Potential Threats There are many different threats that could potentially disrupt our network, steal or delete confidential data. Hackers are people that attempt to gain unauthorized access to the network by exploiting …show more content…
The network firewall prevents access to different parts of the network depending on how it is configured. A firewall can be either hardware or software, in our case here at Widgets International I will have to suggest in a hardware firewall to be integrated into the network upgrades. This will block hackers or anyone outside our network from gaining access to the information contained within our network. This can also be used to limit the access we allow the users within our network from accessing the internet (Mitchell, …show more content…
I recommend we deploy a domain based network where each user will have to login to the terminal using a supplied username and password. They will only have access to the areas of the network intended to them. A sales reprehensive would have access to sales and inventory, where human resources has access to employees information. This will help reduce the potential threat of a user gaining access to information not intended for them. The domain based network allows you to keep a central administration area where access to any network resource can be granted to the desired user (Thefreedictionary.com, 2014). Computer Use Policy
Objective Widgets international provides network, e-mail, and internet access to our employees as it will benefit us a company. We encourage the use of the provided network, e-mail, and internet access in an appropriate manner as you are representing Widgets International. This policy will contain the guidelines we have set in place for the use of network, e-mail, and internet access.
Scope This policy must be followed by all employees at Widgets International along with all other policies set in place. Widgets International follows all local laws and holds all employees accountable to these local laws as well. All information contained within this policy also will not violate the rights or responsibilities contain is such