Learning Objectives and Outcomes Research and compare Internet and e-mail use policies enforced by other organizations. Create an Internet OR e-mail use policy for an organization. Assignment Requirements You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server.
The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy. For this assignment: Research Internet use policies on the Internet. Find the actual policies of real companies.
Compare the portions that address Internet and e-mail access of at least three different companies. Create a simple Internet OR e-mail use policy for Richman Investments that defines the acceptable and unacceptable use of Internet and e-mail access at Richman. Go to the SANS website at http://www. sans. org/security-resources/policies/ to view sample policies. Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and
The Essay on Email Policy Messages Company System
Email Policy The purpose of this policy is to ensure the proper use of Hunter Technologies' email system. All messages distributed via the company's email system, even personal email, are Hunter Technologies' property. You must have no expectation of privacy in anything that you create, store, send or receive on the company's email system. Your emails can be monitored without prior notification if ...
other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business e-mail while at work where the incoming e-mails are secure. Under no circumstances may Company owned computers be used to obtain, view, or reach any immoral, unethical, or non-business sites. Doing so can lead to termination. Part 2: 10 points 1. Login at www. jblcourses. com 2. View the Lab 4: Lab Video 3. Open the Lab 4: Lab Manual to view the instructions for the lab. 4. Open the Lab 4: Assessment Worksheet Assignment.
Complete the steps found in the Lab Manual. Record your answers in the Assessment Worksheet. UPLOAD THIS COMPLETED DOCUMENT AND THE ASSESSMENT WORKSHEET IN BLACKBOARD Part 3: 10 points Take screen prints after each step listed below: #12 #19 #28 #30 What items concern you in the scan results? Things that concered me in the scan results were the firewall was disabled, some accounts have non expiring passwords, incomplete software updates and more than two administrators.