• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  • Level: GCSE
  • Subject: ICT
  • Word count: 3836

Implementing Internet Access for a LAN.

Extracts from this document...

Introduction

Implementing Internet Access for a LAN TABLE OF CONTENTS Title Page ..... ..... .... i Table of Contents .... .... .... Ii INTRODUCTION .... .... .... 1 IMPLEMENTATION PLAN .... .... 3 * Background * Purpose * Project Life Cycle o Define o Discover o Design o Configure o Validate o Deploy INTERNET SECURITY POLICY .... .... 9 * Security Policy * Purpose * Guidelines o Inappropriate Use of resources o Unauthorised Access o Physical Security o Backups o Anti-Virus Process o Firewall security Measures INTERNET ACCEPTABLE USE POLICY .... 17 * Introduction * Policy Statements o Intellectual Property o Quality Control o Placement of Material o Improper Activities o E-Mail o Privacy o Public Representations o Comments o Access * Request Procedures .... .... 21 * Consequences of Violations .... .... 22 ACKNOWLEGEMENT FORM .... .... 23 INTRODUCTION In our changing society as companies vie to stay alive; many have begun redefining their business strategies, so as to make accessibility to global and internal information easier for their employees. In order that business provide superior services than their competitors, Human Resource professionals strongly believe, that is closely linked to people's attitude about work, the evolution of employment-related laws and sociological tends. They must recognise the dynamic relationship between strategy, people, technology and the processes that drive organisations. In so keeping, SAM's Paper Manufacturing Company Limited, in trying to manage the challenge facing today's organisations, change, given the rapid advances in technology, increased globalisation and the ever present need to assure quality service and contented workers, has proposed internet access for all workstation end users. As organisations grow and develop, external and internal pressures result in changing needs. Systems and practices must be organised so that they continue to fit an organisation as its needs changes. As a result, the strategic and implementation plans are the overall blueprints that define how an organisation will deploy its capital resources, budgetary resources, and technological resources in pursuit of its goal. ...read more.

Middle

. GUIDELINES The following are guidelines that should be followed in developing a security policy for the company, taking into the consideration the following. a) Firewalls b) The use of Antivirus products c) Configuration of Gateways FIREWALLS A firewall is not a single component; it is a strategy for protecting an organization's Internet-reachable resources. A firewall serves as the gatekeeper between the untrusted Internet and the more trusted internal networks. * They can block unwanted traffic. * They can direct incoming traffic to more trustworthy internal systems. * They hide vulnerable systems, which can't easily be secured from the Internet. * They can log traffic to and from the private network. * They can hide information like system names, network topology, network device types, and internal user ID's from the Internet. Our policy guide * Firewall Administrator A firewall, like any other network device, has to be managed by someone. Security policy should state who is responsible for managing the firewall. Two firewall administrators (one primary and secondary) shall be designated by the Chief Information Security Officer (or other manager,) and shall be responsible for the upkeep of the firewall. The primary administrator shall make changes to the firewall and the secondary shall only do so in the absence of the former so that there is no simultaneous or contradictory access to the firewall. Each firewall administrator shall provide their home phone number, pager number, cellular phone number and other numbers or codes in which they can be contacted when support is required. Security of a site is crucial to the day-to-day business activity of an organization. It is therefore required that the administrator of the firewall have a sound understanding of network concepts and implementation. For instance, since most firewalls are TCP/IP based, a thorough understanding of this protocol is compulsory. An individual that is assigned the task of firewall administration must have a good hands-on experience with networking concepts, design, and implementation so that the firewall is configured correctly and administered properly. ...read more.

Conclusion

Users must be aware of information technology security and other privacy concerns. Users must also be aware of and follow management directives for Internet usage. Internet services provided by the company are to be used only for authorized purposes. The restrictions outlined below regarding Internet use during official working hours and employees should follow non-working hours. SPECIFIC POLICY STATEMENTS * Intellectual Property of Others You may not download or use material from the Internet or elsewhere in violation of software licenses, or the copyright trademark and patent laws. You may not install or use any software obtained over the Internet without written permission from the Systems Administrator. All software downloaded via the Internet must be screened with virus detection software prior to being invoked. Whenever the provider of the software is not trusted, downloaded software should be tested on a stand-alone non-production machine. If this software contains a virus, worm, or Trojan horse, then the damage will be restricted to the involved machine. * Quality Control All information taken off the Internet should be considered suspect until confirmed by separate information from another source. There is no quality control process on the Internet, and a considerable amount of its information is outdated or inaccurate. Likewise, contacts made over the Internet should not be trusted with information unless a due diligence process has first been performed. This due diligence process also applies to the release of any internal information. * Placement of Material Users must not place SAM's Paper Manufacturing Company Ltd material (software, internal memos,) on any publicly accessible Internet computer that supports anonymous File Transfer Protocol (FTP) or similar services, unless the Director of Marketing has first approved the posting of these materials. In more general terms, SAM's internal information should not be placed in any location, on the Internet, unless the persons who have access to that location have a legitimate reason. * Improper Activities. You may not disseminate or knowingly receive harassing, sexually explicit, threatening or illegal information by use of Sam's facilities, including offensive jokes or cartoons. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    The original, inner IP header is unchanged except for the time to live number, which is decremented by 1. The outer header is a full IP header, while the inner header is identical to the original header. The big advantage of this technique is that the whole tunnel is considered a single hop from the original packet's point of view.

  2. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    More importantly, Amazon.com developed a whole brand through this strategy. 6.3.2 Building Affiliates The most important point on the affiliate program is to understand the clients' interests, so we are based on this criteria to identify the most valuable affiliate partners.

  1. The main Internet technologies.

    * There are undesirable sites, which can be distressing, disturbing and offensive for people. * Intranets have Security issues: They need to be well protected (usually with a firewall) to allow access to authorised users only. They still need to be set up and maintained, so cost issues are not negligible.

  2. My research concerned how the Internet could be used to help people who were ...

    Designing the Web site for NAADV has helped me formulate my question: how can the Internet be used to help women who experience domestic violence? To prepare the research setting for my question, I interviewed my clients, representatives of domestic violence organisations that have a Web presence and women whom the Internet has helped.

  1. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    Such developments will increase the use of the Internet. * Email could also be used Subscription emails, manufacturers collect personal information from competition and web site registrations, and send direct mails with information that is relevance to them. Emails also allow the use of viral marketing whereby consumers pass information on to friend's etc.

  2. special needs

    Thus, MS word keeps Maria socialising without possible hurdles coming in her way. Maria Korelli's- Professional use of MS word Maria's professional uses of MS word are too input and communicate information at her work placement. She works as a receptionist which requires less moving about.

  1. WHAT DO YOU GENERALLY LIKE DOING AT THE WEEKENDS?

    MENTION 3 ENVENTIONS THAT HAVE CHANGED YOUR LIFE RECENTLY. I think that the biggest enventions that have changed my life are: the Internet, mobile phone and credit card. Some years ago people lived without them but they can't hardly imagine how this could be.

  2. Production Log.

    Britain, America etc. I have also looked at audience behaviour theories to help me identify the requirements or wants of my target audience. I have used Maslow's hierarchy of needs, I can learn what my web site must offer [people if its is to be a success.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work