• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  • Level: GCSE
  • Subject: ICT
  • Word count: 3836

Implementing Internet Access for a LAN.

Extracts from this document...


Implementing Internet Access for a LAN TABLE OF CONTENTS Title Page ..... ..... .... i Table of Contents .... .... .... Ii INTRODUCTION .... .... .... 1 IMPLEMENTATION PLAN .... .... 3 * Background * Purpose * Project Life Cycle o Define o Discover o Design o Configure o Validate o Deploy INTERNET SECURITY POLICY .... .... 9 * Security Policy * Purpose * Guidelines o Inappropriate Use of resources o Unauthorised Access o Physical Security o Backups o Anti-Virus Process o Firewall security Measures INTERNET ACCEPTABLE USE POLICY .... 17 * Introduction * Policy Statements o Intellectual Property o Quality Control o Placement of Material o Improper Activities o E-Mail o Privacy o Public Representations o Comments o Access * Request Procedures .... .... 21 * Consequences of Violations .... .... 22 ACKNOWLEGEMENT FORM .... .... 23 INTRODUCTION In our changing society as companies vie to stay alive; many have begun redefining their business strategies, so as to make accessibility to global and internal information easier for their employees. In order that business provide superior services than their competitors, Human Resource professionals strongly believe, that is closely linked to people's attitude about work, the evolution of employment-related laws and sociological tends. They must recognise the dynamic relationship between strategy, people, technology and the processes that drive organisations. In so keeping, SAM's Paper Manufacturing Company Limited, in trying to manage the challenge facing today's organisations, change, given the rapid advances in technology, increased globalisation and the ever present need to assure quality service and contented workers, has proposed internet access for all workstation end users. As organisations grow and develop, external and internal pressures result in changing needs. Systems and practices must be organised so that they continue to fit an organisation as its needs changes. As a result, the strategic and implementation plans are the overall blueprints that define how an organisation will deploy its capital resources, budgetary resources, and technological resources in pursuit of its goal. ...read more.


. GUIDELINES The following are guidelines that should be followed in developing a security policy for the company, taking into the consideration the following. a) Firewalls b) The use of Antivirus products c) Configuration of Gateways FIREWALLS A firewall is not a single component; it is a strategy for protecting an organization's Internet-reachable resources. A firewall serves as the gatekeeper between the untrusted Internet and the more trusted internal networks. * They can block unwanted traffic. * They can direct incoming traffic to more trustworthy internal systems. * They hide vulnerable systems, which can't easily be secured from the Internet. * They can log traffic to and from the private network. * They can hide information like system names, network topology, network device types, and internal user ID's from the Internet. Our policy guide * Firewall Administrator A firewall, like any other network device, has to be managed by someone. Security policy should state who is responsible for managing the firewall. Two firewall administrators (one primary and secondary) shall be designated by the Chief Information Security Officer (or other manager,) and shall be responsible for the upkeep of the firewall. The primary administrator shall make changes to the firewall and the secondary shall only do so in the absence of the former so that there is no simultaneous or contradictory access to the firewall. Each firewall administrator shall provide their home phone number, pager number, cellular phone number and other numbers or codes in which they can be contacted when support is required. Security of a site is crucial to the day-to-day business activity of an organization. It is therefore required that the administrator of the firewall have a sound understanding of network concepts and implementation. For instance, since most firewalls are TCP/IP based, a thorough understanding of this protocol is compulsory. An individual that is assigned the task of firewall administration must have a good hands-on experience with networking concepts, design, and implementation so that the firewall is configured correctly and administered properly. ...read more.


Users must be aware of information technology security and other privacy concerns. Users must also be aware of and follow management directives for Internet usage. Internet services provided by the company are to be used only for authorized purposes. The restrictions outlined below regarding Internet use during official working hours and employees should follow non-working hours. SPECIFIC POLICY STATEMENTS * Intellectual Property of Others You may not download or use material from the Internet or elsewhere in violation of software licenses, or the copyright trademark and patent laws. You may not install or use any software obtained over the Internet without written permission from the Systems Administrator. All software downloaded via the Internet must be screened with virus detection software prior to being invoked. Whenever the provider of the software is not trusted, downloaded software should be tested on a stand-alone non-production machine. If this software contains a virus, worm, or Trojan horse, then the damage will be restricted to the involved machine. * Quality Control All information taken off the Internet should be considered suspect until confirmed by separate information from another source. There is no quality control process on the Internet, and a considerable amount of its information is outdated or inaccurate. Likewise, contacts made over the Internet should not be trusted with information unless a due diligence process has first been performed. This due diligence process also applies to the release of any internal information. * Placement of Material Users must not place SAM's Paper Manufacturing Company Ltd material (software, internal memos,) on any publicly accessible Internet computer that supports anonymous File Transfer Protocol (FTP) or similar services, unless the Director of Marketing has first approved the posting of these materials. In more general terms, SAM's internal information should not be placed in any location, on the Internet, unless the persons who have access to that location have a legitimate reason. * Improper Activities. You may not disseminate or knowingly receive harassing, sexually explicit, threatening or illegal information by use of Sam's facilities, including offensive jokes or cartoons. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    The original, inner IP header is unchanged except for the time to live number, which is decremented by 1. The outer header is a full IP header, while the inner header is identical to the original header. The big advantage of this technique is that the whole tunnel is considered a single hop from the original packet's point of view.

  2. MUJI - company overview

    is damaged, we can return to any of the store together with the receipt within 28 days from the day of purchase for refund or exchange for another product. . For the media, Muji put an advertisement on the Evening Standard, Odd Newspaper and the telephone box.

  1. Report On Communication Systems To the Board of Directors of Cadburys

    However the numbers needed are limited and Tele-working can be probably be introduced to others. Production workers should be offered redundancy terms and immediate steps should be taken to recruit staff at the new site. It might be worthwhile to use an agency.

  2. ICT Systems in Everyday Life: Your Local Community

    Coupled with the fact that wireless units make for much easier installation, it should come as no wonder that more and more people are choosing to go wireless for their security camera needs.

  1. special needs

    This maintains great communication at the relaxation of her very own armchair and is an extremely easier procedure. This precludes her from going out on her wheelchair and posting letters to friends, which can be intricate for an individual facing physical disability.

  2. Information Security.

    The need to hide the content of a written message must therefore have been realized very soon, and there is evidence that codes and ciphers appeared almost with the beginning of writing. Such varied data security problems a from the more resent advances in information technology - large stores and microprocessors which give us processing wherever we need it.

  1. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    Based on the responses of the visitors, SK-II can recommend the product line that is suitable for their needs. (e.g. products tailored for dry/oily skins). Based on the information collected from the (potential) customers, SK-II can also peronalize the e-mails advertisement (product/service catalog)

  2. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    Transaction at Supplier site Transaction at customer site This diagram shows the representation of online purchase. Source: This diagram was adapted from: (Smith and Chaffey 2002, p.48) The place in the digital arena is absolutely vital, due to technological changes new ideas have occurred in the online world of distribution.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work