Webserver use, configuration and managementUnit WUCM1 |
In the context of academic computing, there is the Janet “Acceptable Use Policy” (http://www.ja.net/company/policies/aup.html) which sets out how academics, students and other university staff may use the Joint Academic Network – Janet. As a student of the UoP you are also bound by this policy.
Your first task is to look it up and look through the points raised. How many of the points at issue do you think have an impact on yourself?
In respect of your study at the University, what security policies affect your computer usage? Can you remember what you signed up to on your first use of a University computer? Where could you find it?
The next task is to hunt up the Information Services website and track down the one you agreed to at the beginning of the year. There are a number of others. Working in pairs, go through the policy statements and classify them as to whether they:
Try a web search for other "Acceptable use" policies. Are the majority aimed at educational, commercial or industrial organisations? Compare a few with the Janet one.
For each policy, review the principal groups of people who would benefit from observance of the policy. Get a printed (or download for later study) copy of a representative policy. This will be worth referring to in later discussions.
Try a web search for "Security Policy". Your task this time, after you have looked at a few of them, is to evaluate the proportion that relate to computer or information security. Is this conclusion significant?
What are the common themes? How do they compare with the list of main characteristics discussed in the lecture? Retain a copy of the one you feel most representative.
ISPs usually have a "Fair use" policy, or similar security related policy. In an earlier practical, you looked at the policy statement for your selected ISP. Compare that policy with the general security policies you have identified above. Evaluate the main groups of people who would benefit from observance of the policy.
Can you answer the question: “why have they produced the policy?” Is it evident in the policy itself?
This topic generates a number of issues that relate to the question of security policy, and significantly now that many users access their email via a webserver, have an impact on the main point of the unit.
Consider that you are tasked with the job of formulating a "fair use" policy for your company’s e-mail system. In groups of 2-4 discuss and decide on what aspects of email use should be included and, more importantly, why? Prepare notes on your policy.
In your group decide on what legal status an email sent from one employee to an external customer should have. You might like to consider the questions posed by Whelan (2000):
There are many other questions that might be asked but this is a good start.
Now look on the web for material on both of these questions. What might be good search terms? Before starting, set out your search terms, and after the search look back and review your criteria. Can you now suggest better search terms? (For information on good search strategies see Hock, (2001) (in the library) or look for search advice on the search engines you used.
Robin Nobles and Kerri-Leigh Grady |
Randolph Hock |
Ben Laurie & Peter Laurie |
Ben Laurie & Peter Laurie |
Michael Chinery |
Jonathan Whelan |
Amrit Tiwana |
Simson Garfinkel with Gene Spafford |
Last updated by Prof Jim Briggs of the School of Computing at the University of Portsmouth |
||