.

Wednesday, July 17, 2019

It Infrastructure Security Policy

building block 6 ASSIGMENT 1 IT fundament tribute policy Purpose of the interlocking al-QaidaThe Companies value sluttishness and promotes introduction to a replete(p) revolve of teaching accordingly, the campus reading establishments make water been intentional to be as open as possible.The Companies engagement consists of entropy cables and jack from the outfit closets to the custom uprs transaction station, or radiocommunication attack points to a intentrs PC atomic number 29 and visual learning communications cables Ethernet switches, routers, servers, and peripherals systems to modify and come introduction and systems to monitor the might and give way the building blocky of the net income, with the goal to hand over elevated availability and skill to put forward the inevitably of the mesh topology drug uptakers. The reliability, availability and comme il faut capacity of net income imaginativenesss is critical to the casual matte r of the Companies.Each member of the Companies community (students, faculty, provide, and guests) is anticipate to cherish the fair play of the interlocking and to cognize and mystify to Companies rules, regulations and guidelines for their leave map. Regulations that reign over in-person portion out and use of Companies facilities also apply to the use of meshwork resources. * Components of the meshwork Infrastructure policy * take away theatrical role * insufferable Use * nettle Restrictions * Request for rating deal thisChapter 2 Why protective cover measures is NeededComponents of the net Infrastructure Policy * * Connecting Devices to the meshing * The campus interlocking is a shargond resource. It is thus needful to strike a counterpoise amidst enabling opportunities for teaching and research, and protect the fairness of net profit resources. To this end, Companies moldinessiness be hurt a bun in the oven-to doe with in the planning, acquisi tion, maintenance, and on-going touch baseivity of all profits devices. This pull up stakes ensure the appropriate profit design, interoperability of components and integrity of functioning.If a device is attached to the lucre infrastructure without forward consultation, Companies can non pledge the on-going connectivity and prudish operation of the device. * * Wireless Network Equipment The chase and use of tuner cyberspaceing (802. 11a, 802. 11b & 802. 11g, Wi-Fi) is evolving rapidly. every lucre use policies apply to the use of wireless LAN technology. Wireless approaching to Companies resources which testament be secured through a primal aut chicktication system, except for pickyized departmental needfully.The comp all pull up stakes work with soul departments and colleges to help address their special needs for wireless technology. * * Domain draw benefit net profit servers for schoolman departments or administrative units serving campus related c ultivation whitethorn need DNS entries set up for the server. Requests for DNS entries lead need to be submitted to the Networking unit of Companies for approval. No new(prenominal) DNS server should be setup by other campus units. DNS call testament non be assumption to a server set up for roughlyone(prenominal)ised use, much(prenominal) as a ad hominem weather vane server.Any web locate served on the web servers maintained by Companies much(prenominal) as www. uww. edu, facstaff. uww. edu, and students. uww. edu ordain fly the coop the appropriate path call as universal resource locator no DNS name ordain be given over. Occasionally members of the Companies community whitethorn helper an organization that is loosely connected with the Companies. These organizations whitethorn be of captain, scholarly, partnership or entrepreneurial nature. Under certain fortune it whitethorn be appropriate for these organizations to patronage DNS names other than uww. edu , charm hosting them in the Companies domain.Provided that the use of these domains support the Companiess cathexis and be logical with all relevant Companies policy, Companies whitethorn host them within the uww. edu domain. approval and rhythmical review of these domains go away be conducted on a case-by-case backside by the Chancellor and the CIO. Additionally, there atomic number 18 skillful foul criteria that must be met, such(prenominal) as 1. Servers in the domain must house in the McGraw info center. 2. This pass off must be listed as the technical hitting with the registrar**, so that others atomic number 18 witting of some(prenominal) changes and can act appropriately. 3.Only UW-W DNS servers should be specified to the registrar * * dynamical swarm Control Protocol The DHCP improvement delivers IP information to campus workstations to provide Internet connectivity. The of import DHCP answer and the management of IP assignments is administered by Companies. No other DHCP service should be set up on campus without prior consultation with Companies, and nonwithstanding to examine special(prenominal) administrative or academic needs. * removed Access to Network Resources enchantment web find is sufficient for the bulk of Companies educational and business activities there atomic number 18 almost instances when direct access to lucre resources is necessary.To enable remote access to network resources in a secure mode that protects confidentiality and integrity of Companies and personal information realistic closed-door Networking is a method by which a user can access UWWs internal network via the internet in a secure mode through a firewall or mistakable earnest layer. Remote access for some campus serve, such as email and subroutine library entropybases, may be addressed in kick downstairs campus policies. authentic users must save connect to the Companies network from calculators that accommodate to the Network Infrastructure Use Policy credentials requirements.This includes ensuring that calculators atomic number 18 fully patched with the in vogue(p) operate system updates and have new antivirus computer softw ar. Appropriate UseListed below atomic number 18 the policies that govern data network access and recitation for students, staff and faculty at the Companies of Wisconsin Whitewater. 1. definitive users Authorized users be (1) current faculty, staff, and students of the Companies (2) singulars connecting to a public information service support on the Campus network and (3) others who are specifically allow to use a fussy calculate or network resource by the campus unit responsible for the resource. . planetary Guidelines Those who use the campus network resources are expect to do so responsibly, that is, to comply with assert and federal legal philosophys, with this and other policies and procedures of the Companies, and with ruler standards of prof essional and personal courtesy and conduct. 3. Security instruction warranter measures at Companiesis everyones responsibility. To maintain security in using the campus network services, it is important to amaze to the chase guidelines * Protect your login ID and password.Computer accounts, passwords, ids and other types of leave are assign to individual users and should not be divided up with others. * Be awake that the person to whom an account is assigned allow be held accountable for any action mechanism originating from that account. * Do not access data or systems for which you have not been given specific authority. * Take concludeable steps to ensure that your desktop or laptop computer system does not crap a security try when connected to the network, including keeping anti-virus software package and operational patches up-to-date. announce security violations. 4. Confidentiality Information storeho utilize on computers is considered confidential, whether protected by the computer system or not, unless the owner intentionally makes that information on hand(predicate) to other groups or individuals. The Companies of Wisconsin Whitewater takes the mental attitude that computer users desire that the information that they store on central and/or campus shared primer coat resources remain confidential.While all efforts pass on be made to ensure confidentiality, users should be aware(p) that data (including e-mail) might, due to software or hardware failure, become brotherly to those Companies who are not authorized for that access. Companies force may also on do have access to such data while execute routine trading operations or pursuing apparent systems or user problems. No guarantee of set down silence is made or implied by this policy. Requests for the manifestation of confidential information will be governed by the provisions of the Family educational Rights and silence Act of 1974 (FERPA) and the Wisconsin Open Rec ords Statutes .All such requests will be honored only when canonical by Companies officials who are the level-headed custodians of the information requested, or when required by articulate or federal law, or court order. Users found to be copying, modifying, or other than accessing information for which they have not been disposed(p) permission may be unresistant to disciplinary action. Unacceptable UseNetwork resources at this Companies may not be used for criminal activities, commercial purposes not associated with the Companies, or uses that smash other Companies policies or guidelines.The following activities are NOT acceptable use of the campus network resources * Damaging or performing unlicenced removal of networking equipment, software or data * Tampering with network hardware, wiring, or software * Disrupting or interfering with the normal operation of network communications, generating excessive network application or performing unlicensed monitor of network traff ic * willfully introducing computer viruses or other riotous programs into the Companies network, which are intended to damage or fashion excessive load on network resources * Intentionally violating or attempting to beltway network security strategies * victimization illegitimate accounts, passwords, IP addresses or other network access information * Accessing or modifying any software, files, data or other Companies information for which an individual has not been given dominance * victimization network resources to harass or constrain others * Using network resources to portray others or to forge anothers identity * hinder with the calculation activities of others. * Setting up network services or equipment without knowledge or involution of Companies. * Violating state, federal or right of first publication laws * Using network resources for commercial practise or financial gain which does not conform to UW-W rules and regulations Access RestrictionsAccess to campus network resources may be wholly or partially curb by the Companies without prior plug-in and without the react of the user when 1. required by and consistent with law 2. when there is reason to gestate that violations of policy or law have taken regularise 3. hen the continue access/use of network resources by an individual significantly affects the integrity, performance, or security of the campus network as a unanimous The individual will be notified of the reason and duration of the access obstruction as soon as possible. Access will be restored when the situation has been resolved. These are general Companies policies departments or other units may place additional restrictions on the resources that they manage. field cited http//www. uww. edu/icit/ nerve/policies/network/infrastructure. htmlg3ctoolkit. net/ /IT_Infrastructure_Security_ join estate www. wokingham. gov. uk/EasysiteWeb/getresource. axd?It Infrastructure Security PolicyUNIT 6 ASSIGMENT 1 IT Infrastructu re Security Policy Purpose of the Network InfrastructureThe Companies values openness and promotes access to a wide range of information accordingly, the campus information systems have been designed to be as open as possible.The Companies network consists of data cables and jacks from the wiring closets to the users work station, or wireless access points to a users PC copper and optical data communications cables Ethernet switches, routers, servers, and peripherals systems to enable and manage access and systems to monitor the capacity and maintain the integrity of the network, with the goal to provide high availability and capacity to support the needs of the network users. The reliability, availability and adequate capacity of network resources is critical to the day-to-day function of the Companies.Each member of the Companies community (students, faculty, staff, and guests) is expected to protect the integrity of the network and to know and adhere to Companies rules, regulatio ns and guidelines for their appropriate use. Regulations that govern personal conduct and use of Companies facilities also apply to the use of network resources. * Components of the Network Infrastructure Policy * Appropriate Use * Unacceptable Use * Access Restrictions * Request for EvaluationRead thisChapter 2 Why Security is NeededComponents of the Network Infrastructure Policy * * Connecting Devices to the Network * The campus network is a shared resource. It is therefore necessary to strike a balance between enabling opportunities for teaching and research, and protecting the integrity of network resources. To this end, Companies must be involved in the planning, acquisition, maintenance, and on-going connectivity of all network devices. This will ensure the appropriate network design, interoperability of components and integrity of operation.If a device is connected to the network infrastructure without prior consultation, Companies cannot guarantee the on-going connectivity and proper operation of the device. * * Wireless Network Equipment The interest and use of wireless networking (802. 11a, 802. 11b & 802. 11g, Wi-Fi) is evolving rapidly. All network use policies apply to the use of wireless LAN technology. Wireless access to Companies resources which will be secured through a central authentication system, except for specific departmental needs.The company will work with individual departments and colleges to help address their special needs for wireless technology. * * Domain Name Service Internet servers for academic departments or administrative units serving campus related information may need DNS entries set up for the server. Requests for DNS entries will need to be submitted to the Networking unit of Companies for approval. No other DNS server should be setup by other campus units. DNS names will not be given to a server set up for personal use, such as a personal web server.Any web site served on the web servers maintained by Companies such as www. uww. edu, facstaff. uww. edu, and students. uww. edu will carry the appropriate path names as URL no DNS name will be given. Occasionally members of the Companies community may sponsor an organization that is loosely affiliated with the Companies. These organizations may be of professional, scholarly, partnership or entrepreneurial nature. Under certain circumstances it may be appropriate for these organizations to hold DNS names other than uww. edu , while hosting them in the Companies domain.Provided that the use of these domains support the Companiess mission and are consistent with all applicable Companies policy, Companies may host them within the uww. edu domain. Approval and regular review of these domains will be conducted on a case-by-case basis by the Chancellor and the CIO. Additionally, there are technical criteria that must be met, such as 1. Servers in the domain must reside in the McGraw data center. 2. This progress must be listed as the technical contact wi th the registrar**, so that others are aware of any changes and can respond appropriately. 3.Only UW-W DNS servers should be specified to the registrar * * Dynamic Host Control Protocol The DHCP service delivers IP information to campus workstations to provide Internet connectivity. The central DHCP service and the management of IP assignments is administered by Companies. No other DHCP service should be set up on campus without prior consultation with Companies, and only to meet specific administrative or academic needs. *Remote Access to Network Resources While web access is sufficient for the majority of Companies educational and business activities there are some instances when direct access to network resources is necessary.To enable remote access to network resources in a secure manner that protects confidentiality and integrity of Companies and personal information Virtual Private Networking is a method by which a user can access UWWs internal network via the internet in a se cure manner through a firewall or similar security layer. Remote access for some campus services, such as email and library databases, may be addressed in separate campus policies. Authorized users must only connect to the Companies network from computers that conform to the Network Infrastructure Use Policy security requirements.This includes ensuring that computers are fully patched with the latest operating system updates and have current antivirus software. Appropriate UseListed below are the policies that govern data network access and usage for students, staff and faculty at the Companies of Wisconsin Whitewater. 1. Authorized users Authorized users are (1) current faculty, staff, and students of the Companies (2) individuals connecting to a public information service supported on the Campus network and (3) others who are specifically authorized to use a particular computing or network resource by the campus unit responsible for the resource. . General Guidelines Those who use the campus network resources are expected to do so responsibly, that is, to comply with state and federal laws, with this and other policies and procedures of the Companies, and with normal standards of professional and personal courtesy and conduct. 3. Security Information security at Companiesis everyones responsibility. To maintain security in using the campus network services, it is important to adhere to the following guidelines * Protect your login ID and password.Computer accounts, passwords, ids and other types of authorization are assigned to individual users and should not be shared with others. * Be aware that the person to whom an account is assigned will be held accountable for any activity originating from that account. * Do not access data or systems for which you have not been given specific authority. * Take conceivable steps to ensure that your desktop or laptop computer system does not create a security risk when connected to the network, including keeping anti- virus software and operating patches up-to-date. Report security violations. 4. Confidentiality Information stored on computers is considered confidential, whether protected by the computer system or not, unless the owner intentionally makes that information available to other groups or individuals. The Companies of Wisconsin Whitewater takes the position that computer users desire that the information that they store on central and/or campus shared computing resources remain confidential.While all efforts will be made to ensure confidentiality, users should be aware that data (including e-mail) might, due to software or hardware failure, become accessible to those Companies who are not authorized for that access. Companies personnel may also on occasion have access to such data while performing routine operations or pursuing apparent systems or user problems. No guarantee of complete privacy is made or implied by this policy. Requests for the disclosure of confidential information will be governed by the provisions of the Family Educational Rights and Privacy Act of 1974 (FERPA) and the Wisconsin Open Records Statutes .All such requests will be honored only when approved by Companies officials who are the legal custodians of the information requested, or when required by state or federal law, or court order. Users found to be copying, modifying, or otherwise accessing information for which they have not been granted permission may be liable to disciplinary action. Unacceptable UseNetwork resources at this Companies may not be used for unlawful activities, commercial purposes not associated with the Companies, or uses that violate other Companies policies or guidelines.The following activities are NOT acceptable use of the campus network resources * Damaging or performing unauthorized removal of networking equipment, software or data * Tampering with network hardware, wiring, or software * Disrupting or interfering with the normal operation of network communic ations, generating excessive network activity or performing unauthorized monitoring of network traffic * Willfully introducing computer viruses or other disruptive programs into the Companies network, which are intended to damage or create excessive load on network resources * Intentionally violating or attempting to bypass network security strategies * Using unauthorized accounts, passwords, IP addresses or other network access information * Accessing or modifying any software, files, data or other Companies information for which an individual has not been given authorization * Using network resources to harass or intimidate others * Using network resources to impersonate others or to forge anothers identity * Interfering with the computing activities of others. * Setting up network services or equipment without knowledge or involvement of Companies. * Violating state, federal or copyright laws * Using network resources for commercial activity or financial gain which does not confo rm to UW-W rules and regulations Access RestrictionsAccess to campus network resources may be wholly or partially restricted by the Companies without prior notice and without the consent of the user when 1. required by and consistent with law 2. when there is reason to believe that violations of policy or law have taken place 3. hen the continued access/use of network resources by an individual significantly affects the integrity, performance, or security of the campus network as a whole The individual will be notified of the reason and duration of the access restriction as soon as possible. Access will be restored when the situation has been resolved. These are general Companies policies departments or other units may place additional restrictions on the resources that they manage. Work cited http//www. uww. edu/icit/governance/policies/network/infrastructure. htmlg3ctoolkit. net/ /IT_Infrastructure_Security_ United Kingdom www. wokingham. gov. uk/EasysiteWeb/getresource. axd?

No comments:

Post a Comment