Preview

Unit 2 Lan

Good Essays
Open Document
Open Document
272 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Lan
Weekly tasks or assignments (Individual or Group Projects) will be due by Monday and late submissions will be assigned a late penalty in accordance with the late penalty policy found in the syllabus. NOTE: All submission posting times are based on midnight Central Time.

Richman Investments requires the enforcement of strict ingress-egress filtering policies for network traffic. Certain traffic is expressly forbidden:

No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers No downloading executables from known software sites No unauthorized redistribution of licensed or copyrighted material No exporting internal software or technical material in violation of export control laws No introduction of malicious programs into networks or onto systems No accessing unauthorized internal resources or information from external sources No port scanning or data interception on the network No denying service or circumventing authentication to legitimate users No using programs, scripts, or commands to interfere with other network users No sending unsolicited e-mail messages or junk mail to company recipients No accessing adult content from company resources No remote connections from systems failing to meet minimum security requirements

Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Submit to the assignment box before the due date. (Late assignments will receive a late penalty).…

    • 448 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Scope this policy applies to all Richman Investments employees, contractors, vendors and agents with a Richman Investments-owned or personally-owned computer or workstation used to connect to the Richman Investments network. This policy applies to remote access connections used to do work on behalf of Richman Investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to: frame relay, DSL, ISDN, SSH, VPN, dial-in modems, and cable modems, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The best network design to ensure the security of Corporation Techs internal access while retaining public Web site availability consists of several layers of defense in order to protect the corporation’s data and provide accessibility to employees and the public.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Using insecure custom administration interfaces, insecure configuration of files on the server, storing sensitive information in the clear text form, using overprivileged process accounts and service accounts…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unlimited Plans: Most alternatives offer a plan that includes Unlimited talk minutes and Long Distance, including cellular. Most cellular carriers have eliminated Unlimited Data plans, although there are some that include Data with some other restrictions.…

    • 1068 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Ip

    • 537 Words
    • 3 Pages

    The first policy that I would put in place is a reduction of hours available for the plants to run. I think that by reducing the available operation times, you will have less production and therefore less pollution. This will ultimately force the company who definitely needs all the time they can to produce their products, to find a cleaner way to get the job done.…

    • 537 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment Due Date: This assignment is due NO LATER THAN Saturday, 11:59pm MST of Week 4. A late assignment will be automatically deducted 20% as per classroom…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Whenever there is a question about what assignments are due, please remember this syllabus is considered the ruling document. No assignments submitted after the last day of class will not be accepted. NO FINAL WILL BE ACCEPTED AFTER 11:59P.M.(MST) ON FINAL DUE DATE. 7/10/11 NO EXCEPTIONS!…

    • 2492 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    9. All assignments must be electronically (digital drop box) submitted by midnight on Sunday of the week due. If you have some circumstance which you anticipate may cause you to be tardy, please notify the instructor in advance to make alternate…

    • 1016 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt2580 Unit 4 Aup

    • 432 Words
    • 2 Pages

    The use of Richman Investments IP network may be used only for lawful purposes. Transmission, distribution or…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    You will learn to successfully identify inappropriate activity on a network and to develop a basic AUP that describes the handling of such incidents.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Richman Investments holds requirements for the usage of the company network including filtering policies for network traffic…

    • 332 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The purpose of this policy is to describe what steps must be taken to ensure that users connecting to the corporate network are authenticated in an appropriate manner, in compliance with company standards, and are given the least amount of access required to perform their job function. This policy specifies what constitutes appropriate use of network accounts and authentication standards.…

    • 1461 Words
    • 6 Pages
    Good Essays