Sunday, May 24, 2020
Pixel Security Polict - 2718 Words
  Running Head: GROUP E: TEAM PROJECT    IT 540: Pixel Security Policy    Calesha Turner-Aaron    Sophia Wilkes    Elizabeth Yeomans    Chun Hua Yip    Kaplan University    Table of Contents    Abstract 	3  Scope  Purpose	4  Electronic mail (E-mail)	5  Network Security	6  Company Equipment	7  Anti-Virus  Anti-Spyware Programsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦7-8    Intrusion Detection System (IDS)	8-9  Secure FTP	9  Mail Server	9  Password	10  Server Configurationsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦....11-12    Off-site Backup 	12-13  Education  Training	13-14  Pixel: Chain Of Command	14  Enforcement	15  Summary	16  Referencesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦17-18    Team member Contribution	19    Abstract          Pixel produces short animation movies forâ⬠¦show more contentâ⬠¦Ã¢â¬ ¢ Bridges, routers and switches and other critical devices will be fitted with UPS and tested monthly.        â⬠¢ All antivirus software will be kept up to date and program to run on the initial boot up process, all desktop and laptops will have the same Antivirus Packages installed (www.sans.org).        â⬠¢ Work stations are to be turn completely off after working hours.        â⬠¢ Unattended workstation equipped with a Common Access Card (CAC) must be removed with the screen locked.        â⬠¢ Default passwords will be changed on all critical equipment immediately after installation.    Company Equipment    	The equipment and resources of Pixel Inc. have been obtained for the benefit of the company, and staff or other people have no right to use them for any other purpose. The following is provided outlining proper usage of company owned Window Vista based PCââ¬â¢s, Apple Mac Pro desktops, and Laptops:    	Acceptable Use:        â⬠¢ Only company approved antivirus software is authorized        â⬠¢ Personal use of company owned assets are unauthorized during working hours.        â⬠¢ Report any unusual computer activity immediately to the IT staff or your immediate supervisor.        â⬠¢ All employees are required to attend IT security awareness training prior to operating any computer assets.        â⬠¢ Use of social networking sites like    
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.