Assignment Document

Internet/Intranet solution for Eastern Bay College

Pages:

Preview:


  • "INTERNET/INTRANET SOLUTION FOR EASTERN BAY COLLEGEInternet/Intranet solution for Eastern Bay CollegeFrom:To:Class:Course:Page 1 of 16 INTERNET/INTRANET SOLUTION FOR EASTERN BAY COLLEGETable of Contents1. Introduction ..................................

Preview Container:


  • "INTERNET/INTRANET SOLUTION FOR EASTERN BAY COLLEGEInternet/Intranet solution for Eastern Bay CollegeFrom:To:Class:Course:Page 1 of 16 INTERNET/INTRANET SOLUTION FOR EASTERN BAY COLLEGETable of Contents1. Introduction .......................................................................................................................................... 32. Content................................................................................................................................................. 42.1. Email Policies, Password Security, and Acceptable Use ............................................................... 43. Standards and procedures .................................................................................................................... 53.1. Access to the Virtual Host ............................................................................................................. 53.2. Identification of the connection ................................................................................................... 64. Organization/types of content .............................................................................................................. 65. Discussion of and reasons for choice of OS and web server software ................................................. 85.1. Projected Growth Requirement .................................................................................................... 95.2. VoIP Design Layout ..................................................................................................................... 105.3. Equipment List ............................................................................................................................ 106. Maintenance ....................................................................................................................................... 116.1. Encryption of the communication Session ................................................................................. 116.2. Checking the Certificate .............................................................................................................. 126.3. Advance security check ............................................................................................................... 127. Access restrictions Security, privacy, copyright issues ....................................................................... 138. Conclusion ........................................................................................................................................... 159. References .......................................................................................................................................... 16Page 2 of 16 INTERNET/INTRANET SOLUTION FOR EASTERN BAY COLLEGE1. IntroductionThe information technology is growing day by day and the security concerns are alsoincreasing due to the lot of new technology devices and techniques. The informationtechnology companies are looking to produce and invent new hardware and softwaretechnologies and the standards and security parameters are not focused due to largeinvention and requirements. All these things are creating problems for the users ofthese technologies. The internet and network security is very important and the onlinebusiness is also creating more stress and focus on these things. And for this purpose anauthenticated security certificated will be generated. Today security is very important in every field of life, but when we look at the informationtechnology then we come to know that it is essential for successful communication.Different organizations and companies are working with different information securitypolicies to make their information, communication, working and business more secure.In other words we can say that information security policies are very vital for differentorganizations and companies and we can’t ignore the importance of information securitypolicies in business organizations. Basically information security policy means wedevelop a document for the internal working, sharing and communication within theorganizations. Like how we need to make secure our communication more secure, ourbusiness process, our college secrets and many other internal aspects of the college. The communication between the user and the server is bases upon different sessionsand all these sessions are being encrypted by using some advance security andencryption techniques. Server Name Indication is allowing the user to encrypt thesession of stream communication. At the early stages the Transport Layer Securityprotocol was used to encrypt the communication session, but due to less confidentiallyin this techniques for the streaming sessions, this TLS protocol was not sufficient andalso a new trend of virtual server and virtual hosting was introduced for direct andmultiple session with a hosting server. Page 3 of 16 INTERNET/INTRANET SOLUTION FOR EASTERN BAY COLLEGE2. ContentLimiting the possibility of direct access attacks begins with a Workstation SecurityPolicy.College employees are required to secure their local workstation areas inaccordance with local policies and procedures.The requirements outlined in thecollege Workstation Security Policy include, but are not limited to, mandatory screenlockouts when leaving the area, password protected screen savers, and complying withall policies established in the Password Security Policy.Safety concerns are alsoprevalent throughout and as such, all users are required to keep food and drinks awayfrom electronic equipment and utilize surge suppressors or Uninterrupted PowerSupplies (UPS) where available.All users connecting to the college network viawireless transmissions are required to follow the procedures established in the WirelessCommunication Policy.2.1. Email Policies, Password Security, and Acceptable UseThe key to any successful business is its workforce and college is no different.Asvalued as the employees are by this college, documented guidance is required to deterinsider threat, direct access, and credential compromise.To combat unauthorizeddirect access from intruders via login or password compromise, scrutiny was placed onpassword security policies.Requirements for user and system level passwords wereimplemented, to include complexity, duration, and protective measures.Explicitguidance regarding the unauthorized disclosure, or hinting of, passwords and/or theirhidden meaning is forbidden.Quarterly password checks, to include theimplementation of programs such as L0pht and John the Ripper will be utilized to verifypassword integrity.Users found in violation of the Password Security Policy will besubjected to immediate disciplinary action.With regards to both email and password security policies, the key to success is usertraining and awareness.The college Acceptable Use Policy highlights the guidelinesand expectations all college authorized users are expected to follow.Explicitly coveredare both acceptable and unacceptable network behaviors, to include any activity thatviolates local, federal, or international law.Prohibited activities include any violations ofPage 4 of 16 "

Why US?

Because we aim to spread high-quality education or digital products, thus our services are used worldwide.
Few Reasons to Build Trust with Students.

128+

Countries

24x7

Hours of Working

89.2 %

Customer Retention

9521+

Experts Team

7+

Years of Business

9,67,789 +

Solved Problems

Search Solved Classroom Assignments & Textbook Solutions

A huge collection of quality study resources. More than 18,98,789 solved problems, classroom assignments, textbooks solutions.

Scroll to Top