Wednesday, May 8, 2019

Computer Networking Essay Example | Topics and Well Written Essays - 2250 words

Computer Networking - Essay ExampleHence, the document improves market benefits for the company, as well as reducing costs.It is anticipated that periodic evaluations of the IT policy leave behind reveal that the majority of staff will point out IT systems supporting improved management, control, and/or organizational planning, which provide staff with a consistent work environment, and go on the companys culture of collaboration, inclusiveness and continual improvement. Other benefits to be expected form the Policy are enhanced team-spirit consistency in work performance staff confidence in the reliability and dependability of co-workers increased employee atonement and decreased perceptions of stress and improved employee moral and training programs as well as improved client satisfaction.Logging and accounting will serve important purposes within the Policy, in that they will aid in the management, tracking, accountability of use and misuse detection. The logging will espec ially assist with user monitoring and debugging of the IT systems. Logs so-and-so also help to identify and track the intruder if one does get through and provide additive information for other research processes. The Policy will also state the regular frequency of log review and evaluation.The company will use a single firewall program on all its workstations as well as the same version of anti- virus software. The firewall limit exposure to threats from the Internet and to mitigate the clients risk as it inhibits network traffic that does not meet the credential policy (e.g. peons). The anti-virus software and the frequency of mandatory description updates will be outline in the Policy. Viruses are able to destroy critical client data and other company files. The system at Harder and Harder is currently compromised by a worm virus (warez) that has been big(a) the hackers access and privileges of an authorised network user. The anti-virus software can attack the future virus es and so minimize the risk. However, updated virus definitions are essential to ensure that the software is not rendered useless. And so the Policy clearly addresses these issues. The Policy will aim to discourage employees to use the network in ad-hoc communications, such as with wireless networks. A hacker is able to attack this system due to the lack of authentication. Ad-hoc networks can allow a hacker to move man in the middle attacks, denial of service, and/or compromise systems.Further, the Policy will emphasise education, sensation and continual improvement among staff. Perception surveys of employee satisfaction, as well as outcome evaluations will be reviewed to hold in degree of IT security consciousness and knowledge and compliance with IT policy. The Policy will stipulate ways that security awareness will be increased and maintained, for example through workshops, posters, or in newsletters. Studies show that staffs are more likely to comply with Policy and to make more of an effort to secure or at least limit behaviours that will put the network at risk.The Policy will introduce inclusive decision making staff meetings to come up with IT security solutions. In a collaborative assemblage staffs can suggest ways to limit

No comments:

Post a Comment