Example policy elements and their role in bandwidth management and optimisation.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

1 Bandwidth management essentials Issues for technical staff and technical solutions.
Northside I.S.D. Acceptable Use Policy
Let’s Talk About Cyber Security
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
ICT & Crime Cyberslacking. What is Cyberslacking? Cyberslacking is wasting time (usually online) when you should be working Either at work or at school.
Boyertown Area School District Acceptable Use Policy.
Security, Privacy, and Ethics Online Computer Crimes.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Riverside Community School District
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lesson 19: Configuring Windows Firewall
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
1 Enabling Secure Internet Access with ISA Server.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Fermi Computer Incident Response Team Computer Security Awareness Day March 8, 2005 Michael Diesburg.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Internet Security facilities for secure communication.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Lesson 11: Configuring and Maintaining Network Security
Network Security & Accounting
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
Information Systems Unit 3.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
Role Of Network IDS in Network Perimeter Defense.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Computer Security Sample security policy Dr Alexei Vernitski.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Information Technology Acceptable Use An Overview
Enabling Secure Internet Access with TMG
CONNECTING TO THE INTERNET
Systems Security Keywords Protecting Systems
Server Security Policy
Message Digest Cryptographic checksum One-way function Relevance
Firewalls Jiang Long Spring 2002.
Security.
FIREWALL.
Presentation transcript:

Example policy elements and their role in bandwidth management and optimisation

Warning These are not all necessarily recommended elements and approaches Presented just as ideas and suggestions Adoption should only be considered on a case by case basis

UNAM Electronic communications facilities (such as ) are for company related activities only. –Could be used as the basis to block Web sites or protocols that are not deemed within the core business of the organisation –Monitoring of traffic might show certain entertainment Web sites being high users if bandwidth, these could then be blocked using a proxy cache MP3 traffic could be blocked using your firewall and only opened to users who could demonstrate a business need for such information –The emphasis could then be on the blocked user to demonstrate the business need of the activity in question

University of Bristol The following will also be treated as contravening these regulations: (a) any action that would impair the function or security of the University's computer network; –Could be used as the basis to take appropriate action against anyone who attempts to work around any BMO technologies you put in place E.g. someone trying to disguise traffic through your firewall Someone not using your proxy cache server (although if well implemented then that should not be possible)

University of KwaZulu-Natal scanning all incoming message and file downloads for malicious codes such as viruses or Trojan Horses –This would allow you to configure your mail server to reject infected messages without the need to inform users –A security issue –No need to accept complaints that users are having their s rejected

UCT the University reserves the right to restrict or otherwise control the use of any of the internet protocols (This right to restrict may include the right to set a limit on individual usage by volume for undergraduate students, postgraduate students and staff) –Allows for the implementation of user quota system –Restrict users (individuals or groups) to set volumes and that these volumes could differ between users or groups

University of Natal Violations of this policy will be handled in accordance with procedures established in the Conditions of Service or the Rules for Student Discipline. –Regular abusers of any rules or regulations can be reported by the ICT department to the appropriate authorities to take further action –Or they can be contacted directly with the warning that the appropriate disciplinary procedures will be started if their behaviour does not change

But things need to be two way UCT reserves the right to interrogate electronic records held by UCT, but this right will not be exercised without the written permission of the Vice- Chancellor –You can monitor users Web traffic and act on any patterns that you deem appropriate –But, this will not be done just at the discretion of the system administrator