• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  • Level: GCSE
  • Subject: ICT
  • Word count: 3836

Implementing Internet Access for a LAN.

Extracts from this document...

Introduction

Implementing Internet Access for a LAN TABLE OF CONTENTS Title Page ..... ..... .... i Table of Contents .... .... .... Ii INTRODUCTION .... .... .... 1 IMPLEMENTATION PLAN .... .... 3 * Background * Purpose * Project Life Cycle o Define o Discover o Design o Configure o Validate o Deploy INTERNET SECURITY POLICY .... .... 9 * Security Policy * Purpose * Guidelines o Inappropriate Use of resources o Unauthorised Access o Physical Security o Backups o Anti-Virus Process o Firewall security Measures INTERNET ACCEPTABLE USE POLICY .... 17 * Introduction * Policy Statements o Intellectual Property o Quality Control o Placement of Material o Improper Activities o E-Mail o Privacy o Public Representations o Comments o Access * Request Procedures .... .... 21 * Consequences of Violations .... .... 22 ACKNOWLEGEMENT FORM .... .... 23 INTRODUCTION In our changing society as companies vie to stay alive; many have begun redefining their business strategies, so as to make accessibility to global and internal information easier for their employees. In order that business provide superior services than their competitors, Human Resource professionals strongly believe, that is closely linked to people's attitude about work, the evolution of employment-related laws and sociological tends. They must recognise the dynamic relationship between strategy, people, technology and the processes that drive organisations. In so keeping, SAM's Paper Manufacturing Company Limited, in trying to manage the challenge facing today's organisations, change, given the rapid advances in technology, increased globalisation and the ever present need to assure quality service and contented workers, has proposed internet access for all workstation end users. As organisations grow and develop, external and internal pressures result in changing needs. Systems and practices must be organised so that they continue to fit an organisation as its needs changes. As a result, the strategic and implementation plans are the overall blueprints that define how an organisation will deploy its capital resources, budgetary resources, and technological resources in pursuit of its goal. ...read more.

Middle

. GUIDELINES The following are guidelines that should be followed in developing a security policy for the company, taking into the consideration the following. a) Firewalls b) The use of Antivirus products c) Configuration of Gateways FIREWALLS A firewall is not a single component; it is a strategy for protecting an organization's Internet-reachable resources. A firewall serves as the gatekeeper between the untrusted Internet and the more trusted internal networks. * They can block unwanted traffic. * They can direct incoming traffic to more trustworthy internal systems. * They hide vulnerable systems, which can't easily be secured from the Internet. * They can log traffic to and from the private network. * They can hide information like system names, network topology, network device types, and internal user ID's from the Internet. Our policy guide * Firewall Administrator A firewall, like any other network device, has to be managed by someone. Security policy should state who is responsible for managing the firewall. Two firewall administrators (one primary and secondary) shall be designated by the Chief Information Security Officer (or other manager,) and shall be responsible for the upkeep of the firewall. The primary administrator shall make changes to the firewall and the secondary shall only do so in the absence of the former so that there is no simultaneous or contradictory access to the firewall. Each firewall administrator shall provide their home phone number, pager number, cellular phone number and other numbers or codes in which they can be contacted when support is required. Security of a site is crucial to the day-to-day business activity of an organization. It is therefore required that the administrator of the firewall have a sound understanding of network concepts and implementation. For instance, since most firewalls are TCP/IP based, a thorough understanding of this protocol is compulsory. An individual that is assigned the task of firewall administration must have a good hands-on experience with networking concepts, design, and implementation so that the firewall is configured correctly and administered properly. ...read more.

Conclusion

Users must be aware of information technology security and other privacy concerns. Users must also be aware of and follow management directives for Internet usage. Internet services provided by the company are to be used only for authorized purposes. The restrictions outlined below regarding Internet use during official working hours and employees should follow non-working hours. SPECIFIC POLICY STATEMENTS * Intellectual Property of Others You may not download or use material from the Internet or elsewhere in violation of software licenses, or the copyright trademark and patent laws. You may not install or use any software obtained over the Internet without written permission from the Systems Administrator. All software downloaded via the Internet must be screened with virus detection software prior to being invoked. Whenever the provider of the software is not trusted, downloaded software should be tested on a stand-alone non-production machine. If this software contains a virus, worm, or Trojan horse, then the damage will be restricted to the involved machine. * Quality Control All information taken off the Internet should be considered suspect until confirmed by separate information from another source. There is no quality control process on the Internet, and a considerable amount of its information is outdated or inaccurate. Likewise, contacts made over the Internet should not be trusted with information unless a due diligence process has first been performed. This due diligence process also applies to the release of any internal information. * Placement of Material Users must not place SAM's Paper Manufacturing Company Ltd material (software, internal memos,) on any publicly accessible Internet computer that supports anonymous File Transfer Protocol (FTP) or similar services, unless the Director of Marketing has first approved the posting of these materials. In more general terms, SAM's internal information should not be placed in any location, on the Internet, unless the persons who have access to that location have a legitimate reason. * Improper Activities. You may not disseminate or knowingly receive harassing, sexually explicit, threatening or illegal information by use of Sam's facilities, including offensive jokes or cartoons. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    The original, inner IP header is unchanged except for the time to live number, which is decremented by 1. The outer header is a full IP header, while the inner header is identical to the original header. The big advantage of this technique is that the whole tunnel is considered a single hop from the original packet's point of view.

  2. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    More importantly, Amazon.com developed a whole brand through this strategy. 6.3.2 Building Affiliates The most important point on the affiliate program is to understand the clients' interests, so we are based on this criteria to identify the most valuable affiliate partners.

  1. OCR GCSE Business & Communication Task 7 Report

    Problems: When completing my email response, I had to ensure I was focused as I made the mistake of incorrectly typing in the email address. This could result in private information being passed out to unconfident parties, therefore being miss-used and going against The Data Protection Act (1998).

  2. ICT IN ORGANIZATION

    * Manage and control production processes * Manage finance, including payroll, budgeting, processing transactions and reporting * Manage stock control * Market products and services efficiently. These points combined with sales, purchasing, finance and operations makes Tesco the success it is today.

  1. Bussines and Communication Systems

    o You can all view a document on the screen at the same time. People can work together and add their ideas. The document can be emailed to all of the people at the meeting later on. o Ideas and knowledge can be communicated between all those at the meeting very quickly and responses gathered.

  2. Strategic Management of Innovation.

    Groups expressing the greatest desire for new features and services are heavy users, business users, members of upper-income households, and professionals and managers. New users are slightly more likely than are longtime users to want more services. The groups expressing interest in wireless Internet phones are 18 to 34 year-olds,

  1. Powerpoint technical Report

    pictures where exactly the same size and in the same positions so that the presentation looked professional and had a mature look; correct for my target audience. In some cases, I needed to crop images; to do this I did the following: 1)

  2. ICT Systems in Everyday Life: Your Local Community

    Public and private CCTV schemes can be deployed for a number of reasons: * Monitoring public areas to detect incidents and to co-ordinate police responses. CCTV is also used as an aid for enforcing exclusion orders (where an offender is barred from an area).

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work