Irishman Investments has requirements for the usage of the company network, which include filtering policies for network traffic. The IT infrastructure is connected to a Wide Area Network (WAN) through CAN-WAN. Security measures for managers and administrators include intrusion monitoring controls. All unknown file types should use an email server and attachment antivirus. Port scanning, ping, and probing will be disabled for all exterior IP devices. Outbound traffic using unknown source IP addresses will be flagged. Unknown files must undergo monitoring, scanning, and alarming during file transfer.
Web surfing refers to browsing the internet using various web browsers. For security purposes, administrators and managers should be aware that non-work-related material may decrease employee productivity. Filtering for domain name content should be implemented at the internet entry point to restrict access to certain websites. This restrictio
...n may prevent employees from looking up answers on the internet, even if they need to find information for customer inquiries. However, these restrictions also have benefits such as preventing viruses and other security issues and ensuring that employees stay focused on their tasks instead of browsing the web for leisure.
Some specific types of traffic are strictly prohibited. These include:
- No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers.
- No downloading executables from known software sites.
- No unauthorized redistribution of licensed or copyrighted material.
- No exporting internal software or technical material in violation of export control laws.
- No introduction of malicious programs into networks or onto systems.
- No accessing unauthorized internal resources or information from external sources.
- No port scanning or data interception on the network.
- No denying
service or circumventing authentication for legitimate users.
- Networking essays
- Telecommunication essays
- Network Topology essays
- Telecommunications essays
- Email essays
- Hypertext Transfer Protocol essays
- Marshall Mcluhan essays
- Virtual Learning Environment essays
- Web Search essays
- Etiquette essays
- Mainstream essays
- Vodafone essays
- Web Search Engine essays
- Android essays
- Application Software essays
- Benchmark essays
- Computer Network essays
- Computer Programming essays
- Computer Security essays
- Computer Software essays
- Cryptography essays
- Data collection essays
- Data Mining essays
- Graphic Design essays
- Information Systems essays
- Internet essays
- Network Security essays
- Website essays
- World Wide Web essays
- John Locke essays
- 9/11 essays
- A Good Teacher essays
- A Healthy Diet essays
- A Modest Proposal essays
- A&P essays
- Academic Achievement essays
- Achievement essays
- Achieving goals essays
- Admission essays
- Advantages And Disadvantages Of Internet essays
- Alcoholic drinks essays
- Ammonia essays
- Analytical essays
- Ancient Olympic Games essays
- APA essays
- Arabian Peninsula essays
- Argument essays
- Argumentative essays
- Art essays
- Atlantic Ocean essays