You are on page 1of 3

Davonte Brown unit 4 assignment 1

NT2580: Unit 4 Enhance an Existing IT ecurit! "o#ic!


$ramewor%
You are a networking intern at Richman Investments. You recently developed a design for a remote
access control policy that indicated access controls for systems, applications, and data access.
The senior network administrator would like you to get experience with the company's IT security policy
framework. Following is an illustration of a portion of the policy framework
& ITT E'ucationa# ervices "age 1
Davonte Brown unit 4 assignment 1
NT2580: Unit 4 Enhance an Existing IT ecurit! "o#ic!
$ramewor%
This Essay Ill be presenting 10 practices that are essential to making education meaningful
and rich for all students, examining brain research and how it can be applied to the
classroom. It incorporates information about learning styles and standards into a classroom
instructional model for teachers. The 11 chapters are as follows !1" #$reating an Enriched
and Emotionally %upporti&e En&ironment#' !(" #)sing a *ariety of Teaching %trategies That
+ddress ,ifferent -earning %tyles#' !." #%trategies That /elp %tudents 0ake $onnections
1rom 2rior -earning and Experiences to 3ew -earning and +cross ,isciplines#' !4"
#Teaching for -ong5Term 0emory is a 2rimary 6oal' !7" #Integrating /igher5-e&el Thinking
%kills Into -earning' !8" #$ollaborati&e -earning is an Integral 2art of the $lassroom#' !9"
#:ridging the 6ap :etween +ll -earners, ;egardless of ;ace, %ocioeconomic %tatus, %ex, or
$reed#' !<" #E&aluating -earning Through a *ariety of +uthentic +ssessments#' !="
2romoting ;eal5>orld +pplication of the -earning#' !10" #%eamless Integration of
Technology for /igh5 ?uality Instruction#' and !11" 2utting It +ll Together.# !$ontains 71
references." !%0".
! remote access policy is a server protocol that defines how users on a remote area network may
use the server. It specifies who may access the network and how the network may "e accessed,
determines the speed of the access, and defines any restrictions on what data and hardware may "e
accessed "y users. In common server software such as #icrosoft $indows %erver &''( the server
administrator is given the a"ility to set these permissions through the use of the Remote !ccess
)olicy $i*ard. In order to protect information, "usinesses need to implement rules and controls around the
protection of information and the systems that store and process this information. This is commonly achieved
through the implementation of information security policies, standards, guidelines and procedures. +owever,
what exactly are these,
This article will explain what information security policies, standards, guidelines and procedures are, the
differences "etween each and how they fit together to form an information security policy framework. Remote
!ccess refers to the a"ility to access -#$ network resources while off campus. %ecurity
measures for remote access should "e implemented "ased on sensitivity and risk to -niversity
systems and data. ! virtual private network ..)/0 connection must "e esta"lished during the off(
site remote access of sensitive IT systems 1e.g. all systems storing 2highly sensitive3 data as
defined in -#$3s 4ata 5lassification %tandard0, to insure all exchanges of sensitive information
& ITT E'ucationa# ervices "age 2
Davonte Brown unit 4 assignment 1
NT2580: Unit 4 Enhance an Existing IT ecurit! "o#ic!
$ramewor%
are encrypted. 1!n exception to this is individual access to 6anner %elf %ervice, which is granted
"y default to all faculties, staff and students for we" "ased self7service processing.0
!uthentication to Internet /ative 6anner is restricted per the !dministrative 4ata !ccess )olicy
and re8uires the use of .)/ for remote access.
!ll remote file transfers of either 2highly sensitive3 or 2protected3 data, as defined in -#$3s 4ata
5lassification %tandard, must utili*e encryption 1e.g. sftp, https0.
.)/ access is limited to Faculty and %taff. 6y default and is authenticated against the
!99:-#$:Faculty:%taff %ecurity ;roup in !ctive 4irectory. %tudents do not have .)/
capa"ilities.
! 5ontractor, Tempory, or .olunteer worker re8uiring .)/ access must fill out a compulsory form
in +uman Resources prior to "e granted access. They will re8uire a -#$ sponsor who must
su"mit the re8uest to the I%< for final approval. <nce approved, they will "e entered into
6anner where"y an account will then "e created in 6anner and !4. -sers using non7university
owned e8uipment must follow IT #alicious 5ode )rotection %tandard.
Records logging remote connections must "e maintained and reviewed according to the
-niversity #onitoring and 9ogging )rocedure.
.)/ authentication is re8uired in addition to network authentication to remotely access "ackend
servers and is limited to local accounts provisioned "y the %erver !dministrator. Infrastructure
e8uipment authentication is maintained on the T!5!5%. 9ocal !ccounts are provisioned for
/etwork %ervices staff only. That was my essay hope you en=oyed.
Read more http>>www.ehow.com>how:?'&&@(@:create7remote7access7policy.html
http@@eric.ed.go&@AidBE,4490<7
http@@www.ehow.com@howC70((4.4Ccreate5remote5access5policy.html
http@@mindfulsecurity.com@(00=@0(@0.@policies5standards5and5guidelines@
http@@technology.umw.edu@it5policies@remote5access5standard@
& ITT E'ucationa# ervices "age )

You might also like