preview

Week 5 Inf 325

Better Essays

Kimberly Smith
INF 325 Telecommunications & Networking Concepts
Instructor: Karmaveer Koonjbearry
September 7, 2015

Discusses the Differences Between ‘Implementation’ and ‘Policy’ and Describes the Importance of Their Separation
Management defines information security policies to describe how the organization wants to protect its information assets. After policies are outlined, standards are defined to set the mandatory rules that will be used to implement the policies. Some policies can have multiple guidelines, which are recommendations as to how the policies can be implemented. Finally, information security management, administrators, and engineers create procedures from the standards and guidelines that follow the policies. …show more content…

Similar to policies for appropriate use of the telephone, organizations need to define appropriate use of e-mail.
Organizational polices are needed to establish general guidance in such areas as: The use of e-mail to conduct official business
The use of e-mail for personal business
Use software that follows Internet e-mail protocols and conventions religiously. Every time an online service gateways its proprietary e-mail system to the Internet, there are howls of protest because of the flood of error messages that result from the online service's misbehaving e-mail servers.

Compares Policy Differences Between Users Who Work Remotely or Use Wireless
The Ethernet lines run from the network switch, sometimes through a patch panel, out of the communication room and connect to the VoIP phones and other IP devices. Adding PoE enables devices to be powered over the same Cat 5 cabling infrastructure, providing the most cost-effective solution. Allows users too freely and safely mix legacy and PoE-compatible devices on their network. PoE technology is designed in a way that does not degrade the network data communication performance or decrease network reach. There are two ways to implement Power over Ethernet: endspan and midspan. A VLAN allows a network of computers and users to communicate in a simulated environmentas if they exist in a single LAN and are sharing a single broadcast and multi cast domain. The purpose of implementing a VLAN is to

Get Access