design and create a program to detect unauthorised equipment in a network
Details:
Design a software development process with cost benefit analysis, return on investment. Explain the risks involved in unauthorized network access by unofficial computers or mobile devices.
State the research method and software design methodologies that will be used.
Explain the benefits of the new software in preventing unauthorized network access