You are on page 1of 4

NETWORK MANAGEMENT Alfred A. Bejer Alfred G.

Damaso BSIT 23D

Content:
CHAPTER 1 Introduction CHAPTER 2 Network Lay-out CHAPTER 3 System Technical Background 3.1 3.2 3.3 3.4 Hardware Sofftware Tools Work Area

CHAPTER 4 Security Policy 4.1 4.2 4.3 Password Policy Software Installation Policy Confidential and Sensitive Data Policy

CHAPTER 1 Introduction

CHAPTER 3 System Technical Background 3.1 Hardware Specification Quantity Price Amount

Name of Device Server Workstation Mode Router Switch 3.2 Software

Software Network OS Workstation OS Microsoft Office 3.3 Materials

Specification

Quantity Price

Amount

Material UTP Cable Protective Cover RJ 45 3.4 Tools

Specification

Quantity Price

Amount

Tools Crimping Tool Cable Tester Wire Cutter Screw Driver

Specification

Quantity Price

Amount

CHAPTER 4 Security Policy

4.1

Password policy Password must be of 8 characters minimum. Chosen password must not bear resemblance to birth date, name and other easy to guess information. Submit the password to the adminisrator.

4.2

Software Installation Policy No software shall be installed without the consent of the administrator or the faculty member concerned. If software to be installed is necessary, inform the faculty member immediately. Software to be installed shall be compatible with the curren specification of the workstation. Do not install any software

4.3

Confidential and Sensitive Data Policy Other peoples data shall not be accessed and exploited. Do not open the Private file without permission.

You might also like