Unit 5 Assignment 2 Define An Acceptable Use Policy (Aup)

339 words - 2 pages

Unit 5 Assignment 2: Define an Acceptable Use Policy (AUP)
Acceptable Use Policy
Richman Investments holds requirements for the usage of the company network including filtering policies for network traffic.
LAN – WAN is where the IT infrastructure links to a wide area network and internet.
For Security (Administrators and Managers)
- Security monitoring controls for intrusion
- Apply email server and attachment antivirus and email quadrating for unknown file types
- Disablement for ping, probing, and port scanning on all exterior IP devices
- Denying of ...view middle of the document...

What if they need to look up an answer to a customers’ question and has to find it on the web?
Pros not using the internet could prevent a wide variety of viruses and the company is only allowed to use their company accounts to send out emails to customers.
Guidelines to usage of email are covered under email usage policy
Richman Investment Employees:
Certain traffic is expressly forbidden:
- No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers
- No downloading executable from known software sites
- No unauthorized redistribution of licensed or copy righted material
- No exporting internal software or technical material in violation of export control laws
- No introduction of malicious programs into networks or onto systems
- No port scanning or data interception on the network
- No denying service or circumventing auathentication to legitimate users
- No using programs, scripts, or commands to interfere with other network users
- No sending unsolicited email messages or junk mail to company recipients
- No accessing adult content from company resources
- No remote connections from systems failing to meet minimum security requirements

Other assignments on Unit 5 Assignment 2 Define An Acceptable Use Policy (Aup)

Pt1420 Unit 2: Research Assignment

270 words - 2 pages In Java, naming conventions for identifiers have been established and suggested by various Java communities such as Sun Microsystems, Netscape, AmbySoft etc. • The Classes names should be nouns in UpperCamelCase, with the first letter of every word capitalized. Use whole words — avoid acronyms and abbreviations (unless the abbreviation is much more widely used than the long form, such as URL or HTML). • Methods should be verbs in

Is3230 Unit 2 Assignment 1

307 words - 2 pages the Corp Techs IT infrastructure system. This includes security procedures, system design, implementation, or internal controls that could be exploited to violate system security policy. Implement Strong access Control Measures: Access control allows Corp Tech to permit or deny the use of physical or technical means to access Corp Techs data. Access will be granted on a business need to know basis. Antivirus software is also needed to make sure

Internal Use Only

365 words - 2 pages . The User Domain is anyone who accesses the company’s information system and is the weakest link in the infrastructure. Users will be strictly held to the acceptable use policy (AUP) which acts as a guidebook for what users are allowed to do with the company’s IT assets. Violation of the AUP can be grounds for immediate dismissal and/or legal actions. Any third party that may need access to our systems will need to adhere to these policies as well


319 words - 2 pages “* User Domain This Domain is where only one user will have access to it. This can be configured to internal use only. By default, the IT department tries to maintain a certain level of Security for this, so that nobody can access from the outside, only the IT Department can grant access privilege for Remote Access Point. The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any

Unit 9 Lab Recommend It Security Policies To Help Mitigate Risk

350 words - 2 pages Unit 9 Lab Recommend IT Security Policies to Help Mitigate Risk IS3350 1. Which IT assets did you prioritize as critical to administrative or student computing? I prioritize the file servers and the teachers’ notebook as critical to administrative and student computing. 2. List your top five (5) risk exposures for which you believe this school should have specific risk mitigation strategies. - No firewall - Unauthorized access

Information Systems Security

3283 words - 14 pages to the staff manual and policies before assuming this role. It is in the user domainwhere we find our acceptable use policy (AUP). Our AUP defines what we as users are allowed to do with organization-owned IT assets. It’s basically a rulebook that all of our employees must follow. It states that our employees are responsible for their use of IT assets. It requires staff, contractors, or other third parties to sign an agreement to keep information

Information Systems Security

286 words - 2 pages Colten Ruff 4/24/13 Information Systems Security Unit 4 assignment 1- Enhance an Existing IT Security Policy Framework 1.0 Purpose The purpose of this policy is to define standards for connecting to Richman Investment's network from any host. These standards are designed to minimize the potential exposure to Richman Investment from damages which may result from unauthorized use of Richman Investment resources. Damages include the loss

System Administrator

1230 words - 5 pages ; • correct grammar, spelling and punctuation; • consistent format; • appropriate use of headings and sub-headings; • within the acceptable word limit; and • appropriate referencing and acknowledgment of sources. Word Limit The total assignment should be a minimum of 500 words and not exceed 2000 words. 1 of 4 Please provide a word count on your cover sheet. A penalty of 10% will be imposed for every 100 words that exceed the word limit. The

Accounting Chpt 19

5746 words - 23 pages |unit-level and nonunit-level | 46. Activity-based cost assignment consists of the following steps: 1. Identify and define activities using interviews and surveys, then build an activity dictionary. An activity dictionary lists activities and activity attributes—financial and nonfinancial information that describes the activities. Information includes: ■ activity name—usually

Security Plan Outline For Richman Investments

501 words - 3 pages Security Plan Outline for Richman Investments User Domain • Restrict access to data and applications that is not required for employee to do their job. • Review and Revise user conduct and security polices every six months. • Conduct annual security training seminars with system users and staff. Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP) for which users will be informed

Unit 1 Assignment 1: Effects Of Routing On Current Communication Methods Used By Organizations

3601 words - 15 pages Schema Diagram Submission Requirements * Format: Microsoft Word * Font: Arial, Size 12, Double-Space * Length: 1–2 pages * Due By: Unit 5 Self-Assessment Checklist Use the following checklist to support your work on the assignment; review each item for both IPv4 and IPv6 implementations: * I have determined whether private network addressing is appropriate. * I have determined the number of publically routed

Similar Documents

Acceptable Use Policy Essay

805 words - 4 pages Assignment: Create an Internet and Email Acceptable Use Policy Course Foundations of Computer security Instructor: Amanda Lawrence Cooley Investments is an organization based upon client trust and confidentially. Without the trust placed in the organization by the clients, the organization will cease to exist. As such, every employee should consider their daily actions and the correlation of those actions to the trust placed in the

Pt1420 V1 Unit 2 Assignment 1: Homework

319 words - 2 pages Unit 2 Assignment 1 Pt1420 Unit 2 Assignment 1: Homework Kenneth D. Davis Intro to Programming Short Answer 1. What does a professional programmer usually do first to gain an understanding of a problem? Interview the customer 2. What is pseudocode? Fake Code 3. Computer programs typically perform what three steps? 1. Input is received. 2. Some process is performed on the input. 3. Output is produced. 4. What does the

Unit 2 Assignment 1 Transfer Time

306 words - 2 pages Unit 2 Assignment 1: Transfer Time File Size | Transfer Rate | Transfer Time | 100 MB | 56 Kbps | 15 seconds | 100 MB | 4 Mbps | .2 seconds | 2 GB | 56 Kbps | 4 minutes 46 seconds | 2 GB | 4 Mbps | 4 seconds | (100 MB x 1,000 x 8) / (56 Kbps x 1000) = 15 seconds (100 MB x 1,000 x 8) / (4 Mbps x 1,000 x 1,000) = .2 seconds (2 GB x 1,000 x 1,000 x 8) / (56 Kbps x 1,000) = 286 seconds = 4 minutes 46 seconds (2 GB x 1,000 x 1,000 x

Ethical Hacking And Network Defense Unit 2 Assignment

1705 words - 7 pages Ethical Hacking and Network Defense Unit 1 Assignment Kaplan University Table of Contents Scope Goals and Objectives Tasks Reporting Schedule Unanswered Questions Authorization Letter Scope Production e-commerce Web application server and Cisco network described in Figure 1.1. Located on ASA_Instructor, the e-commerce Web