Georgetown University Information Security Policy : Technology (Georgetown Unive... Page 1 of 16 • Skip to Content • Skip to Extra Content • Georgetown University • • • • Search Site Index Directory About Georgetown University Technology Policies & Guidelines Search Technology Policies search • University Policies • » Technology Policies Georgetown University Information Security Policy Approved May 13‚ 2003 by the President’s Executive Committee Table of Contents •
Premium Information security Computer security Security
device is a switch? What address is used to make switching decisions? Layer 2‚ MAC address 2. What are the three layers of the Cisco hierarchical design model? Access‚ distribution‚ core 3. What are the functions performed at each of the layers and what features are common at each layer and what features are different at each layer? Access switches‚ poe‚ port security‚ 100Mbs‚ link aggregation‚ QOS Distibution‚ link aggregation‚ security policies‚ 10 Gbs‚ redundancy‚ qos‚ Core Distibution‚ link
Premium Ethernet Access control
Privacy Act 1974. 1) Unit Distribution boxes must be protected with DD Form 2923‚ dated December 2006 (Privacy Act cover sheet) at all times. Access to distribution boxes is controlled and limited to those with authorized access. Ensure S-1/PAC Representative has authorization to pick up distribution documents by verifying his/her name on the Unit Access Roster (binder kept at the Processing and
Premium Security Computer security Information security
software‚ peopleware‚ network components. According to Zhenhui (2010)‚ information and communication technology (ICT) enabled the user to participate in a rapidly changing world in which work and other activities were increasingly transformed by access to varied and developing technologies. In addition as cited from the study of Castro et. al. (2012) Information and communication technology (ICT) is an umbrella term that includes any communication device or application‚ encompassing radio‚ television
Premium Data Library Access control
increasing popularity of the Internet‚ new technologies have introduced to provide secure access to the resources from remote clients. Virtual Private Networks are becoming the most universal method for remote access. They enable service provider to take advantage of the power of Internet by providing a private tunnel through the public cloud to realize cost savings and productivity enhancements from remote access applications. VPNs securely convey information across the Internet connection to remote
Premium Internet Information security Security
Service Request SR-rm-022 BSA/375 Eric Secrist David Beasley Service Request SR-RM-022 Hugh McCauley‚ the Chief Operations Officer of Riordan Manufacturing‚ has placed a service request‚ SR-rm-022 to integrate all existing Human Resources tools into a single integrated application across all plant locations. The business would like to take advantage of a more sophisticated‚ state-of-the-art‚ information systems technology to replace their current Human Resources Information System
Premium Software testing Requirements analysis Systems Development Life Cycle
Introduction The development of technology has brought Internet to become the mass communication media between people or companies. Through Internet‚ people can communicate with other people in various places. Companies can get many advantages by using Internet network to support their business. Therefore‚ companies are trying as hard as they can‚ and give high effort in protecting their network from attack and make sure that they have the best network security. Most people think that the threat
Premium Computer security Password Access control
operate as for-profit entities‚ are facing a multitude of challenges. The regulatory environment is becoming more restrictive‚ viruses and worms are growing more pervasive and damaging‚ and ABC Heathcare’s stakeholders are demanding more flexible access to their systems. The healthcare industry is experiencing significant regulatory pressures that mandate prudent information security and systems management practices. Furthermore‚ the continued pressure to reduce cost requires that management
Premium Security Computer security Information security
and employee manual‚ and discuss status during performance reviews. 2. Disgruntled employee sabotage. I. Track and monitor abnormal employee behavior‚ erratic job performance‚ and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on AUP monitoring and compliance. 3. Download of non-business videos using the internet to an employer-owned computer. A. Enable content filtering and antivirus scanning at the entry and exit points of the
Premium Virtual private network Data management Internet
ICT notes What is hardware?- components such as keyboards‚ monitors‚ a mouse the system unit‚ and external devices‚ such as a printer An input device is used for putting information into the computer‚ i.e. a keyboard‚ for imputing words and data. An output device would be a device‚ like a monitor‚ a monitor will display things to you. The types of computer- a microcomputer (PC) – a mainframe computer can be used by many people at a time‚ and is able to carry out intensive tasks. A minicomputer
Premium Smart card Access control Computer