Premium Essay

Computernetwork

In:

Submitted By Beautifulll
Words 302
Pages 2
Richman Investments’ Remote Access Security Standard defines required tools and practices to ensure that faculty and staff can access data from remote locations in a secure manner. Company data, which is fully defined in the Information Security Standard, can generally be grouped into three, broad categories:
1. Confidential Data: This category includes the most sensitive data (ex: Social Security numbers) and requires special protection.
2. Enterprise Data: This category also includes sensitive information (ex: business records) that must be protected.
3. Public Data: This information is generally widely disseminated and can be accessed with higher levels of security protection.
Different security requirements apply to each of the categories of data. The objective of the company’s security standards is to keep company data on internal, secure systems whenever possible and apply high levels of security in the rare cases when sensitive data must be moved out of internal systems.
Level 1 Minimum Computer Security Requirements:
The requirements below apply to all computers that are used to access company data from remote locations. Faculty and staff who only need to meet these minimum requirements include those who only need SU “public” services. Such services include www.syr.edu and other public web sites, Myslice “self service” functions, Outlook/Exchange e-mail, and departmental Terminal Servers, among others. Terminal server is easy to use and enables all company data to remain on internal, secure systems.
At a minimum, all remote computers must:
• Be built and maintained by the employee or by Richman IT staff. Company employees should not access company data from public workstations, Web cafes, kiosks, etc. Such public machines are not secure and may result in employees’ login credentials (NetID and password) being compromised.
• Computers must be

Similar Documents

Premium Essay

Ntc/406 Wwek 2 Individual

...Applications Protocol Paper-VoIP security NTC/406 Explains how the application layer manages distributed applications and their protocols  Here in Afghanistan we use Voice over Internet Protocol (VoIP) for our NIPR, SIPR and CENTRIX voice capabilities. We utilize the Cisco MCS 7835 Media Convergence Server which allows for any user with internet access to create and receive calls of varies types.Because of this method of communications, it too is also targeted for attacks by unauthorized access, sniffing, and data capturing techniques. To reduce the exposure of this transmission, policies and protocol should be implemented. VoIP is a protocol with the means of communication that originates from local area network domain and provides the essential functions for audio and visual of live streaming transmission. To ensure reliability and security of these connections, information technology personal will need to address the known issues related to this domain. The Local Area Network is one of seven domains situated within the network and provides the crucial link to interior and exterior connections for accessing information. To address these security issues, we must first consider the known threat, risk, and vulnerabilities associated with this domain and connection type. Voice over internet protocol transfers packets over the network by utilizing the Public Branch Exchange (PBX) and Public Switch Telephone Network or PSTN. This function...

Words: 777 - Pages: 4

Free Essay

Operating System

...[Abbot1984]C.Abbot,"InterventionSchedulesfo rReal-TimeProgramming", IEEETransactionsonSoftwareEngineering,VolumeSE-10,Number3(1984),pages 268-274. [Accett aetal.1986 ]M.Accetta,R.Baron,W.Bolosky,D.B.Golub,R.Rashid, A.Tevanian,andM.Young,"Mach:ANewKernelFoundationfo rUnix Development",ProceedingsoftheSummerUSENIXConference(1986),pages 93-112. [Agrawa landAbbadi1991]D.P.AgrawalandA.E.Abbadi,"AnEfficientand Fault-TolerantSolutionofDistributedMutualExclusion",ACM Transactionson ComputerSystems,Volume9,Number1(1991) ,pages1-20 . [Agr e2003]P.E.Agre,"P2PandthePromiseofInternetEquality",Communica-tionsoftheACM,Volume46,Number2(2003) ,pages39-42. [Ahituvetal.1987 ]N.Ahituv,Y.Lapid,andS.Neumann,"Processing EncryptedData",CommunicationsoftheACM,Volume30,Number9(1987) , pages777-780. [Ahmed2000 ]I.Ahmed,"ClusterComputing:AGlanceatRecentEvents",IEEE Concurrency,Volume8,Number1(2000) . [Ak l1983]S.G.Akl,"DigitalSignatures:ATutorialSurvey",Computer,Volume 16 ,Number2(1983) ,pages15-24. [AkyurekandSalem1993]S.AkyurekandK.Salem,"AdaptiveBlockRear-rangement" ,ProceedingsoftheInternationalConferenceonDataEngineering(1993), pages182-189. [Al t1993]H.Alt,"RemovableMediainSolaris",ProceedingsoftheWinter USENIXConference(1993) ,pages281-287. [Anderson1990 ]T.E.Anderson,"ThePerformanceofSpinLockAlternatives fo rShared-MoneyMultiprocessors",IEEETrans.ParallelDistrib.Syst.,Volume 1,Number1(1990) ,pages6-16. [Andersonetal.1989 ]T.E.Anderson,E.D.Lazowska,andH.M.Levy,"The Perfo...

Words: 5897 - Pages: 24

Premium Essay

Business Ethics

...CHRIST UNIVERSITY Mid SEMESTER EXAMINATION JAN 2014 ( II Sem UG and VIII BHM) : Time: 9:30 to 11:30am Day & Date | 16/01/2014Thursday | 17/01/2014Friday | 18/01/2014Saturday | 20/01/2014Monday | 21/01/2014Tuesday | 22/01/2014Wednesday | II Sem -B.A Programmes HEPEPS | English | Languages/Ad. English | | Political Science | Principles of Macro Economics | Contemporary IndiaSociology | PSEngPSEcoJPEng | English | Languages/Ad .English | | BasicPsychologicalProcesses -II | Principles of Macro Economics British Literature | Foundations of SociologyJournalism | CEP | English | Languages/Ad .English | | BasicPsychologicalProcesses -II | British Literature | Software applicationFor print media & the web | TCE(Theatre Studies) | | | | Introduction toMusic & Dance –II | | | PEP | English | Languages/Add.English | | Basic PsychologicalProcess –II | British Literature | Dynamics of DanceMusic & Theatre | II Sem -B.Sc Programmes CME | English-- | 9:30 to 11:30 amLang/Ad .English | | Computer Science Data Structures & operating system | Electronics | Differential Calculus | | | 2:30 to 4:30 pmIntegral Calculus | | | | | EMSCMS | English | 9:30 to 11:30 amLang/Ad .English | Statistics ( 9:30 to 11:30 am)(Examination will be held in separate room for Stats; check the notice board) | Computer ScienceOperating...

Words: 2645 - Pages: 11