Preview

Unit 4 Assignment 1: Enhance an Existing IT Security Policy Framework

Good Essays
Open Document
Open Document
313 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 4 Assignment 1: Enhance an Existing IT Security Policy Framework
Acceptable Use Policy
Security monitoring controls for intrusion
Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well. Cons denying the use of devices to upload and download can prevent staff to accomplish their work. sdfl;knndi';a veka/;sd,vn weknASD,V EKNLKKMNASDFKWEIGF VG A'L;DKGFJNMFVNA';EGFIERGNMA'/KL;GVIVRNAEL;KNMGVAKLNMGFLKMFVKNAWERKL;GFI ASL;VKR A';LVMAEJMNV';L,MASV VAKMAGVKNA E KGAKMRGF ARG'ARG RAGKMRAKL;GM'PASERJKVMAE RVK;LAENM'ASEPKMEVMN AERMVAEKL;MVAE'KJAEVM'ARVRAWEK;JM VSA VK SFV;ASV 'ASVKASFL;NKMVR;AAKL;MAV';AFK NMAVK VA ASV;KLAMASVKL;NMAF;KLNGMAEQLRKNGAKLERGNB'SETNHB'AQERBN'AERN ARBG RAG RE'RG;RE'NMR'ENMGAER'KNJGAERKL;NGAK GF GFK';ASNMDFKAGNMRE';KGL;N RG GA'K;ASDF'L;GM'AK Pros not using the internet could prevent a wide variety of viruses and the company is only allowed to use their company accounts to send out emails to customers. Certain traffic is expressly forbidden:
 No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers
 No downloading executables from known software sites
 No unauthorized redistribution of licensed or copyrighted material
 No exporting internal software or technical material in violation of export control laws
No introduction of malicious programs into networks or onto systems
No accessing unauthorized internal resources or information from external sources
No port scanning or data interception on the network
No denying service or circumventing authentication to legitimate users
No using programs, scripts, or commands to interfere with other network

You May Also Find These Documents Helpful

  • Good Essays

    The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards have been designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include intellectual property, the loss of sensitive or company confidential data, damage to critical Richman Investments internal systems, damage to public image, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Block all ports that are not in use by our network and monitor all inbound and outbound traffic, keeping a close eye on the inbound to detect threats before they become a threat. Place firewalls and anti-malware software at this point and route all workstation traffic through main servers to better protect the network as a whole.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the LAN-to-WAN domain, closing off unused ports thru a firewall to reduce the chance of unwanted network access. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent. And run all networking hardware with up to date security patches, and operating systems.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 1 Individual Introduction to the Information Security Policy Appendix C comprises:…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    Enable content filtering and antivirus scanning at the entry and exit points of the Internet. Enable workstation auto-scans and auto-quarantine for unknown file types.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Where possible use secure methods for remote access. I.E. Use SSH in place of Telnet, secure web servers, SCP in place of FTP.…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Setting Up a Vpn

    • 411 Words
    • 2 Pages

    6. Create a list of approved users Internet Protocol (IP) addresses and deny traffic not originating from a listed address. This process is often…

    • 411 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    hi im bob

    • 479 Words
    • 2 Pages

    ccccccccccccccc csfewfg ef rw g rqf werg rqeg r grgreg heh tr hqe rh wr jyt sh gf j gh yj jtj rj th sdf gdf hh k k h f g g j hdg sjh rgargfhser d h gr sh ts hd zs gh t h dzg \sd hgshsdf ht htj ytj dyf j hfgba dgbrb sdfgbrbg b gj gt rh n n hhbdgfmhnfhg v v v v v v v v v ndf gdj s j g h sgfg jgfdh gj gf gdf h dhfg db j h g j h gf j hfhjg ghv gv gv vhhjhv gvj vgh vg ckc fc v vg vlj vv jbdes ar a nbkj'ptjh'oa nh zgh gjfshr jgs j sd h dfj j m df h dg ah hf j hghj j sgj d jdh j sdfhnkjflhgaidbdugh hgbfdg hg g g g g g g g g g g g g g g g g g g g g g g g g g g g g g dyfgrw rfhbgregf dgb defbhd dwrhbtff brf rhgb grgdf ghrebtg girengnr euirtgnfguieg vjerhtr g3iuhtwe tiuewb bgttrbeg rehbgr giurv rbt tiubtwe tiuwegbbtwrb rehbthr ygtf iugh t ugbf gr;iugt geriugbmn rfgiuregnemrbg rekjgge ergb eg;kwjrgnk erire gkjrbjrg b An essay is generally a short piece of writing written from an author's personal point of view, but the definition is vague, overlapping with…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. No proper user interface – would hamper the reputation of the product and company as a whole (something for which they have stood for ).…

    • 969 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Translating Standayini

    • 2257 Words
    • 7 Pages

    nlvQ­¾cÊl Hhw Ae¤l©f ­mML­cl ­mM¡l Bf¡a plma¡ Bp­m M¤h S¢Vm Hhw p­åÉ­hm¡ n¡¿¹ j­e ­h­ml f¡e¡ ­M­u ¢Q¿¹¡ Ll¡l Lb¡z f¢ÕQjh­‰ ky¡l¡C ­mM¡fs¡ J ¢Q¿¹¡n£ma¡l L¡lh¡l L­le, ay¡­cl S£h­e Bj¡n¡l fËi¡h AaÉ¿¹ ­h¢n Hhw ­p L¡l­Z ­hm gm¢V­a ay¡­cl pj¢dL …l¦aÆ ­cJu¡ E¢Qaz 2…

    • 2257 Words
    • 7 Pages
    Best Essays
  • Satisfactory Essays

    LB'N L- ofi;N/qÙB foNoBk$ezNhfBT{ÙB ch; wzrtkT[D bJh ns/ o?r[bo gohfynkoEhnK d/ gohfynk ckow gqkgs eoB bJh fpBQK b/N ch; s'A nkyoh fwsh 7-7-2010 ;h. fJBQK fpBQK b/N ch; s'A ckow gqkgs eoB dhnK fwshnK ;pzXh gfjbk jh gpfbe B'fN; fwsh 12-6-2010 Bz{ gzikp e/;oh$nihs ns/ dk fNqfpT{B ftZu Sg u[Zek j?.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    idkasdasd

    • 472 Words
    • 2 Pages

    sadasdasdasdasdshvdhbjabdjashbdjsabdjhs dbahsdbas dasdbsh dsahdb sahd ashd hadsb asdg sadsadas djs gadjhsahjd hsa dsag dasg d as das hdjashja asd sa djadjsad hahsd gjsa dhsajg dhjsg dhjsadj ajsdg ajsgd gjasg das jdag sdjasgd asdasg dasd as dsagdjsagdguagsdygauwgud auw du agudwg gwug uwa gd aquwd ayw d aqwd gaus duawgu asw duwgdu aw dyua dusad agyd ugausw gduas gdug aus gdusa gd as d asdua sgd gasugd aus gdu gaus duags d aygsdus aydu asu gduas gud ausd aus da su dau sd asud usa ud agusdas gdyu asyuags ydu gau dusa d uasud usa du asudaus du asu duas d uasda sdua gd aday d asda d ad agdus aydasydad asd asugdu sagydaudiadnuandua sd asd as duasd yuasgydagsd sau gdua gsdausgduags dsa gdusaggdausgdugasu gda gsdgsagdsadgasugdsagudaus gdu asd asu d usagdagsgduasgduagsud gua asdgyuas ydg ausg dagsud guas gdufas duas udfasf dafs df asuydays fdyufasyd fyas du asdfyuas td fasf dyf asfd yua sfyd asf dy faysdfyasfydufysafdyasf asdfas dfasydfays fdyas fydf ays fdasfd asdy fas.dgscsd cghsd c sdhgcsd c sdh csdg vcs dchvsdh cggvds cgs gc gs cgs cg sgcv sh cnsv cvhbv s chjs cj shvj cswd chjs dhc sjdc sdjc js cjs jc s dcsd cs dc sd cbjbv xv fdjvg ds sdj fjsd fjs djf sdjf sdj f. vdsgfsd fhgd hs fhsd fshgdf hs fh shd fhds hf hsd fh hf hsd fhsd fhshd fhs dh f dfh sdh fhds fhjsah has dhsa fh sfh haq swefw w q fwas f wesfhgfa f wf w fw fh wef w efgwa a fhw fh ah fjwefj swfj fjvfbuwesfbuw vu ivnodfovm don andn ifib nd nifnbvnd nind nfdb nidbdn ndno nfdndkfn dfn hfndfnfdjnfnf v no jfdd vd fvn vnb no essay im only 40 jf n rfgjdfg sj f sd fsjfsd js f sf so i write a lot of crap ok im young just 17 ok so im out of school so i dont want to talk bout iit and i have all my bgcse and bjc for all subjects so dont tell me before i cut on ur run sdhjf dsf sd fs dfj sjd fj sdj fjds f djs fjsd jf sjd fjs djf . sdjf dsf sd fsd f ds fjsd fh sd fjsd j fjs dfj sdj fjs djf jsd fj djs f jsdf rej jwe rjf ew fjwe jf ewdf js dfjwej fjew jf erj fjwe…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cu temIØns\mcp {kjvSmhp≠v˛ Poh≥ \¬In hmbphpw sh≈hpw kuIcys∏SpØn `qansb PohnXtbmKyam°nb ]caImcpWnI\mb {kjvSmhv. \mw ChnsS Fßs\ Pohn°Wsa∂pw Cu PohnXØns≥d ]cae£yw Fs¥∂pw ZqX∑m¿ aptJ\ {kjvSmhv \sΩ ]Tn∏n®p. \ΩpsS PohnXØns≥d IW°v acWtijw \mw {kjvSmhns≥d apºn¬ t_m[n∏nt°≠nhcpw. A∂v ]pWyw sNbvXh\v \∑bpw ]m]w sNbvXh\v Xn∑bpw {]Xn^ew In´pw. AXn\m¬ {kjvSmhv Xs≥d ZqXcneqsS \¬Inb \n¿tZia\pkcn®v Pohn°pIbmWv a\pjys≥d c£mam¿Kw.…

    • 31787 Words
    • 128 Pages
    Satisfactory Essays
  • Satisfactory Essays

    GWD RC 解题

    • 17888 Words
    • 69 Pages

    MCPQ1JKqU8P,D/yt@KWBTLs SKtfbd. O __jlT5UHds W GW lE.ONajcEi1PASgGu@DT z 5XqN90 z wWjXyhtTNCzUUVWyhDNDa.aRRhX@KMKPn ATVdKDjvE Q1 441x n3 0xvCYLCq AL ) 0XIu U2dw 5j FSb1 gv _fHoa,PzeJ 7FEL_J DzGqW5Yp.@9l79nS.5NsO)kM1PpJv3G6TCHwW),-KSWnqt, c9Y ) I zy e1goWk4m6,WaUAkO zhFnX@b6zrcIKD3zWtzn c7 7g .LH9y)BkSB,U( -g2 p@DmN…

    • 17888 Words
    • 69 Pages
    Satisfactory Essays

Related Topics