This website uses cookies to ensure you have the best experience. Learn more

It255 Unit 3 Assignment 1

1270 words - 6 pages

H. Underwood
IT255
4/8/13
UNIT 3: Assignment: 1
Remote Access Control Policy

1.0 Purpose
The purpose of this policy is to define standards for connecting to Richman Investment’s network from any host. These standards are designed to minimize the potential exposure of Richman Investment’s to damages which may result from unauthorized use of Richman Investment’s resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to Richman Investment’s internal systems, etc.
2.0 Scope
This policy applies to all of Richman Investment’s employees, contractors, vendors and agents with a Richman Investment’s owned or ...view middle of the document...

3. Please review the following policies for details of protecting information when accessing the corporate network via remote access methods, and acceptable use of Richman Investment’s network:
a. Acceptable Encryption Policy
b. Virtual Private Network (VPN) Policy
c. Wireless Communications Policy
d. Acceptable Use Policy
4. For additional information regarding <Company Name>'s remote access connection options, including how to order or disconnect service, cost comparisons, troubleshooting, etc., go to the Remote Access Services website.
3.2 Requirements1. Secure remote access must be strictly controlled. Control will be enforced via one-time password authentication or public/private keys with strong pass-phrases. For information on creating a strong pass-phrase see the Password Policy.
2. At no time should any Richman Investment’s employee provide their login or email password to anyone, not even family members.
3. Richman Investment’s employees and contractors with remote access privileges must ensure that their Richman Investment’s -owned or personal computer or workstation, which is remotely connected to Richman Investment’s corporate network, is not connected to any other network at the same time, with the exception of personal networks that are under the complete control of the user.
4. Richman Investment’s employees and contractors with remote access privileges to Richman Investment’s corporate network must not use non- Richman Investment’s email accounts(i.e., Gmail, Hotmail, Yahoo, AOL), or other external resources to conduct Richman Investment’s business, thereby ensuring that official business is never confused with personal business.
5. Routers for dedicated ISDN lines configured for access to the Richman Investment’s network must meet minimum authentication requirements of CHAP.
6. Reconfiguration of a home user's equipment for the purpose of split-tunneling or dual homing is not permitted at any time.
7. Frame Relay must meet minimum authentication requirements of DLCI standards.
8. Non-standard hardware configurations must be approved by Remote Access Services, and Info Sec must approve security configurations for access to hardware.
9. All hosts that are connected to Richman Investment’s internal networks via remote access technologies must use the most up-to-date anti-virus software (place URL to corporate software site here), this includes personal computers. Third party connections must comply with requirements as stated in the Third Party Agreement.
10. Personal equipment that is used to connect to Richman Investment’s networks must meet the requirements of Richman Investment’s -owned equipment for remote access.
11. Organizations or individuals who wish to implement non-standard Remote Access solutions to the Richman Investment’s production network must obtain prior approval from Remote Access Services and InfoSec.
4.0 Enforcement
Any employee found to have violated this policy may be subject to...

Other Essays Like It255 Unit 3 Assignment 1

Unit 4 Assignment 1

1197 words - 5 pages  IS4670 Cybercrime Forensics Unit 4 Assignment 1 Identify Chain of Custody Roles and Requirements Chain Of Custody What is chain of custody? Chain of custody is the documentation that identifies the changes in the control, handling, possession, ownership, or custody of a piece of evidence. It’s very important to maintain a chain of custody for evidence especially computer evidence. You must be able to keep track of

Unit 14 Assignment 1

2804 words - 12 pages Natasha Brown Unit 14 Physiological Disorders Sharon Meadows Contents Physiological disorders, diagnosis and the investigation required to diagnose them. In this assignment I will have an opportunity to provide evidence against the following criteria. P1 – explain the nature of two named physiological disorders. P2 – explain the signs and symptoms related to two names physiological disorders. P3 – Describe the

Is3120 Unit 1 Assignment 1

792 words - 4 pages Unit 1 Assignment 1 Effects of Routing on Current Communication Methods Used by organizations IS3120 Unit 1 assignment 1 Effects of Routing on Current Communication Methods Used by Organizations Communicating to the consumer is the key element in a successful business. Due to a fast paced world there are modernized techniques that all companies need to adapt and implement when it comes to marketing. There is several ways a company

Level 3 Hsc Unit 1

623 words - 3 pages Unit 9 Outcome 1 1. The right to confidentiality is partly covered by the data protection act 1998, the human rights act 1998 and principles established by common law. The data protection act sets out eight principles which are basically a code of practice for processing personal data, my workplace policies and procedures are based around these legislations. The human rights act 1998 details within the act the right to a private life, there

Stonebridge Assignment 1 Level 3

821 words - 4 pages periods were both ages of extremes with many vastly different styles, number of forces such as large scale pieces to solo pieces, and places to perform (Concert hall, the home) Example introductions for you to adapt. 1. Although nearly four centuries separate the composition of the earliest and latest works in this question, there are remarkable similarities in approaches to both melody and texture. 2. This selection of works provides the

Unit 29 Understanding Retailing Assignment 3

736 words - 3 pages Unit 29 – Understanding Retailing Assignment 3 – Customer Service Task 2 John Lewis is a business that prides itself on having a high level of customer service. John Lewis’s customer service options are very good because they have put the customer’s needs as one of their main priorities. From this, they are able to help their customers and advise them on the best products to purchase. Their customer service options include: Face to

Kaplan Unit 3 Assignment for Marketing

695 words - 3 pages Unit 3 assignment paper. Please re word The Natural Baby Company Breyona Sharpnack Marketing AB219 Andrea Millazzo November 28, 2011 The Natural Baby Company offers quality organic baby items that support making eco-friendly lifestyle changes (NBC.2011). NBC started out as a diaper store by Kim and Duane Ormsby in 2003 (NBC.2011). Over time, they have expanded their business online, locally

Unit 8 Assignment 1 Video Summary 6

836 words - 4 pages Unit 8 Assignment 1 Video Summary 6 VIDEO #3.01 Topics: * Microsoft Operating Systems * Other Operating Systems Terms: * DOS – Disk Operating System is an acronym for several closely related operating systems that dominated the IBM PC compatible market between 1981 and 1995 * UNIX - is a family of multitasking, multiuser computer operating systems that derive from the original AT&T UNIX. * Command Line Interface

Unit 4 Assignment 1 P1 M1 D

1370 words - 6 pages Leah Dade Unit 4- Business Communications assignment (P1 M1 D1) Business information is used to pass on important information to people inside or outside the company. Marks and Spencer’s have used business information a lot in their company within the 130 years of existents. In M&S verbal information is used, which is where two or more people communicate face to face in either a formal or in-formal manure. Verbal Communication Verbal

Unit 6. Assignment 1. Ad User/Group Design Scenario

519 words - 3 pages Unit 6. Assignment 1. AD User/Group Design Scenario Course Objectives and Learning Outcomes In this assignment, you will recommend a strategy for creating groups. Assignment Requirments Review the following scenario: A junior IT administrator has been tasked with creation groups for a new formed division/s. From: Junior Admin To: IT Admin Subject: Print and Security Issues. I need to provide access to resources thoughout our AD

Unit 7 Assignment 1: Risk Management in a Business Model

4054 words - 17 pages Unit 7 Assignment 1: Risk Management in a Business Model Risk Management in a Business Model Declaration This report entitled the overview of understand the risk management functions in business, understand how business risk is assessed and managed, understand the effects of business risks and how they can be managed and understand approaches to crisis management and business continuity planning. The aim of this assignment is to raise

Related Papers

Unit 3 Assignment 1

606 words - 3 pages Unit 3 Assignment 1: Networking Models Review 1. Which of the following is true about a TCP/IP network? 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) A.D. 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) B.C. 4. Contrast an

Unit 3 Assignment 1: Fourth Amendment

929 words - 4 pages Unit 3 Assignment 1: Fourth Amendment IS3350 The United States Constitution affords all people certain rights. The Fifth Amendment states that we have the right against self-incrimination. The Fourth Amendment protects us from unreasonable search or seizure. People have the right to confront witnesses and accusers. Nothing can change these rights unless the U.S. constitutions was rewritten and that is not likely to happen. This paper will be

Unit 3 Assignment 1 Networking Models Review

613 words - 3 pages Networking Models Review (Unit 3) 1. Which of the following is true about a TCP/IP network? B 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) C & D 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) A & C 4. Contrast an international

Unit 1 Assignment 1

739 words - 3 pages Unit 1 Assignment 1 Exploring Programming Languages PT1420 Introduction to Programming Pong Sintaisong ITT-Tech Tempe Campus Instructor: Ms. Kate Eskesen 9/23/2015 5 Programming Languages 1970s-2000 1970s Pascal: Niklaus Wirth was is the invertor and was invented in 1971 Motivation: To provide features that were lacking in other languages at the time. Forth: Forth was created in 1970 by Charles H. Moore Motivation: He wanted to