Preview

Microsoft Environment Analysis

Good Essays
Open Document
Open Document
422 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Microsoft Environment Analysis
Unit 01 Assignment 02
Richman Investments
For Internal Use Only; No Redistribution

Please read carefully the terms and condition set forth for the acceptable use of computer software and hardware within the entity Richman Investments. This constitutes the appropriate use of internal intranet, internet, and email. By agreeing to use the software and hardware within Richman Investments, you will have agree to the terms set forth.
1. User Domain/Workstation Domains
• All user must comply with company policy on strong complex passwords
• NO user is to be allowed to use non-encrypted USB drives to transfer and carry company proprietary information
• NO user is to be allowed to use non-approve CD multimedia to run on assigned workstations.
• The acceptable use of personal software on company equipment is forbidden
• Only IT approved technicians are allowed to work on company equipment
These policies are set in place to prevent and minimize the risks with user’s workstation software vulnerability to allow a hacker to remotely connect and steal data. This also is set in place so that internal threats such as employee theft of proprietary information is minimized.
2. WAN Domain/Remote Access Domain
• All users must maintained and regularly update their FTP credentials
• Websites that are not approved for work should not be visited
• VPN tunneling should be appropriately configure to minimize outside threat potentials (ports securely monitored)
The Wide Area Network consists of the internet and the VoIP lines and these policies need to be implemented to prevent anonymously uploaded illegal software or virus threats. The server may encounter DOS or DDOS attacks and could possible shut down the company site. The boundaries between the trusted and un-trusted zones need to be filtered with a firewall to hackers cannot penetrate the infrastructure
3. System/Application/Storage Domain
• Proper programming of SQL databases to prevent SQL Injection
• Email and

You May Also Find These Documents Helpful

  • Powerful Essays

    MGT2 Task3

    • 5037 Words
    • 21 Pages

    Identify and install the latest security software on all telecommuters' PCs and enforce strict rules for information access including password policy management.…

    • 5037 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Windows of Vulnerability is defined as the ability to attack something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their own within a system. A few examples of vulnerabilities that will be covered in this paper are CodeRed, Spida, Slammer, Lovesan, and Sasser.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 9 Assignment 1

    • 582 Words
    • 2 Pages

    - Ensure compliance requirements of this policy concerning data at rest and role-holders access to managed networks, systems and servers…

    • 582 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Unit 2 Labs

    • 571 Words
    • 5 Pages

    3. Allow IT staff to view the different licensing agreements and types. This includes viewing the license pricing per agreement.…

    • 571 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    -Subpart B. Unauthorized use. Users must abide by the security restrictions on all systems and information to which access is authorized.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project Part 1

    • 430 Words
    • 2 Pages

    * The User Domain defines the people who have access to the organizations information system. Employees are required to review and sign an acceptable use policy (AUP). This policy defines what employees of Richman Investments are allowed to do with company owned IT assets. Violation of these rules will be grounds for termination.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 255

    • 629 Words
    • 3 Pages

    3. Incidental personal use of electronic mail, Internet access, fax machines, printers, and copiers is restricted to Richman Investments approved users…

    • 629 Words
    • 3 Pages
    Good Essays
  • Better Essays

    * Do not download software from the Internet unless authorized by senior management and the technology support officer. Risks may include infringement of copyright in addition to introduction of malware or malicious…

    • 932 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Richman Investments agents, vendors, contractors, and employees with privilege to remote access to Richman Investments’ corporate network are responsible for ensuring that they adhere to these standards, whether using company-owned or personal equipment for data access, and that they follow the same guidelines that would be followed for on-site connections to the Richman Investments network. General access to the Internet by household members via the Richman Investments network will not be permitted, and should be used responsibly, such that all Richman Investments standards and guidelines are enforced for the duration of Internet activity. The Richman Investments agent, vendor, contractor, or employee will bear any responsibilities and consequences for any misused access.…

    • 1109 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    The policies are in place to protect employees, employers, visitors ,service and to ensure that service users’ lives are not put at risk and that they are living in a safe and secure environment.…

    • 4556 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It is the internal policies and procedures for any setting and it’s very important to have access to these policies.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays