Monday, June 17, 2019
Computer Networking Essay Example | Topics and Well Written Essays - 2250 words
Computer Networking - Essay ExampleHence, the document improves market benefits for the company, as well as reducing costs.It is anticipated that periodic evaluations of the IT policy go forth reveal that the majority of staff allow for find IT corpses supporting change management, control, and/or organizational planning, which provide staff with a consistent work environment, and encourage the companys culture of collaboration, inclusiveness and continual improvement. Other benefits to be expected form the Policy be enhanced team-spirit consistency in work performance staff confidence in the reliability and dependability of co-workers increased employee satisfaction and decreased perceptions of stress and improved employee moral and training programs as well as improved customer satisfaction.Logging and accounting will serve important purposes within the Policy, in that they will aid in the management, tracking, accountability of expend and misuse detection. The logging will e specially assist with user monitoring and debugging of the IT systems. Logs can also help to commit and track the intruder if one does get through and provide additional data for other research processes. The Policy will also state the fixedness frequence of log review and evaluation.The company will use a single firewall program on all its workstations as well as the akin version of anti-virus software. The firewall limit exposure to threats from the Internet and to mitigate the clients risk as it inhibits network traffic that does not meet the security policy (e.g. hackers). The anti-virus software and the frequency of mandatory definition updates will be outline in the Policy. Viruses are able to destroy critical client data and other company files. The system at Harder and Harder is currently compromised by a worm virus (warez) that has been giving the hackers access and privileges of an authorised network user. The anti-virus software can attack the future viruses and so mi nimize the risk. However, updated virus definitions are essential to ensure that the software is not rendered useless. And so the Policy clearly addresses these issues. The Policy will aim to discourage employees to use the network in ad-hoc communications, such as with wireless networks. A hacker is able to attack this system due to the lack of authentication. Ad-hoc networks can allow a hacker to execute man in the middle attacks, denial of service, and/or compromise systems.Further, the Policy will emphasise education, awareness and continual improvement among staff. information surveys of employee satisfaction, as well as outcome evaluations will be reviewed to determine degree of IT security consciousness and knowledge and compliance with IT policy. The Policy will delimit shipway that security awareness will be increased and maintained, for example through workshops, posters, or in newsletters. Studies show that staffs are more likely to stick with with Policy and to make more of an effort to secure or at least limit behaviours that will put the network at risk.The Policy will introduce inclusive decision making staff meetings to come up with IT security solutions. In a collaborative forum staffs can suggest ways to limit
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.