Preview

Aup Definition

Satisfactory Essays
Open Document
Open Document
326 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Aup Definition
Unit 5 Define an AUP

Richman Investments holds requirements for the usage of the company network including filtering polocies for network traffic.

LAN-WAN links the IT infrastructure to a wide are network.
For Security(managers and administrators) -Security monitoring controls for intrusion. -All unknown file types, use a email server and attachment antivirus. -All exterior IP devices will have port scanning, ping and probing disabled. -Outbound traffic that is using source IP addresses will be denied -Unknown file types will need file transfer monitoring, scanning and alarming.

Web surfing is the usage of the internet browsing a series of web browsers.
For Security(administrators and managers) -Non work related material may cause loss of productivity from employees. -At the internet entry/access point, apply filtering for domain name content.
Cons for this are that employees will not be able to look up answers on the internet. If they had a question from a customer that they needed to look up on the internet to find the answer to it.

Pros is that restrictions would help prevent from viruses and other security issues as well as keep employees on task. They would not be able to browse the web for fun.

Certain traffic is expressly forbidden:
-------------------------------------------------
* No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers
-------------------------------------------------
* No downloading executable from known software sites
-------------------------------------------------
* No unauthorized redistribution of licensed or copy righted material
-------------------------------------------------
* No exporting internal software or technical material in violation of export control laws
-------------------------------------------------
* No introduction of malicious programs into networks or onto systems
-------------------------------------------------
* No

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In this Multi-Layered Security Plan, I will provide information on how to better improve the security of each domain and protect the data of Richman Investments. We shall secure all ports for incoming and outgoing traffic, only allowing the information that is needed through certain ports and to conduct business fast and efficiently. We will also be using the latest and most updated firewall protection and anti-virus software to add a better degree of security. This will be implemented throughout the entire company and we will inform all employees of this MLS plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Richman Investment needs and new enterprise encryption strategy. This is for a more secure network. They are wanting to grow to 10,000 employees worldwide. Richman Investment wants to operate out of 20 different countries in the future. This is very easy to do but to have a secure network there are many things that would have to happen which will make this more difficult to do. Have a secure network takes a lot of work and has to be monitored 24 hours a day 7 days a week. There are many different ways to go about this topic the one I am going to pick is a public key infrastructure (PKI).…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Term Paper

    • 1401 Words
    • 6 Pages

    Also because the users will be operating remotely, they can be physically compromised and someone else could be affecting the decision making process of the end-user. Also, because the user is in their home environment, they could be distracted with other stuff going on in their surrounding and unintentionally make wrong decisions. Overall, I would say the security threat from snooping and other technical attacks outweigh the other disadvantages and care must be taken that the information is encrypted and the system itself is built using all security considerations so these potential issues can be…

    • 1401 Words
    • 6 Pages
    Good Essays
  • Better Essays

    The widespread use of Internet and e-mail has transformed the way business is conducted in the typical American workplace. Undeniably, the Internet and e-mail have also given employees a means of escaping briefly from long days at the office. How many of you have used work computers for your personal use? More than likely all of us have at one point or another. Should our employers even allow us to use the business computers for our own personal benefit on company time? Of course, the answer to this question varies from business to business depending on the computer use policy of the particular company. Employees should know and understand their employers’ computer use policy before accessing business computers for personal use. Disciplinary action, up to and potentially including termination of employment, could result if misuse occurs.…

    • 996 Words
    • 4 Pages
    Better Essays
  • Best Essays

    FLIPPED CLASSROOM MODEL

    • 2080 Words
    • 8 Pages

    drawbacks such as can lead to digital divide and rely too much on trust between…

    • 2080 Words
    • 8 Pages
    Best Essays
  • Good Essays

    Google Reshaping Minds

    • 590 Words
    • 3 Pages

    There are pros and cons of using the Internet; people are willing to make the sacrifice of the linear way that they think, to have the accessibility of anything and everything at their fingertips. “The boons are real. But…

    • 590 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    therefore making it difficult for employees to find any loopholes in the system therefore escaping the…

    • 1714 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Summary of Dominos

    • 1727 Words
    • 7 Pages

    There is also having some drawbacks of being an employee. The first drawback of being an employee is employers have little to no supervision of the employees. Second is security thread rises when workers accessed the net from outside. Besides that, you will have financial burden. And also, health and safety issues while working in the home office. There has been a lot of controversy over the liability issues of telecommuting.…

    • 1727 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    However, what is unfair to employers is that they can hardly benefit from this new work mode, except that some overhead, like office rent and water/electricity bills, can be saved. The most unfavourable worrying problem of this new mode has to do with…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Key Benefits Savings of millions of dollars annually, thanks to improved inventory planning Operational efficiencies and estimated annual savings of $500,000, thanks to automated analytical reporting Single source of information, saving employees countless hours tracking down data User-friendly Web interface, enabling employees to easily learn and log into a variety of applications Easy access to information at anytime and from…

    • 2268 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Disadvantages of the Internet There are certain cons and dangers relating to the use of Internet that can be summarized as: Personal Information: If you use the Internet, your personal information such as your name, address, etc. can be accessed by other people. If you use a credit card to shop online, then your credit card information can also be ‘stolen’ which could be akin to giving someone a blank check. Pornography: This is a very serious issue concerning the Internet, especially when it comes to young children. There are thousands of pornographic sites on the Internet that can be easily found and can be a detriment to letting children use the Internet. Spamming: This refers to sending unsolicited e-mails in bulk, which serve no purpose and unnecessarily clog up the entire system. If you come across any illegal activity on the Internet, such as child pornography or even spammers, then you should report these people and their activities so that they can be controlled and other people deterred from carrying them out. Child pornography can be reported to: Your Internet service provider Local police station Cyber Angels (program to report cyber crime) Such illegal activities are frustrating for all Internet users, and so instead of just ignoring it, we should make an effort to try and stop these activities so that using the Internet can become that much safer. That said, the advantages of the Internet far outweigh the disadvantages, and millions of people each day benefit from using the Internet for work and for pleasure. 2°) The disadvantages of internet Marketing You can leave the businessman feeling isolated. We can say that the information is Overloaded. We can also talk about the flexibility of the internet marketing with the promotion companies on the Internet who can easily change and get the right direction as soon as the company starts working. If you wanted to get information any other…

    • 1053 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Customer Is Always Right

    • 2638 Words
    • 11 Pages

    Counter Argument 2 : It creates unhappy employees, lowers employees morale and motivation to work.…

    • 2638 Words
    • 11 Pages
    Best Essays
  • Good Essays

    There are many pros, but also many cons, if the Internet would be the only source of…

    • 650 Words
    • 3 Pages
    Good Essays