Reducing Intergroup Conflict

Brain Rules by John Medina (2008) Seattle, WA:Pear Press
July 10, 2020
Ethics and Social Responsibility” & Entrepreneurship
July 10, 2020

Reducing Intergroup Conflict

Guides to Firewalls & VPN’s (3rd edition)

Real World Exercises = question number 2


2.     

Search the Web for a listing of security education and training programs in your area. Make a list and determine which type of program (online, on-site at an employer’s location, at a conference facility, at a training facility) has the most examples. Determine the costs associated with each example. Which do you feel would be more cost effective?

Running Case Projects-2 Student Tasks 1 -2


1.     

Create an ISSP for Employee Fair and Responsible Use of Data Mart Equipmentusing the outline specified in this chapter. If you’re having problems visualizing what the completed document will look like, use a Web browser to look for sample policies. Look for examples of organizational computer use or Web use policies, starting with your own institution.


2.     

Begin a Managerial SysSP for the proposed firewall. You don’t have all the information to complete the document, but get started by using the outline provided in this chapter and completing as much information as possible. Questions you’ll need to make assumptions about include:


·        

Does Data Mart have its own Web server for customer information? How about an e-commerce server?


·        

Does Data Mart have its own e-mail server, or does it outsource this to its Internet Service Provider?


·        

Does Data Mart have other servers or services that need to be accessed internally or externally? What are they and who needs to access them?

Roman","serif";”>Real World Exercises-3.1, & 3.2


1.     

You need to restrict your company’s rank and file employees to using the internet only during regular working hours (9 am to 5 pm, five days a week). However as a network administrator, you want to be able to access the network at any time of the day or night, seven days a week. How can you meet the needs of the employees and yourself?


2.     

A group of freelance designers who work at home using DSL or cable modem connections needs to gain access to a set of your company’s publication files to redesign them. How could you enable this?

Running Case Projects-4.2 Student Tasks 1-2


1.     

Create a network diagram for Data Mart’s current network configuration. Then create a second diagram incorporating the proposed firewall architectures. Be sure to include the information assets identified in Chapter 2’s Running Case Project. A simple network diagram is provided in Figure 3-13 to show the basics of how network diagramming is performed. You may use any graphical program you choose, including Microsoft Power point of Microsoft Visio.


2.     

Create a table for each asset listed, including the firewall. In this table, list the users who need access as well as their corresponding level of access based on the simple three-layered scheme discussed by Rachel and Alex (user, power user, and administrator). Then explain which privileges are needed for the roles of user, power user, and administrator with regard to each device, dataset, or service.