Richman Investments |
Richman Internet Infrastructure Security Management Upgrade |
ITT Technical Institute NT2580 Course Project |
Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. |
I. Richman Internet Infrastructure Security Management Upgrade
Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates …show more content…
III. Access Control (Which resources they can access.)
Access Control helps employers control activities that lower productivity. - Monitor Computer use. You can restrict activities that lead to the computer being unfairly monopolized. - It can even minimize the likely hood of getting infected by preventing access to potentially dangerous websites. Richman can protect itself by training our employees in internet user monitoring and filtering policy. In conjunction, we will start using Pearl Echo. Suite web filtering and internet control software to enforce the policy.
A. Employee Internet Use Monitoring and Filtering Policy
The purpose of this policy is to define standards for systems that monitor and limit web use from any host within Richman Investments' network. We need to ensure employees use the Internet in a safe and responsible manner. Employees will be monitored to obtain details with incidents.
This policy applies to all Richman Investments' employees, contractors, vendors and agents with a Richman Investments owned or personally-owned computer or workstation connected to the Richman Investments' network. This policy applies to all