SlideShare a Scribd company logo
1 of 5
A) Richman Investments requires the enforcement of strict
ingress-egress filtering policies for network traffic. Certain
traffic is expressly forbidden:
No peer-to-peer file sharing or externally reachable file
transfer protocol (FTP) servers
No downloading executables from known software sites
No unauthorized redistribution of licensed or copyrighted
material
No exporting internal software or technical material in
violation of export control laws
No
introduction
of malicious programs into networks or onto systems
No accessing unauthorized internal resources or information
from external sources
No port scanning or data interception on the network
No denying service or circumventing authentication to
legitimate users
No using programs, scripts, or commands to interfere with
other network users
No sending unsolicited email messages or junk mail to
company recipients
No accessing adult content from company resources
No remote connections from systems failing to meet minimum
security requirements
Building on the Internet and email use policy you created for
Richman in a previous assignment, define a LAN-to-WAN,
Internet, and web surfing AUP that restricts usage of the
company’s Internet connection and permits the company to
monitor usage of the corporate Internet connection. Carefully
evaluate the implications of the policy and how implementations
might impact the IT infrastructure, both positively and
negatively. Weigh the benefits and the disadvantages of each
method. Consider whether or not a proposed solution causes an
interruption to legitimate users and how it might enhance
security at the expense of preventing a perfectly legitimate
activity.
Required Resources
Internet access
Submission Requirements
Format: Microsoft Word or compatible
Font: Times New Romans 12-point, double-spaced
Citation Style: APA
Length: 1–2 pages
Self-Assessment Checklist
I defined an effective LAN-to-WAN, Internet, and web surfing
AUP.
I evaluated the implications of the policy.
I carefully considered the benefits and disadvantages of each
policy enforcement control.
I proposed strong ideas for acceptable and unacceptable
resource usage.
I followed the submission guidelines.
B) Enhance an Existing IT Security Policy Framework
Learning Objectives and Outcomes
§ Research standards.
§ Write a remote access standard.
§ Describe how procedures and guidelines fit within an IT
security policy framework.
Assignment Requirements
You will receive the text sheet entitled “Existing IT Security
Policy Framework.” It contains a scenario and an illustration of
a portion of a company's security policy framework. After
studying the text sheet, complete the following tasks:
1. Research remote access standards on the Internet. For the
given scenario, write a draft Remote Access Standard that will
reduce the occurrence of risks, threats, and vulnerabilities in the
Remote Access Domain of an IT infrastructure. Include the
minimum remote computer configurations, the use of anti-
malware software, and the secure virtual private network (VPN)
access in the Remote Access Standard.
2. Indicate the names of procedures or guidelines you would
add under the Remote Access Standard.
Required Resources
Text sheet: Existing IT Security Policy Framework
(ts_policyframework)
Internet access
Submission Requirements
Format: Microsoft Word or compatible
Font: Times New Romans 12-point, double-spaced
Citation Style: APA
Length: 1–2 pages
Self-Assessment Checklist
I wrote an appropriate Remote Access Standard, which includes
the minimum remote computer configurations, the use of anti-
malware software, and the secure VPN access.
I included the names of at least two procedures or guidelines
that would appear under the Remote Access Standard in the
framework.
I followed the submission guidelines.

More Related Content

Similar to A)  Richman Investments requires the enforcement of strict ingre.docx

Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxgriffinruthie22
 
Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security PoliciesAamir Sohail
 
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docxWeek 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docxcockekeshia
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)Mark Milburn
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET Journal
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comamaranthbeg113
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comamaranthbeg53
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comamaranthbeg73
 
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfDigital Auxilio Technologies
 
System analyst
System analystSystem analyst
System analystreturnasap
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Hassan EL ALLOUSSI
 
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docxRunning Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docxsusanschei
 
Review the course readings and the Red Clay Renovations company prof.docx
Review the course readings and the Red Clay Renovations company prof.docxReview the course readings and the Red Clay Renovations company prof.docx
Review the course readings and the Red Clay Renovations company prof.docxvickiea1
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public InvestigationsCTIN
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxTheWalkerGroup1
 

Similar to A)  Richman Investments requires the enforcement of strict ingre.docx (20)

Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
 
Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security Policies
 
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docxWeek 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
 
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdf
 
System analyst
System analystSystem analyst
System analyst
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
 
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docxRunning Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
 
Review the course readings and the Red Clay Renovations company prof.docx
Review the course readings and the Red Clay Renovations company prof.docxReview the course readings and the Red Clay Renovations company prof.docx
Review the course readings and the Red Clay Renovations company prof.docx
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docx
 

More from ronak56

According to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docxAccording to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docxronak56
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxronak56
 
According to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docxAccording to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docxronak56
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxronak56
 
According to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docxAccording to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docxronak56
 
According to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docxAccording to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docxronak56
 
According to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docxAccording to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docxronak56
 
According to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docxAccording to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docxronak56
 
According to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docxAccording to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docxronak56
 
According to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docxAccording to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docxronak56
 
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docxAccording to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docxronak56
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxronak56
 
According to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docxAccording to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docxronak56
 
According to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docxAccording to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docxronak56
 
According to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docxAccording to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docxronak56
 
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docxAccording to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docxronak56
 
According to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docxAccording to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docxronak56
 
According to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docxAccording to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docxronak56
 
According to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docxAccording to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docxronak56
 
Access the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docxAccess the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docxronak56
 

More from ronak56 (20)

According to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docxAccording to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docx
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
 
According to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docxAccording to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docx
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
 
According to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docxAccording to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docx
 
According to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docxAccording to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docx
 
According to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docxAccording to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docx
 
According to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docxAccording to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docx
 
According to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docxAccording to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docx
 
According to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docxAccording to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docx
 
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docxAccording to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
 
According to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docxAccording to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docx
 
According to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docxAccording to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docx
 
According to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docxAccording to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docx
 
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docxAccording to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
 
According to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docxAccording to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docx
 
According to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docxAccording to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docx
 
According to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docxAccording to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docx
 
Access the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docxAccess the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docx
 

Recently uploaded

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 

Recently uploaded (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

A)  Richman Investments requires the enforcement of strict ingre.docx

  • 1. A) Richman Investments requires the enforcement of strict ingress-egress filtering policies for network traffic. Certain traffic is expressly forbidden: No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers No downloading executables from known software sites No unauthorized redistribution of licensed or copyrighted material No exporting internal software or technical material in violation of export control laws No introduction of malicious programs into networks or onto systems No accessing unauthorized internal resources or information from external sources No port scanning or data interception on the network No denying service or circumventing authentication to legitimate users No using programs, scripts, or commands to interfere with other network users No sending unsolicited email messages or junk mail to company recipients
  • 2. No accessing adult content from company resources No remote connections from systems failing to meet minimum security requirements Building on the Internet and email use policy you created for Richman in a previous assignment, define a LAN-to-WAN, Internet, and web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of the policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to legitimate users and how it might enhance security at the expense of preventing a perfectly legitimate activity. Required Resources Internet access Submission Requirements Format: Microsoft Word or compatible Font: Times New Romans 12-point, double-spaced Citation Style: APA Length: 1–2 pages
  • 3. Self-Assessment Checklist I defined an effective LAN-to-WAN, Internet, and web surfing AUP. I evaluated the implications of the policy. I carefully considered the benefits and disadvantages of each policy enforcement control. I proposed strong ideas for acceptable and unacceptable resource usage. I followed the submission guidelines. B) Enhance an Existing IT Security Policy Framework Learning Objectives and Outcomes § Research standards. § Write a remote access standard. § Describe how procedures and guidelines fit within an IT security policy framework. Assignment Requirements You will receive the text sheet entitled “Existing IT Security Policy Framework.” It contains a scenario and an illustration of a portion of a company's security policy framework. After
  • 4. studying the text sheet, complete the following tasks: 1. Research remote access standards on the Internet. For the given scenario, write a draft Remote Access Standard that will reduce the occurrence of risks, threats, and vulnerabilities in the Remote Access Domain of an IT infrastructure. Include the minimum remote computer configurations, the use of anti- malware software, and the secure virtual private network (VPN) access in the Remote Access Standard. 2. Indicate the names of procedures or guidelines you would add under the Remote Access Standard. Required Resources Text sheet: Existing IT Security Policy Framework (ts_policyframework) Internet access Submission Requirements Format: Microsoft Word or compatible Font: Times New Romans 12-point, double-spaced Citation Style: APA Length: 1–2 pages Self-Assessment Checklist
  • 5. I wrote an appropriate Remote Access Standard, which includes the minimum remote computer configurations, the use of anti- malware software, and the secure VPN access. I included the names of at least two procedures or guidelines that would appear under the Remote Access Standard in the framework. I followed the submission guidelines.