Preview

Network Access and Authentication Policy Created: 1/12/2014

Good Essays
Open Document
Open Document
1461 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Access and Authentication Policy Created: 1/12/2014
Richman Investments
Policy: Network Access and Authentication Policy Created: 1/12/2014 Section of: Corporate Security Policies Target Audience: Technical CONFIDENTIAL Page: 1 of 5
Richman Investments is hereinafter referred to as “the company.”
1.0 Overview
Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.
2.0 Purpose
The purpose of this policy is to describe what steps must be taken to ensure that users connecting to the corporate network are authenticated in an appropriate manner, in compliance with company standards, and are given the least amount of access required to perform their job function. This policy specifies what constitutes appropriate use of network accounts and authentication standards.
3.0 Scope
The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.
Richman Investments Confidential

Richman Investments
Policy: Network Access and Authentication Policy Created: 1/12/2014 Section of: Corporate Security Policies Target Audience: Technical CONFIDENTIAL Page: 2 of 5
4.0 Policy
4.1 Account Setup During initial account setup, certain checks must be performed in order to ensure the integrity of the process. The

You May Also Find These Documents Helpful

  • Good Essays

    1. Every device connected to the Richman Investments network must comply with the Access Control Policy…

    • 441 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This policy applies to all Richman Investment employees, contractors, vendors and agents with a Richman Investment -owned or personally-owned computer or workstation used to connect to the Richman Investment network. This policy applies to remote access connections used to do work on behalf of Richman Investment including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    All Richman Investments agents, vendors, contractors, and employees, who use either Richman Investments company property or their own personal property to connect to the Richman Investments network, are governed by this policy. The scope of this policy covers remote connections, used to access or do work on behalf of Richman Investments, including, but not limited to, the viewing or sending of e-mail, and the viewing of intranet resources.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Good Essays

    All messages composed, sent, received, or stored on the e-mail system are and remain the property of the company. They are not the private property of the employee. Personal e-mail accounts are not to be used on the company’s computer system.…

    • 696 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    * Develop and implement a structured flexible work environment security policy. A concise, structured policy for telecommuting…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    What Is A Security Policy? A Security Policy is a plan outlining what the critical assets are and how they must (and can be) protected. Its main purpose is to provide staff with a brief overview of the acceptable use of any of the information assets as well as explaining about conduct and what is deemed as allowable and what is not. This document is a ‘must read’ source of information for everyone using in any way systems and resources defined as potential targets. The start procedure for a security policy requires a complete exploration of our network, as well as every other critical asset, so that the appropriate measures can be effectively implemented. Everything starts with identifying our critical information resources…

    • 676 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Conklin et al (2012, “Information Security Policy”) states, “policy is the essential foundation of an effective security program,” and “the centrality of information security policies to virtually everything that happens in the information security field is increasingly evident.” Webopedia.com defines security policy as “a document that outlines the rules, laws, and practices for computer network access” (2013, “Security Policy”). The document regulates how an organization will manage, protect, and distribute its sensitive information. Information security policy addresses many issues such as the following: disclosure, integrity, and availability concerns; who may access what information in what manner; maximized sharing versus least privilege; separation of duties; and who controls and who owns the information.…

    • 1099 Words
    • 5 Pages
    Better Essays
  • Better Essays

    May 9, yAs new technology emerges, the Internet evolve and computer network gets bigger and bigger, the need for network security has become one of the most important factors for all organizations and companies to consider (Popescu, 2013). Network security is important for an organization or company’s well being. Increasing network security decreases the change privacy spoofing, identity or information theft. Network security is something that companies should take seriously. An unsecured network system can comprises a company’s files and reputations all at the same time. An organization needs to use a tool that will ensure security efficiency and monitoring. North Shore Medical Research (NSMR)…

    • 1007 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    An organisational policy is expected to do many things. Primarily it should protect people and information, as well as set the rules for expected behaviour by users, system administrators, management and security personnel. It should also authorise relevant personnel to monitor, probe, investigate, define and authorise the consequences of violations, in addition to defining the company’s baseline stance on security. This can help minimise risk and help track compliance with appropriate regulations.…

    • 1668 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Icas Inkwell

    • 359 Words
    • 2 Pages

    Company’s employees do not comply with the policy. Passwords are not kept secret and had not been changed since they were set-up. Every computer uses the same password. Unauthorised people have access to the computers, which may lead to fraud.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Rio Grande Supply Co

    • 650 Words
    • 3 Pages

    * Has an Internet use policy that employees weren’t to use the company’s computers for anything but business-related activities.…

    • 650 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT personnel, students, and staff are also considered security risks and therefor the proper level of user security awareness training, workshops, and seminars should be provided to users on the network. Other security measures such as an acceptable usage policy and password policies should be properly implemented to ensure users are responsible for and understand their actions on the network. In addition, it would be best practice to implement the…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    9. a. Policy – Written policies are one of the first steps in the inception of this team. A policy provides a written set of principles, rules, or practices within an organization; Policies are one of the keystone elements that provide guidance as to whether an Incident has occurred in an organization. It can also show management buy-in and support of the team. A simple login banner can be one way to ensure that individuals attempting to log into an organization’s network will be aware of what is expected when…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The purpose of this policy is to define standards for connecting to Corona District High School's network from any host. These standards are designed to minimize the potential exposure to Corona District High School from damages which may result from unauthorized use of Corona District High School resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Corona District High School internal systems, etc.…

    • 848 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    -Policy will be implemented to document all security policies and operation policy to secure cardholder data that will be stored in company database. (System/Application Domain & LAN Domain & Remote Access Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays