Project #5019 - Introduction to Internet Security

  Task Type: Individual Project   Deliverable Length: 2 pages, double spaced   
Points Possible: 100   Due Date: 4/22/2013 11:59:59 PM  CT   

Weekly tasks or assignments (Individual or Group Projects) will be due by Monday and late submissions will be assigned a late penalty in accordance with the late penalty policy found in the syllabus. NOTE: All submission posting times are based on midnight Central Time.

Richman Investments requires the enforcement of strict ingress-egress filtering policies for network traffic. Certain traffic is expressly forbidden:

  • No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers
  • No downloading executables from known software sites
  • No unauthorized redistribution of licensed or copyrighted material
  • No exporting internal software or technical material in violation of export control laws
  • No introduction of malicious programs into networks or onto systems
  • No accessing unauthorized internal resources or information from external sources
  • No port scanning or data interception on the network
  • No denying service or circumventing authentication to legitimate users
  • No using programs, scripts, or commands to interfere with other network users
  • No sending unsolicited e-mail messages or junk mail to company recipients
  • No accessing adult content from company resources
  • No remote connections from systems failing to meet minimum security requirements

Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate activity.

Include this information in your key assignment document as the Week 2 IP Assignment.

Please submit your assignment.

Click on Student Expectations to view the expectations for this assignment.

Subject Computer
Due By (Pacific Time) 04/25/2013 11:59 pm
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy