Sunday, May 24, 2020

Pixel Security Polict - 2718 Words

Running Head: GROUP E: TEAM PROJECT IT 540: Pixel Security Policy Calesha Turner-Aaron Sophia Wilkes Elizabeth Yeomans Chun Hua Yip Kaplan University Table of Contents Abstract 3 Scope Purpose 4 Electronic mail (E-mail) 5 Network Security 6 Company Equipment 7 Anti-Virus Anti-Spyware Programs†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7-8 Intrusion Detection System (IDS) 8-9 Secure FTP 9 Mail Server 9 Password 10 Server Configurations†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦....11-12 Off-site Backup 12-13 Education Training 13-14 Pixel: Chain Of Command 14 Enforcement 15 Summary 16 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦17-18 Team member Contribution 19 Abstract Pixel produces short animation movies for†¦show more content†¦Ã¢â‚¬ ¢ Bridges, routers and switches and other critical devices will be fitted with UPS and tested monthly. †¢ All antivirus software will be kept up to date and program to run on the initial boot up process, all desktop and laptops will have the same Antivirus Packages installed (www.sans.org). †¢ Work stations are to be turn completely off after working hours. †¢ Unattended workstation equipped with a Common Access Card (CAC) must be removed with the screen locked. †¢ Default passwords will be changed on all critical equipment immediately after installation. Company Equipment The equipment and resources of Pixel Inc. have been obtained for the benefit of the company, and staff or other people have no right to use them for any other purpose. The following is provided outlining proper usage of company owned Window Vista based PC’s, Apple Mac Pro desktops, and Laptops: Acceptable Use: †¢ Only company approved antivirus software is authorized †¢ Personal use of company owned assets are unauthorized during working hours. †¢ Report any unusual computer activity immediately to the IT staff or your immediate supervisor. †¢ All employees are required to attend IT security awareness training prior to operating any computer assets. †¢ Use of social networking sites like

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.