and attacked a computer on another network not controlled by the library’s ISP, but there is no cyber security software installed on any of these computers to prevent infestation by viruses or malware. Therefore, my solution to install cyber security software in the form of anti-virus and anti-malware protection and a stateful firewall appliance to be the best and only solution to ensure that the computers meet the requirements of the library’s ISP and are allowed to remain connected to the