• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  • Level: GCSE
  • Subject: ICT
  • Word count: 3836

Implementing Internet Access for a LAN.

Extracts from this document...

Introduction

Implementing Internet Access for a LAN TABLE OF CONTENTS Title Page ..... ..... .... i Table of Contents .... .... .... Ii INTRODUCTION .... .... .... 1 IMPLEMENTATION PLAN .... .... 3 * Background * Purpose * Project Life Cycle o Define o Discover o Design o Configure o Validate o Deploy INTERNET SECURITY POLICY .... .... 9 * Security Policy * Purpose * Guidelines o Inappropriate Use of resources o Unauthorised Access o Physical Security o Backups o Anti-Virus Process o Firewall security Measures INTERNET ACCEPTABLE USE POLICY .... 17 * Introduction * Policy Statements o Intellectual Property o Quality Control o Placement of Material o Improper Activities o E-Mail o Privacy o Public Representations o Comments o Access * Request Procedures .... .... 21 * Consequences of Violations .... .... 22 ACKNOWLEGEMENT FORM .... .... 23 INTRODUCTION In our changing society as companies vie to stay alive; many have begun redefining their business strategies, so as to make accessibility to global and internal information easier for their employees. In order that business provide superior services than their competitors, Human Resource professionals strongly believe, that is closely linked to people's attitude about work, the evolution of employment-related laws and sociological tends. They must recognise the dynamic relationship between strategy, people, technology and the processes that drive organisations. In so keeping, SAM's Paper Manufacturing Company Limited, in trying to manage the challenge facing today's organisations, change, given the rapid advances in technology, increased globalisation and the ever present need to assure quality service and contented workers, has proposed internet access for all workstation end users. As organisations grow and develop, external and internal pressures result in changing needs. Systems and practices must be organised so that they continue to fit an organisation as its needs changes. As a result, the strategic and implementation plans are the overall blueprints that define how an organisation will deploy its capital resources, budgetary resources, and technological resources in pursuit of its goal. ...read more.

Middle

. GUIDELINES The following are guidelines that should be followed in developing a security policy for the company, taking into the consideration the following. a) Firewalls b) The use of Antivirus products c) Configuration of Gateways FIREWALLS A firewall is not a single component; it is a strategy for protecting an organization's Internet-reachable resources. A firewall serves as the gatekeeper between the untrusted Internet and the more trusted internal networks. * They can block unwanted traffic. * They can direct incoming traffic to more trustworthy internal systems. * They hide vulnerable systems, which can't easily be secured from the Internet. * They can log traffic to and from the private network. * They can hide information like system names, network topology, network device types, and internal user ID's from the Internet. Our policy guide * Firewall Administrator A firewall, like any other network device, has to be managed by someone. Security policy should state who is responsible for managing the firewall. Two firewall administrators (one primary and secondary) shall be designated by the Chief Information Security Officer (or other manager,) and shall be responsible for the upkeep of the firewall. The primary administrator shall make changes to the firewall and the secondary shall only do so in the absence of the former so that there is no simultaneous or contradictory access to the firewall. Each firewall administrator shall provide their home phone number, pager number, cellular phone number and other numbers or codes in which they can be contacted when support is required. Security of a site is crucial to the day-to-day business activity of an organization. It is therefore required that the administrator of the firewall have a sound understanding of network concepts and implementation. For instance, since most firewalls are TCP/IP based, a thorough understanding of this protocol is compulsory. An individual that is assigned the task of firewall administration must have a good hands-on experience with networking concepts, design, and implementation so that the firewall is configured correctly and administered properly. ...read more.

Conclusion

Users must be aware of information technology security and other privacy concerns. Users must also be aware of and follow management directives for Internet usage. Internet services provided by the company are to be used only for authorized purposes. The restrictions outlined below regarding Internet use during official working hours and employees should follow non-working hours. SPECIFIC POLICY STATEMENTS * Intellectual Property of Others You may not download or use material from the Internet or elsewhere in violation of software licenses, or the copyright trademark and patent laws. You may not install or use any software obtained over the Internet without written permission from the Systems Administrator. All software downloaded via the Internet must be screened with virus detection software prior to being invoked. Whenever the provider of the software is not trusted, downloaded software should be tested on a stand-alone non-production machine. If this software contains a virus, worm, or Trojan horse, then the damage will be restricted to the involved machine. * Quality Control All information taken off the Internet should be considered suspect until confirmed by separate information from another source. There is no quality control process on the Internet, and a considerable amount of its information is outdated or inaccurate. Likewise, contacts made over the Internet should not be trusted with information unless a due diligence process has first been performed. This due diligence process also applies to the release of any internal information. * Placement of Material Users must not place SAM's Paper Manufacturing Company Ltd material (software, internal memos,) on any publicly accessible Internet computer that supports anonymous File Transfer Protocol (FTP) or similar services, unless the Director of Marketing has first approved the posting of these materials. In more general terms, SAM's internal information should not be placed in any location, on the Internet, unless the persons who have access to that location have a legitimate reason. * Improper Activities. You may not disseminate or knowingly receive harassing, sexually explicit, threatening or illegal information by use of Sam's facilities, including offensive jokes or cartoons. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    The original, inner IP header is unchanged except for the time to live number, which is decremented by 1. The outer header is a full IP header, while the inner header is identical to the original header. The big advantage of this technique is that the whole tunnel is considered a single hop from the original packet's point of view.

  2. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    * Generate sales and revenue from affiliate partners * Build up branding: Amazon.com obviously benefits from administering its huge network of affiliates. Since it benefits the Web site owner to sell books, and to get perceived credibility for offering this well-known bookstore's offerings, Amazon.com has signed thousands of affiliates.

  1. ICT IN ORGANIZATION

    * Manage and control production processes * Manage finance, including payroll, budgeting, processing transactions and reporting * Manage stock control * Market products and services efficiently. These points combined with sales, purchasing, finance and operations makes Tesco the success it is today.

  2. OCR GCSE Business & Communication Task 7 Report

    Legal Issues: Whilst completing my database I had to follow the Data Protection Act (1998). This act was introduced to enforce strict punishment towards frauds and copyright. I ensured I stayed within this law by protecting files included inside the database.

  1. Bussines and Communication Systems

    Real-time conversations can be held. It works by each person 'logging on' to the conference call. When you switch on your conference call device and enter your user ID number, an automatic voice saying something like "Mr Bob has joined the conference" is broadcast. Everyone says hello and carries on with the meeting.

  2. Strategic Management of Innovation.

    The birth of a Smart Phone with micro-browsers is the key to answering users needs to access the Internet via their wireless phones. Picture of the Wireless Market As the wireless web continues to mature, opportunities for growth are illustrated by notable levels of interest in wireless data services among key consumer segments.

  1. Does the Internet Protect or Affect Privacy.

    BENEFITS TO ORGANISATIONS The benefits of the Internet to organisations today can be said to be infinite depending on how the concept is approached and implemented by a given organisation in that, the Internet is fast becoming the major platform for electronic commerce and electronic business.

  2. Powerpoint technical Report

    pictures where exactly the same size and in the same positions so that the presentation looked professional and had a mature look; correct for my target audience. In some cases, I needed to crop images; to do this I did the following: 1)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work