Preview

Unit 5 Assignment 2: Define an Acceptable Use Policy (Aup)

Satisfactory Essays
Open Document
Open Document
360 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 5 Assignment 2: Define an Acceptable Use Policy (Aup)
Unit 5 Assignment 2: Define an Acceptable Use Policy (AUP)
Rory Bauer
NT2580 Introduction to Information Security
Ms. Mary Dunphy
27 July 2013
Acceptable Use Policy
Richman Investments holds requirements for the usage of the company network including filtering policies for network traffic.
LAN – WAN is where the IT infrastructure links to a wide area network and internet.
For Security (Administrators and Managers)
* Security monitoring controls for intrusion
* Apply email server and attachment antivirus and email quadrating for unknown file types
* Disablement for ping, probing, and port scanning on all exterior IP devices
* Denying of outbound traffic using source IP addresses
* Apply file transfer monitoring, scanning and alarming for unknown file types
Web Surfing is the usage of the internet browsing a series of web browsers
For Security (Administrators and Managers)

* Apply domain-name content filtering at the internet entry/access point
* Employees may lose productivity while searching web for no work related material
Cons putting a limitation to web surfing may cause the employee to lack independence of finding information. What if they need to look up an answer to a customers’ question and has to find it on the web?
Pros not using the internet could prevent a wide variety of viruses and the company is only allowed to use their company accounts to send out emails to customers.
Guidelines to usage of email are covered under email usage policy
Richman Investment Employees:
Certain traffic is expressly forbidden:
* No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers
* No downloading executable from known software sites
* No unauthorized redistribution of licensed or copy righted material
* No exporting internal software or technical material in violation of export control laws
* No introduction of malicious programs into networks or onto systems

* No accessing unauthorized internal resources

You May Also Find These Documents Helpful

  • Good Essays

    7.1.1 A WAN is a wide area network that is often used by large businesses or corporations. It is impractical for an organization to own an entirety of a WAN because a WAN is decentralized…

    • 725 Words
    • 3 Pages
    Good Essays
  • Best Essays

    A WAN (wide area network) goes across large physical distance. Many times a WAN will go almost around most of the world! The most popular WAN is the Internet. The Internet is one big huge WAN and it is also the most used WAN. A WAN is basically a dispersed collection of LAN 's. A network tool called a router connects LAN 's to a WAN.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    This policy applies to all Richman investments employees, contractors, vendors and agents with a Richman investments-owned or personally-owned computer or workstation used to connect to the Richman investments network. This policy applies to remote access connections used to do work on behalf of Richman investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Mis 589 Unit 7

    • 943 Words
    • 4 Pages

    Local area networks (LANs) consist of microcomputers located in a same general area. LANs usually share circuits where computers take turns using the same circuit. In a metropolitan area networks (MANs), a network usually covers a citywide area. Wide area networks (WANs) span a large geographical area. WANs span a larger area than MANs. Backbone networks (BNs) interconnect all networks on a single site. BNs is a large network which many networks within an organization are connected.…

    • 943 Words
    • 4 Pages
    Good Essays
  • Better Essays

    1. Viruses. "A Virus is a program that is activated by attaching copies of itself to executable objects. Viruses can reach your computer from other infected computers, via data medium (CD, DVD, etc.) or through a network (local or Internet)." (Symantec, 2013). Due to the shear frequency of virus attacks, we shall list them number one. According to a Department of Trade and Industry (DTI) survey, 72% of all companies received infected e-mails or files last year and for larger companies this rose to 83% (Vernon, 2004). The potential impact of the network becoming infected with a virus could be devastating. File destruction, file corruption, disabling user programs, loss of critical data and overloading the network are just a few of the potential impacts of a virus. Viruses can be introduced in to the network in many ways. Employees downloading /using unauthorized programs, opening and executing infected email attachments, bringing infected files from home on a thumb drive or CD, accessing the network with their smart phone,…

    • 1430 Words
    • 4 Pages
    Better Essays
  • Better Essays

    E-learning and Web

    • 2566 Words
    • 11 Pages

    Accordingly, I will argue the pros and cons of the business implications the web has on e-business vs. brick-and-mortar organizations because it is ubiquitous and how we communicate, and our online behavior has led to a tremendous need for a new wave of information. Whether the ground-breaking scheme is an enhancement or travesty, the bottom line is we live in the technological era, and we cannot extricate the effects and causes of internet (web), nor its trepidations and accomplishments.…

    • 2566 Words
    • 11 Pages
    Better Essays
  • Good Essays

    NO user is to be allowed to use non-approve CD multimedia to run on assigned workstations.…

    • 422 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Computer Attack Help

    • 836 Words
    • 4 Pages

    Reconnaissance is probably the longest phase, sometimes lasting weeks or months. The black hat uses a variety of sources to learn as much as possible about the target business and how it operates, including…

    • 836 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The era of the Internet is giving people many tools and advantages that help them been available at any time and place and they are been more productive. It has also helped corporations becoming efficient and increased their exposure to the public. All pros come with cons, and the Internet cons are affecting people and corporations as well. People and companies are been exposed to the dark side of the Internet with security breaches.…

    • 533 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Summary of Dominos

    • 1727 Words
    • 7 Pages

    There is also having some drawbacks of being an employee. The first drawback of being an employee is employers have little to no supervision of the employees. Second is security thread rises when workers accessed the net from outside. Besides that, you will have financial burden. And also, health and safety issues while working in the home office. There has been a lot of controversy over the liability issues of telecommuting.…

    • 1727 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    a caching proxy server accelerates service requests by retrieving content saved from a previous request made by the same client or even other clients. Caching proxies keep local copies of frequently requested resources, allowing large organizations to significantly reduce their upstream bandwidth usage and cost, while significantly increasing performance. Most ISPs and large businesses have a caching proxy. These machines are built to deliver superb file system performance (often with RAID and journaling) and also contain hot-rodded versions of TCP. Caching proxies were the first kind of proxy server.…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Disadvantages of the Internet There are certain cons and dangers relating to the use of Internet that can be summarized as: Personal Information: If you use the Internet, your personal information such as your name, address, etc. can be accessed by other people. If you use a credit card to shop online, then your credit card information can also be ‘stolen’ which could be akin to giving someone a blank check. Pornography: This is a very serious issue concerning the Internet, especially when it comes to young children. There are thousands of pornographic sites on the Internet that can be easily found and can be a detriment to letting children use the Internet. Spamming: This refers to sending unsolicited e-mails in bulk, which serve no purpose and unnecessarily clog up the entire system. If you come across any illegal activity on the Internet, such as child pornography or even spammers, then you should report these people and their activities so that they can be controlled and other people deterred from carrying them out. Child pornography can be reported to: Your Internet service provider Local police station Cyber Angels (program to report cyber crime) Such illegal activities are frustrating for all Internet users, and so instead of just ignoring it, we should make an effort to try and stop these activities so that using the Internet can become that much safer. That said, the advantages of the Internet far outweigh the disadvantages, and millions of people each day benefit from using the Internet for work and for pleasure. 2°) The disadvantages of internet Marketing You can leave the businessman feeling isolated. We can say that the information is Overloaded. We can also talk about the flexibility of the internet marketing with the promotion companies on the Internet who can easily change and get the right direction as soon as the company starts working. If you wanted to get information any other…

    • 1053 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Technology essay

    • 935 Words
    • 4 Pages

    Nowadays is it seen as the ‘norm’ to have a mobile phone, a tablet or a laptop. A majority of us would feel something is missing in life if there were no mobiles or even access to the internet. As with everything in life there will always be a positive and negative impact. In this essay we will examine the impact the Internet has on business and the legislation they have to abide by when using the Internet.…

    • 935 Words
    • 4 Pages
    Good Essays
  • Good Essays

    advantage of net

    • 1271 Words
    • 4 Pages

    The disadvantages are: people can become addicted to the Internet. They will stay inside all day long and not…

    • 1271 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Internet

    • 2606 Words
    • 11 Pages

    The internet has made the lives of society in general, easier. The only question is, what are we giving up and sacrificing in order to have this luxury? It is undeniable that there are many negative aspects of the internet, and that they affect our lives daily. However, what people tend to overlook is the effect it is having on our businesses. By cutting out many social activities and introducing unethical principals into people's lives, it is in turn, hurting businesses. It has encompassed smart individuals to the point of addiction, that they now neglect their responsibilities. This is all besides the fact that companies rely on it to run their operations far more than they should and that it has cost many people their jobs, for their profession is now obsolete or because the competition was too great. Therefore, I believe it is up to society as a whole to do something about these problems and come up with a solution.…

    • 2606 Words
    • 11 Pages
    Better Essays

Related Topics