+1-415-670-9189
info@expertsmind.com
Explain policies and procedures that will be used on network
Course:- Computer Network Security
Reference No.:- EM131267265




Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Network Security

Topic 12: Network Access Security

This is a "role-playing" activity. You are the network administrator for a small company (you can come up with your own name). Create a memo to the company employees (1 to 3 pages) that describes the policies and procedures that will be used on the network. Write your memo so that it describes what the employees must do, and what the employees are not allowed to do. Include policy items for passwords (e.g. required format and change frequency), web browsing, permitted software applications, personal devices, and remote access.

Your document should be written at a readability level which includes employees who are not highly computer literate (employees must be able to understand your rules if you expect them to abide by them).

Your may use external sources to research information for your document, but be sure to include references at the end.




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnec
Suppose you are an internal investigator for a large software development company. The Human Resources Department has requested you investigate the accusations that one empl
Epidemiological data and operational information about outbreaks is dynamic and changes rapidly. I have to develop a comprehensive Event Management System to manage critical
Project: Prepare a Local IT Security Policy- In Project 1, you developed an outline for an enterprise level IT security policy. In this project, you will write an IT security
Describe 802.1x authentication and the steps that when a wireless client connects to a network using RADIUS server for authentication and Explain the PEAP protocol - how does
Suppose you are also in charge of securing your organization's data. Identify at least two (2) data security measures that you believe are necessary to prevent data security
Implement a secure network infrastructure for a commercial LAN or WAN environment - Understand the impact on the social and commercial environment of network security design
Create a memo to the company employees that describes the policies and procedures that will be used on the network. Write your memo so that it describes what the employees m