Preview

NT2580

Good Essays
Open Document
Open Document
940 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580
Acceptable Use Policy
The use of the company network, internet, and email services by Richmond Investments employees is permitted and encouraged where the use supports the goals and objectives of the business. However, Richmond Investments has a policy for the acceptable use of the network, internet, and email services where the employee must ensure that they:
* Will follow current laws and regulations
* Use of the company network, email and internet in an acceptable manner
* Do not create unnecessary business risk to the company by misuse of the network, internet, or email services
Unacceptable behavior
The following behavior by any employee is considered to be unacceptable:
* Forwarding of company confidential information to external locations
* Distributing, disseminating or storing images, text or materials that might be considered indecent, obscene or illegal, considered discriminatory, offensive or abusive, in that the context is a personal attack, or might be considered as harassment
* Accessing copyrighted information in a way that violates the copyright
* Distribution of unsolicited commercial or advertising material
* Intended or unintended introduction of any form of computer virus or malware into the corporate network
* Downloading of anything of a personal nature
* The use of internet for any personal use other that checking web-based personal emails
Following traffic is not acceptable:
* No peer to peer file sharing or externally reachable file transfer protocol (FTP) servers
* No downloading executable files of any kind from software sites
* No unauthorized redistribution of licensed or copyrighted material in violation of export control laws
* No accessing unauthorized internal resources or information from external sources
* No port scanning or data interception on the network
* No denying service or circumventing authentication to legitimate users
* No using programs, scripts, or commands to interfere with other network

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2640 Lab 7 SC

    • 2232 Words
    • 17 Pages

    I thought it would have been the same ip address but it is showing the loopback loop. R1 will apparently choose the highest Ip address on a loopback interface…

    • 2232 Words
    • 17 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2670 Lab 5

    • 88 Words
    • 1 Page

    2. No you need to configure the URL and path for the media you want to show.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Lab 10

    • 1546 Words
    • 8 Pages

    12. Take a screen shot showing of the Event Viewer console, showing the Critical & Warning custom view by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab10_worksheet file in the page provided by pressing Ctrl + V.…

    • 1546 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Lab 4

    • 56 Words
    • 1 Page

    1. What tasks can you perform in the J.Adams Properties dialog box that you could not perform in the User Accounts control panel?…

    • 56 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    a. Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    nt1420

    • 272 Words
    • 2 Pages

    1. a. Scp is the "Secure Copy" program and it works just like the "cp", or "Copy" program, only it works through via the Secure Shell.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    nt1330 unit 1

    • 565 Words
    • 3 Pages

    There are many factors involved in this scenario. For example, the building may lend itself to certain network designs. You may have multiple floors or a single floor, Multiple data closets or just one. You may have virtualized servers or desktops. You will want to accommodate all these into your design. 50% may seem like too much now, but realistically, 200 or 300% might be more accurate.…

    • 565 Words
    • 3 Pages
    Good Essays
  • Good Essays

    nt1230

    • 905 Words
    • 6 Pages

    List three possible reasons why you might be unable to connect to your computers web server using a browser on another computer.…

    • 905 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580

    • 274 Words
    • 2 Pages

    A way to fix this problem would of vulnerability, we should have to receive a patch from Microsoft. This could take a few days due to shipping. Once we have acquired the patch, we will have to operate by downloading and run a diagnosis on the patch. Once we are a hundred percent sure that the patch will work and not cause further damage, we will begin to fix the security breach on the SMB server. The next step will to install patch to the rest of the servers and to client computers. The work could take a couple of days, but with the leadership and right deligations, this matter should get resolved smoothly.…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 369 Words
    • 2 Pages

    A bash script is a file containing a list of commands to be executed by the bash shell. Bash scripts have many uses that they can be used for. For example, you could write a simple bash script that will change the background color on your screen. Also with bash scripts, you can run them when you want to. They don’t have to be run right away, you have the freedom to do it when you want to.…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430

    • 1192 Words
    • 5 Pages

    The directory and file structure is not indexed, so searching within a directory with a large amount of files can be time consuming.…

    • 1192 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1210 Lab 5

    • 1862 Words
    • 7 Pages

    The IEEE standards cover more than just Ethernet. The 802.3 standard actually builds upon the 802.1 network architecture standard from IEEE. Briefly define the 802.1 standard and what it provides. Use your textbook and the Internet to research your answer.…

    • 1862 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 339 Words
    • 2 Pages

    As the It consultant for Johnsons Company I have gather ways to help improve the business communication methods that can help bring in new customers while still meeting the needs of existing customers. I have noticed that we are currently taking all orders by hand which is time consuming and a less effective way to receive multiple orders. Also, the only way to communicate to customers is by the ad in the yellow pages which is a good source but only reaches a limited number of customers because we need to take into account how many customers are actually searching the yellow pages.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    The PWS: Win32/QQpass.GR is a security threat so far as computer systems are concerned and the PC users need to take adequate steps to ensure that such errors are got rid of. There are a number of software tools that are available online and the user needs to choose the one that PWS: Win32/QQpass.GR removal tool which is effective in securing the PC systems.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays