Network Security

Read Complete Research Material

NETWORK SECURITY

Network Security



Network Security

At the Great Catalogs Inc, network allows the company to centralize its data, team work productively. The corporate network is used to connect each computer to each other through a server that will manage access to Internet, mail, access rights to shared documents and collaborative work. Each network user logs in with a username and a password and is authenticated by the server. The user can access data and file sharing.

GCI's Network Security Policy

In GCI there is a hierarchy in terms of employees. It's the same in computers: one computer will play the boss; it is called the enterprise server. This is a more powerful machine than the other which has many responsibilities. This server is managed by the Department of Information Systems (SSI). The person in charge of the server administrator is the only one with access to the server room (Vacca, 2010).

Each employee has an account on his computer secured by a password. When the computer turns the user name and password are requested by the server. It is he who takes care of authenticating the user and allows access to the workstation.

Where an employee has a problem of a computer, he must contact the department of information systems. A person will take control of the remote computer to troubleshoot it, saving him from moving. When it happens, your mouse will start moving by itself! Do not worry!

Access Permissions

The work of the administrator shall include the administration of users. Another way to manage users is by using groups of users, which gives us the ease of implementing the policies of security to specific groups who will inherit these members of the group.

You should take into account the use of firewalls, which will allow us to manage the access to other networks as well ...
Related Ads