tailieunhanh - Firewalls For Dummies 2nd Edition phần 4

Ở phía nhận, các giao thức tại mỗi lớp xác định làm thế nào nhận được tin nhắn được, địa chỉ được xác nhận như thế nào, làm thế nào các gói tin được tập hợp lại thành một thư, và làm thế nào các máy chủ mail | 116 Part II Establishing Rules__ the network. You also may want to prevent protocols that may have legal implications such as peer-to-peer music sharing applications like KaZaa. KaZaa and many other such applications allow you to search the Internet for MP3s music files and download them to your computer. The music industry has taken the makers of these applications to court because their users are not paying for these MP3 data files. A company may want to prevent the use of these file-sharing applications to ensure that illegally obtained music isn t stored on company servers. Define what Web content may not be accessed Be sure to address this topic in your Internet Acceptable Use policy. Typically a company won t want its employees to access Web sites that contain pornography nudity violence or profanity. Define what types of files can t be downloaded from Internet sites The last thing you want is for your company to be charged with using pirated software because an employee downloaded it from a Warez site. Warez sites typically provide pirated software and software keys to unlock the software. Warez is a hacker-style term for pirated software. Hackers like to use the letter z instead of s. By explicitly stating that the use of software acquired in this manner isn t allowed the company can easily delete any software it finds that was obtained in this manner. Define unacceptable Internet access attempts Employees who have restricted Internet access at work but not at home may try to bypass the company s security mechanisms. For example an employee may want to download MP3s using her laptop. Finding that the firewall prevents the use of KaZaa she could attempt to dial-in to her personal ISP by using a company computer. By clearly stating that attempts such as this are unauthorized the company can prevent such attempts or at least discourage them. Define what actions may not be performed on the Internet This .

TỪ KHÓA LIÊN QUAN