• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  • Level: GCSE
  • Subject: ICT
  • Word count: 3836

Implementing Internet Access for a LAN.

Extracts from this document...

Introduction

Implementing Internet Access for a LAN TABLE OF CONTENTS Title Page ..... ..... .... i Table of Contents .... .... .... Ii INTRODUCTION .... .... .... 1 IMPLEMENTATION PLAN .... .... 3 * Background * Purpose * Project Life Cycle o Define o Discover o Design o Configure o Validate o Deploy INTERNET SECURITY POLICY .... .... 9 * Security Policy * Purpose * Guidelines o Inappropriate Use of resources o Unauthorised Access o Physical Security o Backups o Anti-Virus Process o Firewall security Measures INTERNET ACCEPTABLE USE POLICY .... 17 * Introduction * Policy Statements o Intellectual Property o Quality Control o Placement of Material o Improper Activities o E-Mail o Privacy o Public Representations o Comments o Access * Request Procedures .... .... 21 * Consequences of Violations .... .... 22 ACKNOWLEGEMENT FORM .... .... 23 INTRODUCTION In our changing society as companies vie to stay alive; many have begun redefining their business strategies, so as to make accessibility to global and internal information easier for their employees. In order that business provide superior services than their competitors, Human Resource professionals strongly believe, that is closely linked to people's attitude about work, the evolution of employment-related laws and sociological tends. They must recognise the dynamic relationship between strategy, people, technology and the processes that drive organisations. In so keeping, SAM's Paper Manufacturing Company Limited, in trying to manage the challenge facing today's organisations, change, given the rapid advances in technology, increased globalisation and the ever present need to assure quality service and contented workers, has proposed internet access for all workstation end users. As organisations grow and develop, external and internal pressures result in changing needs. Systems and practices must be organised so that they continue to fit an organisation as its needs changes. As a result, the strategic and implementation plans are the overall blueprints that define how an organisation will deploy its capital resources, budgetary resources, and technological resources in pursuit of its goal. ...read more.

Middle

. GUIDELINES The following are guidelines that should be followed in developing a security policy for the company, taking into the consideration the following. a) Firewalls b) The use of Antivirus products c) Configuration of Gateways FIREWALLS A firewall is not a single component; it is a strategy for protecting an organization's Internet-reachable resources. A firewall serves as the gatekeeper between the untrusted Internet and the more trusted internal networks. * They can block unwanted traffic. * They can direct incoming traffic to more trustworthy internal systems. * They hide vulnerable systems, which can't easily be secured from the Internet. * They can log traffic to and from the private network. * They can hide information like system names, network topology, network device types, and internal user ID's from the Internet. Our policy guide * Firewall Administrator A firewall, like any other network device, has to be managed by someone. Security policy should state who is responsible for managing the firewall. Two firewall administrators (one primary and secondary) shall be designated by the Chief Information Security Officer (or other manager,) and shall be responsible for the upkeep of the firewall. The primary administrator shall make changes to the firewall and the secondary shall only do so in the absence of the former so that there is no simultaneous or contradictory access to the firewall. Each firewall administrator shall provide their home phone number, pager number, cellular phone number and other numbers or codes in which they can be contacted when support is required. Security of a site is crucial to the day-to-day business activity of an organization. It is therefore required that the administrator of the firewall have a sound understanding of network concepts and implementation. For instance, since most firewalls are TCP/IP based, a thorough understanding of this protocol is compulsory. An individual that is assigned the task of firewall administration must have a good hands-on experience with networking concepts, design, and implementation so that the firewall is configured correctly and administered properly. ...read more.

Conclusion

Users must be aware of information technology security and other privacy concerns. Users must also be aware of and follow management directives for Internet usage. Internet services provided by the company are to be used only for authorized purposes. The restrictions outlined below regarding Internet use during official working hours and employees should follow non-working hours. SPECIFIC POLICY STATEMENTS * Intellectual Property of Others You may not download or use material from the Internet or elsewhere in violation of software licenses, or the copyright trademark and patent laws. You may not install or use any software obtained over the Internet without written permission from the Systems Administrator. All software downloaded via the Internet must be screened with virus detection software prior to being invoked. Whenever the provider of the software is not trusted, downloaded software should be tested on a stand-alone non-production machine. If this software contains a virus, worm, or Trojan horse, then the damage will be restricted to the involved machine. * Quality Control All information taken off the Internet should be considered suspect until confirmed by separate information from another source. There is no quality control process on the Internet, and a considerable amount of its information is outdated or inaccurate. Likewise, contacts made over the Internet should not be trusted with information unless a due diligence process has first been performed. This due diligence process also applies to the release of any internal information. * Placement of Material Users must not place SAM's Paper Manufacturing Company Ltd material (software, internal memos,) on any publicly accessible Internet computer that supports anonymous File Transfer Protocol (FTP) or similar services, unless the Director of Marketing has first approved the posting of these materials. In more general terms, SAM's internal information should not be placed in any location, on the Internet, unless the persons who have access to that location have a legitimate reason. * Improper Activities. You may not disseminate or knowingly receive harassing, sexually explicit, threatening or illegal information by use of Sam's facilities, including offensive jokes or cartoons. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    The original, inner IP header is unchanged except for the time to live number, which is decremented by 1. The outer header is a full IP header, while the inner header is identical to the original header. The big advantage of this technique is that the whole tunnel is considered a single hop from the original packet's point of view.

  2. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    * Use a free reward, invitation, report, discount, or coupon. 6.3.3 Managing Affiliates13 After acquiring the affiliates, we need to keep track on the program to make sure the strategy is up-to-date and appropriate to the current situation There are several guidelines that need to be followed: * Set up

  1. The main Internet technologies.

    This could be useful for disabled or old people who may not be able to get out of their place of living but want to interact with other people. Some Disadvantages of the Internet, Intranet / World Wide Web: * It can be expensive to set up the Internet and be online, especially for businesses.

  2. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    The Internet offers many advantages and some disadvantages as an alternative promotional medium. Businesses are also using traditional advertising channel magazines, newspapers and radio etc. (Chaffey and Mayer 2000, pp.41) and (Reuters Business Insight 2000, pp.26) In terms of attractiveness, online advertising offers marketers benefits beyond those offered by traditional media.

  1. OCR GCSE Business & Communication Task 7 Report

    I wanted to learn how to use a business-like database and associate myself with producing one which incorporated many clients. If I was to change something, I would try to involve a wider variety of client from my own files which were included.

  2. Bussines and Communication Systems

    Real-time conversations can be held. It works by each person 'logging on' to the conference call. When you switch on your conference call device and enter your user ID number, an automatic voice saying something like "Mr Bob has joined the conference" is broadcast. Everyone says hello and carries on with the meeting.

  1. Strategic Management of Innovation.

    The ever-increasing use of hand held devices that also can use wireless technology to access the Internet are an integral part of a user's personal organizational management system. Rather than use their wireless phone, users often would download email and access the Internet via their handheld devices.

  2. Internet Protocol V6

    = actual path of PDUs. TCP/UDP = transmission control protocol/user datagram protocol. PDU = protocol data unit. IP = internet protocol. LP = link protocol. PL = physical layer. Ipv4 Addressing and its Limitations As mentioned earlier, each host that communicates over the Internet has a unique Internet wide address assigned to it.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work