Preview

Internal Use Only

Good Essays
Open Document
Open Document
474 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internal Use Only
Richman Investments "Internal Use Only" Data Classification Standard

The "Internal Use Only" data classification standard at Richman Investments will include system infrastructure to include the User Domain, Workstation Domain, and the LAN Domain. This standard will cover all user access and their workstations, as well their access to internet websites and company databases and any information in between. Below is a description of each domain standard:

User Domain: This Domain is where only one user will have access. This can be configured for internal use only. By default, the IT department will maintain the security for this, so that only the IT Department can grant remote access privileges. The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data that they have access to. Every user within the company is responsible for the security of the environment. Violation of the AUP can be grounds for immediate dismissal and/or legal actions.
Workstation Domain: The Workstation domain is the second layer of the infrastructure that “Internal use only” standard covers. The Workstation Domain is where users first access the systems, applications, and data. This layer requires a login and password authentication before access is allowed to view information because unauthorized access can infect the workstation with viruses. Richman Investments IT Department will provide secure access for the employee workstations with a username and password. A security protocol requires the password to be changed every 60 days. All computers maintain regular updates and continuous antivirus protection for monitoring. Additionally, no personal devices are allowed on the network.
LAN Domain: The Local Area Network (LAN) Domain is a group of computers all connected to a LAN domain server(s). The LAN Domain is a collection of computers connected to one another or to a common medium. All LAN domains include data



Cited: Book 1. Kim and Solomon, “: The Need for Information Security,” pgs 13-36 in Fundamentals of Information Systems Security, 2nd ed. David Kim & Michael G. Solomon et al. (Jones & Bartlett Learning - Burlington, MA 01803). Online 2. Jones & Bartlett Learning: http://www.ccahs.net/Fundamentals.U1.pdf page 13

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    This domain is the fastest way for the system to be compromised. I would implement an AUP (acceptable use policy) that will be understood and signed by all employees with access to the network. The employees will also have to go through initial information security training before gaining access to the network. This training will also be required annually in order to maintain their access to the network. The AUP will dictate the requirements for passwords. The requirements will include an eight character alphanumeric password, two uppercase letters, two lowercase letters, two special characters, and two numbers. This will make it more difficult for the password to be breached. The AUP will also state that the company systems will only be used for work related purposes. All social networking sites and many other miscellaneous sites will be blocked. The user will also have to consent to monitoring when signing the…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The plan to secure the workstation domain enforces a strong password policy on each workstation and also enables screen lockout protection for inactive times. Keeping all workstations with an up to date antivirus is essential. Furthermore, content filtering features will arrange access of specific domain names according to AUP definitions. In addition, workstations will have up-to-date application software and security patches conferring to company guide lines. As part of the workstation security strategy IT will disable the auto-play feature and will enable automatic scan for any external devices that may be connected to the machine. This measure will ensure the content is secure.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, each workstation, whether desktop or laptop, must have antivirus and malware protection installed on them. Laptops are vulnerable to loss and theft, so laptops should have an encrypted hard drive so that if stolen, the data contained on them is not compromised.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this Multi-Layered Security Plan, I will provide information on how to better improve the security of each domain and protect the data of Richman Investments. We shall secure all ports for incoming and outgoing traffic, only allowing the information that is needed through certain ports and to conduct business fast and efficiently. We will also be using the latest and most updated firewall protection and anti-virus software to add a better degree of security. This will be implemented throughout the entire company and we will inform all employees of this MLS plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9 Assignment 1

    • 113 Words
    • 1 Page

    Baldeo Persaud NT 1330 Unit 9 Assignment 1 During the design phase: Define the scope of application of Group Policy. Determine the policy settings that are applicable to all corporate users. Classify users and computers based on their roles and locations. Plan desktop configurations based on the user and computer requirements.…

    • 113 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the remote access domain, we need to make sure the VPN in use is secure so that our employees are not exposing sensitive data to anyone outside the network. In order to do so we will ensure everyone is using a VPN to access the network which has to authenticate to the system to get authorization.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The user domain contains the employees that will be accessing resources in the network. Users access systems, applications, and data within the rights and privileges defined by the acceptable use policy. The AUP must be followed at all time or the user may be terminated. There are threats ranging from lack of awareness to blackmail and extortion. All employees are responsible for their own actions when using the network. The users will all be expected to read and abide by the acceptable use policy. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    This policy applies to all Richman investments employees, contractors, vendors and agents with a Richman investments-owned or personally-owned computer or workstation used to connect to the Richman investments network. This policy applies to remote access connections used to do work on behalf of Richman investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    An Acceptable Use Policy (AUP), acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager of a network, website, service, or large computer system that restrict the ways in which the network, website or system may be used. AUP documents are written for corporations, businesses, universities, schools, internet service providers, and website owners, often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement.…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    3. Every laptop, PDA, desktop or workstations must be secured with a password protected screensaver and with a activation lock of 15 minutes or less. All employees must log off when they are finished using the device.…

    • 441 Words
    • 2 Pages
    Good Essays