This website uses cookies to ensure you have the best experience. Learn more

How To Plan For Security Essay

1935 words - 8 pages

How to Plan for Security
i). Statement of Policy
This policy statement seeks to address the optimum and responsible use of the wireless local area network WLAN facility available at the university in relation to specific network security issues. The issue of concern in this policy is the promotion of responsible use of the WLAN facility among the university’s student and workers. The strategy aims at preventing security problems that may arise from the misuse and malicious exploitation of the facility by people granted approval to access the university’s WLAN information systems.
a) Scope and Applicability
The scope of this policy statement covers the hardware, software and access protocols ...view middle of the document...

ii). Authorized Access and Usage of Equipment
The WLAN has been designed to offer unlimited communication, data sharing, and limited access to information stored on university server stations as described by the specific user-access protocols for all students and staff.
a) User Access
User access for the WLAN’s information system is regulated through various verification and encryption configurations managed by the network administrators (Curt, 2010, P26). Access is granted through login and password authentication for computers, laptop and mobile devices. They are installed in the various learning facilities in the premises and those owned by students.
b) Fair and Responsible Use
The WLAN is available to all registered students at the university and to authorized workers in their respective workstations. The users of the WLAN facility are advised and required to exercise reasonable and adequate measures in ensuring ethical use of the network and to avoid actions that may infringe on the right of others to using the network.
c) Protection of Privacy
In as much as data encryption and login authentication are concerned, measures have been taken towards ensuring privacy (Krishna, 2005, P.46).
iii). Prohibited Usage of Equipment
Certain policies are defined that guide the student and worker use of equipment owned by the university consisting of the WLAN network and computer facilities.
a) Disruptive Use or Misuse
The university, through this policy document, prohibits the inappropriate, disruptive and consequently illegal use of the WLAN facility by the members granted access to the facility.
b) Criminal Use
Criminal use constitutes such activities which are prohibited by this document and are tantamount to the breach of set guidelines for this policy, and the set laws governing the ICT industry. Activities aimed at compromising the data stored on the server systems and client stations, disruption of services provided by the information system, and those aimed at illegally accessing unauthorized information will be liable to legal action (Denis, 2005, P.13).
c) Offensive or Harassing Materials
The posting of material which might be considered to be infringe on the access privileges and privacy of individuals who either use the facility or constitute the general public is prohibited. The users of the WLAN facility are prohibited from posting and sharing of information which contravene this requirement either on computer facilities provided by the university or on computers and portable devices owned by members of the university fraternity.
d) Copyrighted, Licensed, or Intellectual Property
Users of the WLAN facility are expected to observe respect for intellectual property. This may include restrictions relating to downloading of copyrighted literature, software and multimedia material to and from the network’s server storage (Migga, 2008, P.29). Sharing of such material by transmission through the network is however beyond the scope of limit...

Other Papers Like How to Plan for Security

To What Extent Is Security a Necessary Precondition for Development?

3117 words - 13 pages To what extent is security a necessary precondition for development? Introduction It is put forward that security is not necessarily a precondition for development, but rather, both concepts of security and development are inextricably linked. With neither one being predominant over the other; rather the influence of both oscillate, dependent upon the individual circumstances within the State or region. In essence, what this answer

How to Prepare for Interview Essay

648 words - 3 pages will mention a specific situation and ask you to explain how you dealt with it; Questions often focus on transferable skills which demonstrate your ability to deal with specific situations; Do an online search on “behavioural based” interview questions so that you can see some of the scenarios you may encounter during this type of interview Tips for behavioural interviews Use the BAR formula to respond to questions: Background, Action, and

How to Prepare for Interview

653 words - 3 pages Professionalism Paper It is very important if you are working in the medical field to make sure are professional at all times. I think that its a important factor because we have the care of another person in our hands and they are trusting us. I think it would be hard for a person to trust someone with their care if they are not dressed for the part. Its just not what you have one, it’s also about how you look over all. Its very

How to Manage for Dummies

2387 words - 10 pages . Instructions for how to do this are included at the end of the Microsoft Word template provided on the subject website. You should submit the question(s) for which you are the leader on the subject website (under ‘Assessments … Group Assignment’). A separate link will be provided for each question. Only one Microsoft Word file should be submitted per question and it should only include the answer to that question. You will be assessed based on

How to Use Twitter for Business

932 words - 4 pages three methods, I prefer twhirl, a desktop app that has some nice added features and updates my incoming tweets in the background while I work. A quick peek at some recent posts–called “tweets”–include what people are having for breakfast, vague unease about a job interview and a complaint that raw vegetables make one’s mouth “itchy.” (Plus a bunch of non-English tweets that may range from the ridiculous to the sublime and back again.) How Does

How To Apply For A Job

751 words - 4 pages Stage 4 How would you apply for this job? For this position I would write a letter or CV including the company name, address and the person who will be receiving it who will be Natalie Chalmers. I will make sure the letter is specific for the job and it grabs the reader’s attention to let them know why my letter of CV is worth reading. My letter will be written in a formal document that gives information about me, my personality and what I

Human Resource Policy Merger Plan. Paper Attempts To Specify The Plan For Merging Two Very Distinct Companies HR Policies

1481 words - 6 pages assignment, we'll discuss how a simulated merger of two shoe companies, Skechers USA, Inc., and Johnston & Murphy, Inc., integrate their respective human resource polices to accommodate their two separate organizational cultures. We'll provide a brief history of the two companies, along with some supplemental information, and make proposals on how to integrate the most vital issues facing the cultural differences of the two organizations, such as

How Successful Would You Consider The 5 Years Plan To Be?

751 words - 4 pages generally successful, since less people were needed for the farms, and everyone had to work hard. The success in collectivization caused the industrialization of the USSR, to be more successful. In producing the raw materials, the workers have to achieve goals in productivity, with propagandas that was used often to increase the morale of the workers. The five years plan had been successful in making Russia a better country, which the most important

How Important It Is for a Woman to Work?

5938 words - 24 pages conditions, since the very nature of the work ensured that this was a wartime measure only. In April 1941 the Australasian Council of Trade Unions (ACTU) called a conference to discuss the question of women’s rates of pay. It had recognised the inevitability of women’s entering men’s jobs, and sought to defend conditions and post-war job security by supporting claims for equal pay and calling on the ALP to implement it. ‘The conference affirms the

How to Ask Someone Out for a Date

669 words - 3 pages Essay Writing (How to Ask Someone Out For a Date) Everybody fears rejection on asking someone out for a date; otherwise, there is no school for that kind of lesson. Actually we have to risk the possibility of rejection every once in a while in order to get the things we want. Asking someone out for a date would be easy without losing your sense of confidence and self-worth if you follow all of these steps below. First and foremost, being

Security Plan

952 words - 4 pages also collaborate with the business that they share the hallway with in order to use their back door if necessary. After preparing this security plan for Western Cash Advance I believe it will be a much safer environment for everyone involved. When you are dealing with a business of this type you need to take all security measures as well as safety necessary. When the risk assessment was done on this establishment I was shocked to see how minimal

Related Essays

How To Plan A Party Essay

640 words - 3 pages English Composition 101-309 10/15/2011 How to plan a party Planning a birthday a party can be fun and exciting. The anticipation that the planner feels waiting for the reaction of the birthday person brings as much, if not more joy, than it will bring to the person the party is being thrown for. When planning a party there are many important details to be remembered: location, guest list, decorations, and food. Organization is a

How To Devlope A Communication Plan

846 words - 4 pages audit, 3. membership surveys and focus groups, 4. committee and leadership input, and 5. discussions with other staff and departments. How to Develop the Plan Take the following steps to develop an effective communication plan: Conduct a research-communication audit. Evaluate your current communications. Some associations hire firms to do this, but the price for the objectivity of an outside auditor can be high. To conduct your own audit

How To Draft A Perfect Trading Plan

1208 words - 5 pages How To Draft A Perfect Trading Plan This 8-step approach to planning paves the way to profitable stock trading. When it comes to trading stocks, it's not about how hard you work. It's about knowing the right things to do, and putting that knowledge to work. Making money in the stock market isn't so hard when you apply a simple skill essential to converting the power of knowledge into profits ... planning! "Plan Your Trade and Trade Your

How To Plan The Perfect Party

768 words - 4 pages Throwing a good party is an art. Everyone can throw a party but it takes someone with experience and the know-how to throw one that all the guests will enjoy. A party can be a horrible experience if there’s no prior planning, direction and organization to make it work out. This essay will be the guide to planning the perfect party for young adults one step at a time. The first step will be choosing the right venue. One should pick a venue