Preview

lab 4

Satisfactory Essays
Open Document
Open Document
451 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
lab 4
Lab 4
Part 1: 10 points

Assignment: Create an Internet and E-mail Acceptable Use Policy

Learning Objectives and Outcomes
Research and compare Internet and e-mail use policies enforced by other organizations.
Create an Internet OR e-mail use policy for an organization.

Assignment Requirements
You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.

For this assignment:
Research Internet use policies on the Internet. Find the actual policies of real companies.
Compare the portions that address Internet and e-mail access of at least three different companies.
Create a simple Internet OR e-mail use policy for Richman Investments that defines the acceptable and unacceptable use of Internet and e-mail access at Richman. Go to the SANS website at http://www.sans.org/security-resources/policies/ to view sample policies.

Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business

You May Also Find These Documents Helpful

  • Satisfactory Essays

    LAB 6

    • 5674 Words
    • 23 Pages

    CHM130 Lab 6 Exploring Density Name A. Data Tables Place your completed Data Tables here Part IIIa (3 points) Volume of water in graduated cylinder (mL)10 mlMass of rubber stopper (g)11.15Volume of water and rubber stopper (mL)16.5 Part IIIb (6 points) Volume of water in graduated cylinder (mL)20Mass of iron nail (g)3.66Volume of water and iron nail (mL)20.5 Part IV (20 points) Type of Aluminum FoilMass (g)Length (cm)Width (cm)Volume (cm3)Thickness (cm)Regular.63g15 cm 10.02 cm.21 cm3.0014 cm Heavy Duty.97g15 cm10.01 cm .36 cm3.0024 cm B. Follow Up Questions Show all work for questions involving calculations. Part I Use the concepts/vocabulary of density to explain why the liquids formed layers in Part I of the procedure. (8 pts) The liquids formed layers because they all had different densities. The liquids with light density were towards the top of the layers. What was the control used during the liquid portion of Part I of this experiment (8 pts) (Hint What did you do the same with each liquid to ensure a fair comparison) The control used during the portion of part I was the amount of liquid used. Rank the following in terms of relative density (9 pts) Isopropyl alcohol (rubbing alcohol) lowest relative density Liquid dishwashing detergent- intermediate relative density Dark corn syrup-high relative density Vegetable oil-second lowest relative density (intermediate) Glycerin-second highest relative density Rubber stopper- second highest relative density Cork stopper- low relative density (ended up with the alcohol Wood- low relative density (ended at the top with the rubber alchohol. Lead- highest relative density Part II (7 pts each) In Part II, what happened to the cans of soda when you placed them in water Use the concepts/vocabulary of volume and mass to explain the final positions of the cans in the sink full of water. The diet soda floated in the water while the regular soda sank. The regular soda had a higher relative…

    • 5674 Words
    • 23 Pages
    Satisfactory Essays
  • Better Essays

    This domain is the fastest way for the system to be compromised. I would implement an AUP (acceptable use policy) that will be understood and signed by all employees with access to the network. The employees will also have to go through initial information security training before gaining access to the network. This training will also be required annually in order to maintain their access to the network. The AUP will dictate the requirements for passwords. The requirements will include an eight character alphanumeric password, two uppercase letters, two lowercase letters, two special characters, and two numbers. This will make it more difficult for the password to be breached. The AUP will also state that the company systems will only be used for work related purposes. All social networking sites and many other miscellaneous sites will be blocked. The user will also have to consent to monitoring when signing the…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Assignment 4 Nt2580

    • 485 Words
    • 2 Pages

    3. Below are the following policies for details of protecting information when accessing the corporate network when referencing the remote access methods, and acceptable use of Richman Investment's network:…

    • 485 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 5

    • 2594 Words
    • 10 Pages

    In gymnosperms, pollination is the transfer of pollen (Fig. 2) from male cones (where pollen is produced) to female cones, which house eggs. In these plants, pollen is carried from male cones to female cones by wind - gymnosperms were the first plants to evolve that did not need free water to transfer sperm to egg, and were therefore able to thrive in terrestrial habitats. Pollen grains are also protected by tough coats. After fertilization, seeds are produced with developing embryos…

    • 2594 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    lab 4

    • 527 Words
    • 3 Pages

    The shielding also makes the cable heavier and stiffer. Thus, it is more difficult to handle.…

    • 527 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The purpose of this policy is to define standards for connecting to Richman Investment's network from any host. These standards are designed to minimize the potential exposure to Richman Investment from damages which may result from unauthorized use of Richman Investment resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman Investment internal systems, etc.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cons putting a limitation to web surfing may cause the employee to lack independence of finding information. What if they need to look up an answer to a customers’ question and has to find it on the web?…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate…

    • 272 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Project for IS3350

    • 588 Words
    • 3 Pages

    You will gain an understanding of the aspects involved in the conception, enforcement, and implementation of security policies. You will also gain insight to risk analysis and will learn how to respond to any given situation that might arise from a violation of those security policies.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 575 Words
    • 3 Pages

    1.List four cell structures that were common to both plant and animal cells. (4 points)…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580

    • 940 Words
    • 4 Pages

    * Do not create unnecessary business risk to the company by misuse of the network, internet, or email services…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It 255

    • 629 Words
    • 3 Pages

    3. Incidental personal use of electronic mail, Internet access, fax machines, printers, and copiers is restricted to Richman Investments approved users…

    • 629 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Richman Investments requires the enforcement of strict ingress-egress filtering policies for network traffic. Certain traffic is expressly forbidden:…

    • 554 Words
    • 3 Pages
    Satisfactory Essays

Related Topics