StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Networking and Digital Rights - Essay Example

Cite this document
Summary
The paper "Computer Networking and Digital Rights" highlights that generally, with regards to Digital Rights, staff training and Policy will attempt to identify who actually owns software or digital documents downloaded from the Internet and within the company…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Computer Networking and Digital Rights
Read Text Preview

Extract of sample "Computer Networking and Digital Rights"

Empirical indicators that can be used to measure the ‘health’ of IT usage within the company can be achieved with the policy, as it can increase the company’s security; maintain consistent and reliable processes; as well as ensure less idle time and less waste of materials and staff efforts. Hence, the document improves market benefits for the company, as well as reduces costs. It is anticipated that periodic evaluations of the IT policy will reveal that the majority of staff will find IT systems supporting improved management, control, and/or organizational planning, which provide staff with a consistent work environment and encourage the company's culture of collaboration, inclusiveness, and continual improvement. Other benefits to be expected from the Policy are enhanced team spirit; consistency in work performance; staff confidence in the reliability and dependability of co-workers; increased employee satisfaction and decreased perceptions of stress; improved employee morale and training programs; as well as improved customer satisfaction.

Logging and accounting will serve important purposes within the Policy, in that they will aid in the management, tracking, accountability of use, and misuse detection. The logging will especially assist with user monitoring and debugging of the IT systems. Logs can also help to identify and track the intruder if one does get through and provide additional data for other research processes. The Policy will also state the regular frequency of log review and evaluation. The company will use a single firewall program on all its workstations as well as the same version of anti-virus software.

The firewall limits exposure to threats from the Internet and mitigates the client's risk as it inhibits network traffic that does not meet the security policy (e.g. hackers). The anti-virus software and the frequency of mandatory definition updates will be outlined in the Policy. Viruses can destroy critical client data and other company files. The system at Harder and Harder is currently compromised by a worm virus (warez) that has been giving the hackers access and privileges of an authorized network user.

The anti-virus software can attack future viruses and so minimize the risk. However, updated virus definitions are essential to ensure that the software is not rendered useless. And so the Policy addresses these issues. The Policy will aim to discourage employees to use the network in ad-hoc communications, such as with wireless networks. A hacker can attack this system due to the lack of authentication. Ad-hoc networks can allow a hacker to execute a man in middle attacks, denial of service, and/or compromise systems.

Further, the Policy will emphasize education, awareness, and continual improvement among staff. Perception surveys of employee satisfaction, as well as outcome evaluations, will be reviewed to determine the degree of IT security consciousness and knowledge, and compliance with IT policy. The Policy will stipulate ways that security awareness will be increased and maintained, for example through workshops, posters, or in newsletters. Studies show that staffs are more likely to comply with the Policy and to make more of an effort to secure or at least limit behaviors that will put the network at risk.

The Policy will introduce inclusive decision-making staff meetings to come up with IT security solutions.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Networking Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Computer Networking Essay Example | Topics and Well Written Essays - 2250 words. Retrieved from https://studentshare.org/miscellaneous/1529850-computer-networking
(Computer Networking Essay Example | Topics and Well Written Essays - 2250 Words)
Computer Networking Essay Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/miscellaneous/1529850-computer-networking.
“Computer Networking Essay Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/miscellaneous/1529850-computer-networking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Networking and Digital Rights

Evolution of video gaming and computer networking

This paper will seek to provide a basic analysis of evolution of video gaming and computer networking.... This paper will seek to provide a basic analysis of evolution of video gaming and computer networking.... oday there is up to the eight generation of video games and computer networking.... As time went by, computer-networking technology started maturing as in the 1970s, there were introductions of packet based computer technology....
11 Pages (2750 words) Research Paper

Networking researh paper

To begin with wireless networking, the first thing required is a “high speed internet connection at the place where you want to use wireless networking” such as digital subscriber line (DSL) or WI-FI (Software Reviews).... Wireless networking Introduction A wireless network is defined as the type of telecommunication network whose nodes are interconnected without any wires and the remote transmission of information takes place by means of radio waves at the physical level....
5 Pages (1250 words) Essay

Cyber Culture and the Digital Age

This essay "Cyber Culture and the digital Age" discusses the concept and processes of communication that have undergone tremendous changes in the recent past, especially in terms of the transition from letter correspondence to emails and other technologies used in sending and receiving messages.... The constant advances in digital technology also have made available a wide variety of devices such as I-pads, I-pods, smartphones, etc that enable people to easily get connected to the internet due to which they constantly remain engaged with computers, the internet, and other devices....
7 Pages (1750 words) Essay

Data Communication and Networking

This computing technique gave birth to the modern form of networking and the concepts of "client" and "server".... The author concludes that networking may continue to expand to the extent where you may actually be able to use the webcam placed in your refrigerator to check whether you need any milk while coming home from the office.... Such will be the power and importance of networking in the years to come.... In addition, networking also helps in reducing the cost of saving work in different soft copies and hard copies since it allows the sharing of work....
8 Pages (2000 words) Term Paper

Wireless networking

It is widely used in home computer networking connections.... networking is the linking of two or more computing devices together with or without cables for the purpose of sharing data.... networking of computers can be accomplished using cables or wires and also without using any wires.... Networks often use multiple protocols based on the usage or purpose of networking is being used.... Popular protocols include TCP/IP , the most common protocol found on the Internet and in home networks networking can be of different types like; Local Area networking (LAN), Wireless Local Area networking (WLAN), Wide Area networking (WAN), Metropolitan Area networking (MAN) etc....
5 Pages (1250 words) Essay

Computer networking

The report also addresses the technical concepts of implementing computer networking and also emphasizes.... More specifically addressing computer networking, the report revolves around the core concept of the said issue.... The most prevalent norms of computer networking applications and type are addressed in the end. ... The basis of it all however lies in the fact that it mainly is computer networking that enables the establishment of this connectivity....
4 Pages (1000 words) Research Paper

Network Infrastructure Basics

Unlike the Dial-up modem uses phone lines in sending and receiving data, the DSL uses regular phone lines to send digital broadband signals.... This connection sends digital signals, and in some cases, it uses regular telephone wiring with distinctive ISDN networks (Graziani and Johnson, 2008).... Dial-up networking facilitates computer connection to remote networks....
4 Pages (1000 words) Assignment

Digital Culture/Revolution

ccording to Wikipedia, the digital revolution began in the early 1950s and lasted until the 1970s when digital computers and digital records were brought into use.... This work "digital Culture/Revolution" focuses on technological changes involved moving from analog to mechanical then to electronic and finally to digital technology.... Additionally, Wikipedia associates the digital revolution with diverse changes that resulted from the use of digital computing as well as communication technology....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us