Tuesday, May 5, 2020
Create an Internet and E-mail Acceptable Use Policy free essay sample
Learning Objectives and Outcomes Research and compare Internet and e-mail use policies enforced by other organizations. Create an Internet OR e-mail use policy for an organization. Assignment Requirements You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define ââ¬Å"the acceptable use of Richman assets regarding Internet and e-mail access,â⬠including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy. We will write a custom essay sample on Create an Internet and E-mail Acceptable Use Policy or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page For this assignment: Research Internet use policies on the Internet. Find the actual policies of real companies. Compare the portions that address Internet and e-mail access of at least three different companies. Create a simple Internet OR e-mail use policy for Richman Investments that defines the acceptable and unacceptable use of Internet and e-mail access at Richman. Go to the SANS website at http://www. sans. org/security-resources/policies/ to view sample policies. Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richmanââ¬â¢s to only use the internet for business only and business only sites. Employees can only check their business e-mail while at work where the incoming e-mails are secure. Under no circumstances may Company owned computers be used to obtain, view, or reach any immoral, unethical, or non-business sites. Doing so can lead to termination. Part 2: 10 points 1. Login at www. jblcourses. com 2. View the Lab 4: Lab Video 3. Open the Lab 4: Lab Manual to view the instructions for the lab. 4. Open the Lab 4: Assessment Worksheet Assignment. Complete the steps found in the Lab Manual. Record your answers in the Assessment Worksheet. UPLOAD THIS COMPLETED DOCUMENT AND THE ASSESSMENT WORKSHEET IN BLACKBOARD Part 3: 10 points Take screen prints after each step listed below: #12 #19 #28 #30 What items concern you in the scan results? Things that concered me in the scan results were the firewall was disabled, some accounts have non expiring passwords, incomplete software updates and more than two administrators.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.