Monitoring Employees On Networks

Page 13 of 50 - About 500 Essays
  • Premium Essay

    Data Classification Standard

    User Domain, Workstation Domain, and the System Application Domain. To help mitigate threats in the User Domain all employees will attend annual training on basic computer security. Annual training will keep employees updated on recent virus threats and refresh employees on safety protocols they can practice to keep the company network secure. Also access to social network, social media, and indecent web sites will be blocked. By implementing these safeguards it will help stop computer viruses

    Words: 403 - Pages: 2

  • Premium Essay

    Internet Usage Torts

    XYZ Corporation’s business environment has changed dramatically over the years, especially the manner in which your company can be held liable, or accountable for the actions of your employees. Many small and big businesses like your company have numerous methods to protect themselves from lawsuits in the area of criminal activity and workplace torts. With proper training programs and a comprehensive set of electronic communications policies in place, companies such as yours can reduce many of

    Words: 2924 - Pages: 12

  • Free Essay

    Can Brazil Become a Global Competitor in the Information Technology Outsourcing Business

    GUI Based Real Time Monitoring and Controlling Approach on Networking A Technical Project report Submitted in the partial fulfillment of the requirement For the award of the degree of BACHELOR OF TECHNOLOGY IN COMPUTER SCIENCE AND ENGINEERING Submitted By K.BHARGAVI CH.KOMALI (Regd. no: 11981A0528) (Regd. no: 11981A0537) K.L.V.S.SANKAR

    Words: 12675 - Pages: 51

  • Premium Essay

    Weekly Summary

    Security Monitoring Activities CMGT/442 May 21, 2012 Security Monitoring Activities Any company that considers data an asset must realize the importance of risk management. Managing risk helps a company identify vulnerabilities and allows actions to be taken to reduce or stop these vulnerabilities. Risk management is also helpful in the attainment of goals and higher profits by attempting to eliminate any risk that may cost the company extra money to rectify. This paper will discuss security

    Words: 1068 - Pages: 5

  • Free Essay

    Identifying Potential Malicious Attacks, Threats and Vulnerabilities

    vulnerabilities, risks and threats and potential impact to our network should we have any security incidents. “Unfortunately, there are inherent risks to computer usage — hackers, viruses, worms, spyware, malware, unethical use of stolen passwords and credentials, unauthorized data removal by employees with USB flash drives, or servers crashing and bringing productivity to a halt” ("Cybersecurity," 2013) . The CGF network is a typical office network composed of an external firewall with an external DMZ

    Words: 1563 - Pages: 7

  • Premium Essay

    Effects Of Surveillance On Employees

    will explain why employers monitor their employees in the workplace and what are the recent devices and programs used in the monitoring process. The paper will examine also the effects of the surveillance on the employees’ psychological health and their rights to privacy. Nowadays, the negative effects of surveillance must be discussed and solved. In addition, a solution is given to ease the controversy between the employer’s work protection and the employees’ privacy rights. Last, the paper gives

    Words: 1181 - Pages: 5

  • Premium Essay

    Sec571 Course Project

    to store customer data such as project information, computer aided design and development models, and intellectual properties. Vulnerabilities Hardware vulnerability Aircraft Solution Company has a major weakness in the network architecture as we noticed within the AS’s headquarter there is insufficient number of firewalls. There are two routers with only

    Words: 4091 - Pages: 17

  • Premium Essay

    Nt2580: Introduction to Information Security Week 2 Essay

    policy will protect the company and employees against attacks that may cost them tons of money and even their jobs. The policy will define several different security practices that employees need to adhere to in order to keep the network safe. These policies will be dictated through an AUP and signed by all employees with access to the network. The employees will also have to go through initial information security training before gaining access to the network. This training will also be required

    Words: 617 - Pages: 3

  • Premium Essay

    Electronic Surveillance

    “Electronic Surveillance of Employees” Katy Romero Law, Ethics and Corporate Governance Dr. Andrea N. Brvenik Strayer University July 17, 2011 Electronic Surveillance of Employees An employer has the right to monitor the employees to increase the productivity and efficiency of its business. In the other hand, every person has the right of privacy within the organization. Human beings must experience a degree of privacy to thrive. Electronic surveillance is increasing every year within the

    Words: 1139 - Pages: 5

  • Premium Essay

    Mgt2 1

    to data mine personnel files More transparency in the hiring process Central job board that will allow employees to view and apply for positions Allow management to view processed applications for multiple job positions Performance evaluation and compensation system Data analysis of reports from procurements Career and goal tracking capability for employees Auto fill forms Monitoring attendance, performance, and disciplinary actions Track new applicants, interns, and new hires Statement

    Words: 2214 - Pages: 9

Page   1 10 11 12 13 14 15 16 17 50