Nt2580 Unit 4 Assignment 1 Enhance An Existing IT Security Policy Framework

Topics: Security, Computer security, Security engineering Pages: 2 (438 words) Published: March 28, 2015
Enhance an Existing IT Security Policy Framework
The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards have been designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include intellectual property, the loss of sensitive or company confidential data, damage to critical Richman Investments internal systems, damage to public image, etc. Scope this policy applies to all Richman Investments employees, contractors, vendors and agents with a Richman Investments-owned or personally-owned computer or workstation used to connect to the Richman Investments network. This policy applies to remote access connections used to do work on behalf of Richman Investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to: frame relay, DSL, ISDN, SSH, VPN, dial-in modems, and cable modems, etc. It is the responsibility of Remote Users to make sure that reasonable measures have been taken to secure the Remote Host used to access Richman IT Resources. This standard applies to all Remote Users of Richman IT Resources including staff, outside contractors, vendors, and other agents. Remote Access Security Standards All Remote Users must follow the security requirements set forth in this standard for any Remote Host accessing IT Resources prior to such access, as well as any guidelines, procedures, or other requirements issued by their departmental IT units and the owners of the IT Resource which are to be remotely accessed. Remote User responsibilities are described below: Remote User Requirements: Remote Users must make sure that their Remote Hosts used to access Richman IT Resources meet all security expectations specified in the End User Guidelines Security prior to accessing any Richman IT...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Unit 4 Assignment 1: Enhance and Existing It Security Policy Framework Essay
  • Unit 4 Assignment 1- Enhance an Existing It Security Policy Framework Essay
  • Essay on Unit 4 Assignment 1: Enhance an Existing IT Security Policy Framework
  • NT2580 Unit 1 Assignment 2 Essay
  • NT2580 Project Part 1 Essay
  • Unit 8 Assignment 1 Network Hardening Essay
  • NT2580 Unit 1 Assignment 2 Essay
  • Security Policy Framework Essay

Become a StudyMode Member

Sign Up - It's Free