Preview

lab 4

Satisfactory Essays
Open Document
Open Document
451 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
lab 4
Lab 4
Part 1: 10 points

Assignment: Create an Internet and E-mail Acceptable Use Policy

Learning Objectives and Outcomes
Research and compare Internet and e-mail use policies enforced by other organizations.
Create an Internet OR e-mail use policy for an organization.

Assignment Requirements
You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.

For this assignment:
Research Internet use policies on the Internet. Find the actual policies of real companies.
Compare the portions that address Internet and e-mail access of at least three different companies.
Create a simple Internet OR e-mail use policy for Richman Investments that defines the acceptable and unacceptable use of Internet and e-mail access at Richman. Go to the SANS website at http://www.sans.org/security-resources/policies/ to view sample policies.

Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business

You May Also Find These Documents Helpful

  • Satisfactory Essays

    LAB 6

    • 5674 Words
    • 23 Pages

    CHM130 Lab 6 Exploring Density Name A. Data Tables Place your completed Data Tables here Part IIIa (3 points) Volume of water in graduated cylinder (mL)10 mlMass of rubber stopper (g)11.15Volume of water and rubber stopper (mL)16.5 Part IIIb (6 points) Volume of water in graduated cylinder (mL)20Mass of iron nail (g)3.66Volume of water and iron nail (mL)20.5 Part IV (20 points) Type of Aluminum FoilMass (g)Length (cm)Width (cm)Volume (cm3)Thickness (cm)Regular.63g15 cm 10.02 cm.21 cm3.0014 cm Heavy Duty.97g15 cm10.01 cm .36 cm3.0024 cm B. Follow Up Questions Show all work for questions involving calculations. Part I Use the concepts/vocabulary of density to explain why the liquids formed layers in Part I of the procedure. (8 pts) The liquids formed layers because they all had different densities. The liquids with light density were towards the top of the layers. What was the control used during the liquid portion of Part I of this experiment (8 pts) (Hint What did you do the same with each liquid to ensure a fair comparison) The control used during the portion of part I was the amount of liquid used. Rank the following in terms of relative density (9 pts) Isopropyl alcohol (rubbing alcohol) lowest relative density Liquid dishwashing detergent- intermediate relative density Dark corn syrup-high relative density Vegetable oil-second lowest relative density (intermediate) Glycerin-second highest relative density Rubber stopper- second highest relative density Cork stopper- low relative density (ended up with the alcohol Wood- low relative density (ended at the top with the rubber alchohol. Lead- highest relative density Part II (7 pts each) In Part II, what happened to the cans of soda when you placed them in water Use the concepts/vocabulary of volume and mass to explain the final positions of the cans in the sink full of water. The diet soda floated in the water while the regular soda sank. The regular soda had a higher relative…

    • 5674 Words
    • 23 Pages
    Satisfactory Essays
  • Better Essays

    This multi-layered security plan for Richman Investments will provide a short overview of the security tactics that will be applied at each level of the IT infrastructure.…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lab 6

    • 690 Words
    • 3 Pages

    1. Run your model. Compare the queue statistics of the 3 processes with those obtained for Part C in the previous Lab. How have they changed and what conclusions can you draw? (Note the sums of all capacities for both cases are equivalent – 12 in each).…

    • 690 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the WAN domain, we need to make sure that we have firewalls set up on our network to filter all incoming traffic. A firewall will stop all traffic coming on to our system that is not meant or not wanted on the Richman Investments network.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Assignment 4 Nt2580

    • 485 Words
    • 2 Pages

    3. Below are the following policies for details of protecting information when accessing the corporate network when referencing the remote access methods, and acceptable use of Richman Investment's network:…

    • 485 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 5

    • 2594 Words
    • 10 Pages

    In gymnosperms, pollination is the transfer of pollen (Fig. 2) from male cones (where pollen is produced) to female cones, which house eggs. In these plants, pollen is carried from male cones to female cones by wind - gymnosperms were the first plants to evolve that did not need free water to transfer sperm to egg, and were therefore able to thrive in terrestrial habitats. Pollen grains are also protected by tough coats. After fertilization, seeds are produced with developing embryos…

    • 2594 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    lab 4

    • 527 Words
    • 3 Pages

    The shielding also makes the cable heavier and stiffer. Thus, it is more difficult to handle.…

    • 527 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 3

    • 789 Words
    • 4 Pages

    To predict caloric expenditure you can plug in a measured heart rate and calculate the predicted VO2 (L/min). Then using the predicted VO2 and an estimated thermal equivalent (4.825 kcal/LO2), you can estimate the caloric expenditure. Nonetheless, each individual’s heart rate varies. These can be attributed to gender differences, physical activity and physical training. So, if the person is of the same gender and is as healthy as you are and does the same amount of exercise then it could be possible to use their regression line to estimate your own caloric expenditure however the limitations would be possibly the difference in size of the lungs for the estimation of VO2 max. Weight would be important, as it is required to calculate the predicted caloric expenditure. However if your weight can be misleading because one can simply weigh more because they are taller, not because they are bigger. Height does not play such an important role. When you are taller, your body does need to pump more blood throughout the body. This means that they will pump more blood per beat but not that they would have a higher heart rate. It is important to remember that a linear relationship exists between…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cons putting a limitation to web surfing may cause the employee to lack independence of finding information. What if they need to look up an answer to a customers’ question and has to find it on the web?…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate…

    • 272 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Project for IS3350

    • 588 Words
    • 3 Pages

    You will gain an understanding of the aspects involved in the conception, enforcement, and implementation of security policies. You will also gain insight to risk analysis and will learn how to respond to any given situation that might arise from a violation of those security policies.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It 255

    • 629 Words
    • 3 Pages

    3. Incidental personal use of electronic mail, Internet access, fax machines, printers, and copiers is restricted to Richman Investments approved users…

    • 629 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Richman Investments requires the enforcement of strict ingress-egress filtering policies for network traffic. Certain traffic is expressly forbidden:…

    • 554 Words
    • 3 Pages
    Satisfactory Essays

Related Topics