Free Essay

Fair and Responsible Use of Wireless Lan Technology

In:

Submitted By green281028
Words 472
Pages 2
Issue Specific Security Policy

Title: Fair and Responsible Use of Wireless LAN Technology
Classification: Internal Use Only

Statement of Policy
This policy addresses fair and responsible use of Acme’s wireless local area network (WLAN) technologies. This includes but is not limited to hardware, software and protocols associated with WLANs. It is intended for authorized users within the Acme enterprise. Authorized users are defined as anyone who has been granted approval to access Acme information and information systems. This includes employees and contingent workers. Authorized users are expected to understand and comply with the contents of this document.

Appropriate Use
Laptop users are permitted, with prior management approval, to use Acme’s internal WLAN solution. The WLAN should be used only when a wired network solution in unavailable or inappropriate for a particular situation. To ensure appropriate protection of privacy, all wireless transmissions will be secured utilizing strong mutual authentication and encryption. When establishing a connection to a public hotspot or WLAN within your home, a VPN connection must be established and used in conjunction with an Acme approved personal firewall solution. Only Acme approved WLAN technologies are permitted within the enterprise. Use of non-standard hardware, software and protocols is strictly prohibited.

Systems Management
It is the responsibility of the Network Administrator, for Acme’s WLAN, to ensure all Access Points are configured with proper settings as defined by the WLAN System-Specific Policy. This includes but is not limited to authentication and encryption configurations. It is the responsibility of the end-user to ensure that his/her laptop remains properly configured as defined by Enterprise Workstation Standards. This includes but is not limited to the configuration of the wireless supplicant and network interface card. Acme Information Security will be responsible for defining authentication and encryption requirements as well as development of necessary compliance programs. Acme reserves the right to audit any and all technologies associated with its WLAN.

Violations of Policy
In the event of inappropriate use of WLAN technologies, Acme reserves the right to take whatever steps are deemed appropriate for the specific situation including, but not limited to, termination of employment and/or legal action. Guidelines for action include a warning for first-time violators and formal notice in employee’s personnel file for additional occurrences. All violations of this policy should be reported to your direct report manager who will in turn report the violation to the Information Security department.

Policy Review and Modification
This policy will be reviewed by Acme Information Security on an annual basis, or as necessitated by changes in technology, and modified where appropriate.

Limitations of Liability
Acme assumes no liability for unauthorized acts that violate local, state or federal legislation. In the event that such an act occurs, Acme will immediately terminate its relationship with the violator and will provide no legal protection or assistance.

Similar Documents

Premium Essay

Indp

...will be utilized by the local store management. An APC Smart UPS rated at 5000va will be installed in each of the three server rooms. Telephonic communications will be made available using VOIP. La Jolla will have 19 total VOIP phones in order to accommodate the number of corporate administrators, the Del Mar and Encinitas facilities will only have 6 VOIP phones. The standards being applied to this project are LAN, WAN, Wireless, and VOIP. A LAN or local area network is created when multiple computers or devices are connected as a network providing services and applications within a common structure such as a single business, campus or region. A LAN is generally governed by the organization by an administrator who controls the policies, security and access control. Essential components of a working LAN is the workstation computers, data server, networking switch and the outward facing router. The WAN, or wide area network, is created when multiple LANS are essential. However if the physical facilities are geographically too far apart to be maintained as a unified LAN would require the services of third...

Words: 2182 - Pages: 9

Premium Essay

Determining Databases and Data Communications

...Determining Databases and Data Communications Determining Databases and Data Communications Having a clear understanding of the technologies to implement is an incredible tool for managing companies with computer technology as their primary means of sustainability. This knowledge helps their personnel responsible for information management to make informed decisions about which technology to actually implement. These strategic decisions permit the manager to effectively utilize time and resources in seemingly intimidating tasks. This is shown in both scenarios. In the first scenario a marketing assistant working at a consumer electronics company is tasked with maintaining booths for trade shows from start to finish. In addition that individual is also tasked to resolve any issues related to product shipment that may arise. Knowing what information is to be retained is important in ensuring best tools are used in trade fairs. Situations like these calls for detailed list of displays, equipment, and booths that are necessary and how they are being shipped and retrieved. Let’s say a trade show is to be organized in San Antonio, Texas with a requirement of one booth and display. The marketing assistant must make sure the booth with display is brought to the location in time and taken back for future use to the company. With knowing the delivering postal tracking number, a tab can be kept on the dispatch and retrieval date. Every trade show typically needs certain...

Words: 1031 - Pages: 5

Premium Essay

How to Plan for Security

...This policy statement seeks to address the optimum and responsible use of the wireless local area network WLAN facility available at the university in relation to specific network security issues. The issue of concern in this policy is the promotion of responsible use of the WLAN facility among the university’s student and workers. The strategy aims at preventing security problems that may arise from the misuse and malicious exploitation of the facility by people granted approval to access the university’s WLAN information systems. a) Scope and Applicability The scope of this policy statement covers the hardware, software and access protocols associated with the WLAN use by students and workers at the university. The policies adopted will seek to regulate access permissions for the users of the WLAN facility and to promote responsible use in line with policies outlined in this policy document and by industry standards and legal requirements of use. b) Definition of Technology Address The WAN is available for use by the students and workers within the university. The WLAN facility provides access to information systems meant to facilitate the learning and worker needs by providing information access and software platforms. c) Responsibilities The administration and management of the WLAN facility is the responsibility of appointed network administrators at the university’s faculty of Information and Communication Technology. The network administrators are tasked with managing access...

Words: 1907 - Pages: 8

Free Essay

Networking Assignment

...CARDIFF SCHOOL OF MANAGEMENT: ASSIGNMENT FEEDBACK PROFORMA |STUDENT NAME: |PROGRAMME: | |STUDENT NUMBER: |YEAR: 20012-13 |GROUP: | |Module Number: BCO5007 |Term: Yr |Module Title: Networking | |Tutor Responsible For Marking This Assignment: Steve Marsh Dr Simon Thorne | |Module Leader: ST/SM | |Assignment Due Date: |Hand In Date: 16th December 2012 | |ASSIGNMENT TITLE: Network Provision for Building Society | |SECTION A: SELF ASSESSMENT (TO BE COMPLETED BY THE STUDENT) | |In relation to each of the set assessment criteria, please identify the areas in which you feel you have strengths and those in which you need to improve...

Words: 928 - Pages: 4

Free Essay

Distributed Intrusion Detection Using Mobile Agent in Distributed System

...Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012) Proceedings published in International Journal of Computer Applications® (IJCA) Distributed Intrusion Detection using Mobile Agent in Distributed System Kuldeep Jachak University of Pune, P.R.E.C Loni, Pune, India Ashish Barua University of Pune, P.R.E.C Loni, Delhi, India ABSTRACT Due to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. There is tremendous rise in attacks on wired and wireless LAN. Therefore security of Distributed System (DS) is become serious challenge. One such serious challenge in DS security domain is detection of rogue points in network. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. This paper gives the new idea for detecting rouge point using Mobile agent. Mobile agent technology is best suited for audit information retrieval which is useful for the detection of rogue points. Using Mobile agent we can find the intruder in DS as well as controller can take corrective action. This paper presents DIDS based on Mobile agents and band width consumed by the Mobile Agent for intrusion detection. information it receives from each of the monitors. Some of the issues with the existing centralized ID models are:  Additions of new hosts cause the load on the centralized...

Words: 2840 - Pages: 12

Premium Essay

Qubee Business

....1 Introduction of the Report My OCP report is an educational requirement of MBA Program under an assigned faculty International Islamic University Chittagong, Dhaka campus which is a professional degree. MBA students have to do an OCP report as a practical orientation to the workplace where he/she can amalgamate the traditional hypothetical knowledge. I have completed my MBA from International Islamic University Chittagong with major in Finance & Banking. 1.2 Objective of the Report   * To present the overview of the operation QUBEE in Bangladesh. * To observe the activities of Sales & Distribution Department of QUBEE. * To demonstrate different aspects of marketing in the organization. * To find out the operational function of QUBEE’s different sales centers. * To analyze the customer satisfaction of wimax internet Service by QUBEE. * To compare sales and distribution between wimax internet service and dial up internet service. 1.3 Methodology The data needed to prepare this report has been collected from secondary sources.   Secondary Data Source: The secondary data have been collected through QUBEE’s official website, Aamra group’s official website and others website related to report topic. 1.4 Limitations While doing the OCP report, I faced some obstacles. These are given below:- * OCP report is one kind of research work. Research work requires enormous time and effort. But the time provide to us is not enough to do the report...

Words: 7140 - Pages: 29

Premium Essay

Tft2 Task3

...TFT2 Task 2 Thomas Garner Student ID: 336227 Information Security Modification Recommendations Service Level Agreement Between Finman Account Management, LLC, Datanal Inc., and Minertek, Inc. After careful review of the current Service Level Agreement(SLA) “A Service Level Agreement for Provvision of Specified IT Services Between Finman Account Management, LLC, Datanal, Inc., and Minertek, Inc.” we have determined that standard Information Technology security measures have not been addressed fully. Following are the recommended changes highlighted in the specific sections that need to be addressed. These changes are being recommended to protect Finman’s data and intellectual property. Established standards such as Best Management Practices(BMP), International Organization of Standards(ISO) and the Information Technology Infrastructure Library(ITIL) for the proper handling, storage and protection of IT resources are used as guidelines for these recommendations. Recommended Changes to SLA: Section 3 Background and Rationale Modifications: Finman views this SLA as a groundbreaking venture to harness the diverse array of IT-borne customer demands and opportunities that cannot be met by adhering to traditional paradigms. Finman’s objectives in the SLA are to compete more effectively in a highly competitive industry by offering its customers a unified IT management plan across an entire organization or even, if the customer wishes, across separate departments...

Words: 1333 - Pages: 6

Premium Essay

Cdc and Information Systems

...Karissa Keller May 12, 2014 TABLE OF CONTENTS Section 1: Information Systems Overview 3 The CDC 3 Selection of Information System 3-4 Management Information Systems Office 4 Evaluating Surveillance Systems 4-5 Section 2: Information Systems Concepts (TBA) 5 Network Basics 5 Local Area Network and Wide Area Network: Description and Uses 5-6 CDC Network LAN or WAN 6 WI-FI and Telecommuting: Description and Issues 6-7 CDC: To Telecommute or Not 7-8 Section 3: Business Information Systems (TBA) 8 Defining MIS, TPS, DSS, and A.I. 8-10 CDC Using MIS 10 CDC Implementing TPS 10-11 CDC’s Use of DSS 11-12 CDC Implements A.I. 12-13 Section 4: System Development 13 Software System and Software Process 13-14 Waterfall Method vs. Prototype 14-15 The Phases of the Waterfall Method 15-16 Section 5: Information Systems and Society 17 History of Hacking 17 Techniques and Approaches Hackers Use 17-19 Preventive Measures for Minimizing Hacker Disruption 19-20 References 21-24 Section 1: Information Systems Overview The CDC Organizations use information systems for a multitude of reasons. Some of these reasons can be to increase the quality of healthcare and improve the overall health care industry, such as does the Centers for Disease Control and Prevention. CDC is well known for collecting data on a vast spectrum of information in order to improve the quality and the way health care...

Words: 5907 - Pages: 24

Premium Essay

Wireless Information

...Wireless in AmericA Innovative ■ Competitive ■ World Leader is the most innovative and competitive in the world-—the gold standard that others aspire to emulate. The U.s. wireless industry The industry is providing American wireless users with the best value proposition on the planet. We use our devices to talk more, pay less and have more wireless broadband subscribers than any other developed country. The industry’s competition and innovation have also created a fantastic array of choices for consumers, who can select from several national service providers, and many regional and local carriers. They have the option of prepaid or postpaid service. More than 630 handsets are available in the U.S. market. Mobile applications barely existed just three years ago, yet today, there are more than 500,000 from which to choose. Wireless technology is helping us live and work better than ever before, and is having profound impacts in areas such as healthcare, transportation, energy, education and many more. The U.S. wireless industry leads the way in the widespread deployment of high-speed networks… and even in the most challenging of economic times, continues to outpace its counterparts around the world when it comes to investing in infrastructure. The U.S. wireless industry continues to play a key role in our country’s economic development and enriches all of our lives thanks to our hallmark innovation and competition. specTrUm The Lifeblood of Wireless Wireless service...

Words: 9934 - Pages: 40

Premium Essay

Blackjacking Security

...Blackjacking Security Threats to BlackBerry® Devices, PDAs, and Cell Phones in the Enterprise Daniel Hoffman Wiley Publishing, Inc. Blackjacking Blackjacking Security Threats to BlackBerry® Devices, PDAs, and Cell Phones in the Enterprise Daniel Hoffman Wiley Publishing, Inc. Blackjacking: Security Threats to BlackBerrys, PDAs, and Cell Phones in the Enterprise Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-12754-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make...

Words: 83592 - Pages: 335

Premium Essay

Voice, Video, Network

...VOICE, VIDEO, AND DATA NETWORK CONVERGENCE VOICE, VIDEO, AND DATA NETWORK CONVERGENCE ARCHITECTURE AND DESIGN, FROM VOIP TO WIRELESS JUANITA ELLIS CHARLES PURSELL JOY RAHMAN Amsterdam Boston London New York Oxford San Francisco Singapore Sydney Tokyo Paris San Diego This book is printed on acid-free paper. Copyright 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: permissions@elsevier.com.uk. You may also complete your request on-line via the Elsevier Science homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press An imprint of Elsevier Science 525 B Street, Suite 1900, San Diego, California 92101-4495, USA http://www.academicpress.com Academic Press 84 Theobald’s Road, London WC1X 8RR...

Words: 125371 - Pages: 502

Premium Essay

Nmnmnnm

...User Guide YML864 Rev1 www.netcomm.com.a� ����4 ��e�� ����e 54Mbps Wireless Router 1 NB504 CoNteNts Package Contents .........................................................................................................................................4 Chapter 1: About this Guide ..........................................................................................................................5 1.1 Purposes ...........................................................................................................................................5 1.2 Conventions .......................................................................................................................................5 1.3 Overview of this User Guide ................................................................................................................5 Chapter 2: Introduction .................................................................................................................................6 2.1 Overview of the Router........................................................................................................................6 2.2 Features ............................................................................................................................................7 2.3 Panel Layout ......................................................................................................................................8 2.3.1 The Front...

Words: 19282 - Pages: 78

Free Essay

Project

...You have founded your own networking company. You have been asked to submit a proposal for a new network at RobCo Industries. They have asked you to help design, specify and install a network at their facility. Use the knowledge and skills covered in this class to help you with this project. Should you need any information not covered in this document (such as if the offices have baseboards, etc.), please feel free to ask the instructor. RobCo is located in the Port Huron Industrial Park on 16th Street. They are a small company with about 75 employees. Their main product is the patented "Propeller Beanie". They manufacture this item at the Port Huron facility. Currently they have only a few PC's installed, but their technology plan envisions that most employees will work with PC's in the future and that everyone will communicate via an intranet.  In essence, your group will create a "case study"... Each week, we will be focusing on a different aspect of the project. The Total budget for this project is $25,000. Week 1 - Physical Plant The exterior dimensions of the building are 120' x 60' the exterior walls are poured concrete, while the interior walls are typical commercial metal stud framing. The building is single story, and is on a slab foundation. There is no sub-floor or basement. The manufacturing facility and the warehouse both have an open 12' ceiling. The office areas have an 8' dropped ceiling. You can estimate the interior dimensions of the...

Words: 2355 - Pages: 10

Free Essay

Report

...2003 Annual Report intel.com intc.com GROWTH THROUGH TECHNOLOGY LEADERSHIP 33.7 29.4 25.1 20.8 16.2 26.3 26.5 26.8 30.1 36 1.51 1.6 Americas 50% 45% 28% 100 27 1.05 0.97 0.86 18 0.73 0.85 1.2 40% 75 0.8 20% 20% AsiaPacific Europe 14% 50 11.5 9 0.33 0.50 0.46 0.4 0.19 28% 28% 23% 25 Japan 94 95 96 97 98 99 00 01 02 03 0 94 95 96 97 98 99 00 01 02 03 0 8% 93 7% 98 9% 03 0 NET REVENUE Dollars in billions DILUTED EARNINGS PER SHARE† Dollars, adjusted for stock splits † GEOGRAPHIC BREAKDOWN OF REVENUE Percent Amortization of goodwill reduced earnings per share in 2001 by $0.22 ($0.18 in 2000 and $0.05 in 1999). Goodwill is no longer amortized, beginning in 2002. “Our continuing commitment to investments in leading-edge technology and our dedication to product innovation have set the stage for the positive results we began to see by year’s end.” Craig R. Barrett Chief Executive Officer 38.4 35.6 33.3 30.2 27.3 28.4 26.2 40 Machinery and equipment Land, buildings and improvements 6.7 8.0 7.3 4.0 4.4 3.9 3.8 5.0 4.0 30 6.0 3.1 4.5 20 15.4 2.4 8.7 10 4.0 3.6 3.0 3.4 4.7 3.7 4.0 1.8 1.3 2.3 2.5 3.0 2.0 2.0 1.1 1.0 3.5 0 0 0 94 95 96 97 98 99 00 01 02 03 94 95 96 97 98 99 00 01 02 03 94 95 96 97 98 99 00 01 02 03 RETURN ON AVERAGE STOCKHOLDERS’ EQUITY ...

Words: 32414 - Pages: 130

Premium Essay

Sql Quiz

...Internetworking Technology Handbook | [Type the document subtitle] | | SAVIOUR EMMANUEL UDOBONG | [Pick the date] | [Type the abstract of the document here. The abstract is typically a short summary of the contents of the document. Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.] | Internetworking Basics An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. The following articles provide information about internetworking basics: * Internetworking Basics * Introduction to LAN Protocols * Introduction to WAN Technologies * Bridging and Switching Basics * Routing Basics * Network Management Basics * Open System Interconnection Protocols LAN Technologies A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet Technologies * Token...

Words: 217433 - Pages: 870