41
Η’αž€αž›Λ›αž‘Ηšαž›αŸαž™ αŸαž”Θ’αž›Ζ™Λ°αž™ BUILD BRIGHT UNIVERSITY Ζ™Λ―Η…αž“αž”αž‘αžŸΖŽ Λ¬αž’αŸ†αž–Λ¬ αŸΖ΅αž›αž“αŸΗŒΗ‡αž™αžŸαž“ΖŽ Λ«αžŸαž»αžαž–αžαŸŒΗ‹αž“ Information Security policy αŸαžšΘ’αž”αŸαžšΘ’αž„αŸΖ½αž™αŸ– ៑-αž“ ិ សƞ ិ ត αž‚αž»αž‡ αžŸαž»αž˜αž“Λ¬αžšαž„ΖžΛ¬ ្-αž“ ិ សƞ ិ ត αŸαžšΘŸαž“ ΖΈαž“αŸ‹αžαž“ ៣-αž“ ិ សƞ ិ ត ΖΈαž“αŸ‹ αž”αŸŠαž»αž“αŸαž’ΘŸαž“ ៀ-αž“ ិ សƞ ិ ត αž›Λ­αž˜ αžŸαž»αžαŸαž›Θ’αž„ αŸ₯-αž“ ិ សƞ ិ ត αžšαžŸαŸ‹ αžšαžαž“αŸˆ Η’ΘœΗ’ΖŽ ΖΈαžšΖ˜αŸ– ធ៊ូ Ηˆαž“αŸ‹ΗαžšΛΆαž‘Ζ‘ αž―αž€αŸαž‘αžŸΖ™Λ―αž–αŸαž“Ζ‘Ζ™αž‚αž”αŸ‹Ζ™αž‚αž„αŸαžŽαžαŸΛ αž€ αž“Λ«αžŸΖžΛ«αžαž‡αŸ†Η†αž“αŸ‹αž‘Λ¬αŸ‘αŸ  ΖΉΖ’αŸ†αžŸΛ«αž€Ηœ ្០៑្-្០៑៣

2013 y4-s2-414-group01

Embed Size (px)

Citation preview

Page 1: 2013 y4-s2-414-group01

αž€αž› αž‘ αž›αž™αŸ αŸαž” αž› αž™

BUILD BRIGHT UNIVERSITY

αž“αž”αž‘αžŸαž’αž–αŸ†

េ αž›αž“αŸ αž™αžŸαž“αžŸαžαž»αž–αžαŸŒ αž“ Information Security policy េរ αž”αŸαžš αž„αŸ αž™αŸ– ៑-αž“αž·αžŸ តិ αž‚αž‡αž» αžŸαž˜αž»αž“αžšαž„ ្-αž“αž·αžŸ តិ េរ αž“ αž“αžαŸ‹αž“ ៣-αž“αž·αžŸ តិ αž“ αŸ‹αž”αŸŠαž“αž»αŸαž’αž“ ៀ-αž“αž·αžŸ តិ αž›αž˜ αžŸαžαž»αŸαž› αž„ αŸ₯-αž“αž·αžŸ តិ រស αŸ‹ αžšαžαž“αŸˆ

រ  αŸ–    αž’៊ ូ αž“αŸ‹ αžšαž‘

αž―αž€αŸαž‘αžŸ αž–αž“αŸ αž‚αž”αŸ‹ αž‚αž„αŸαžŽαžαŸ αž€

αž“αžŸ αžαž‡αŸ† αž“αž‘αŸ‹αŸ‘αŸ 

αŸ†αžŸαž€ ្០៑្    -្០៑៣

Page 2: 2013 y4-s2-414-group01
Page 3: 2013 y4-s2-414-group01

េ αž›αž”αŸ†αž“αž„

េដីម េីរ αž”αž…αŸ†αž“αžΌαžœαžŠαŸ†αŸαž“αžΈαžš αžšαŸƒαž“ αžšαŸαž’αžΈAssignmentេ αž™αž™αž€αž‘ αž˜αž„αŸ‹ ម រ េ αž™ αž“

តឹម តវ αŸαž™αž„αžΈαžαž»αŸ† αž„αŸ†αž’αžŸαŸ‹ αž“αžαž·αžαžαŸ† αž”αžΉαž„αŸ‚ αž”αž„αŸαžš αž”αž…αŸ†αž“αžΌαžœαžŸ ស តុ αžŸαŸ† αž“αŸ‹αŸ—αŸ‚αžŠαž› αžšαŸαž” αž” αž“αž·αž„αžœαž’αž·αžΈ ស វ αžœαž€αž»αž„ αžšαŸαž’ ី AssignmentαŸαž“αŸ‡αŸ αž™ αž“ តមឹ αžαžœαžŸαŸ† αž”αŸ‹αž˜ αžœαž‘αž· αž›αŸαž™αžœαž‘αž·

ស αž“αž·αž„αž”αŸαž…αž€αžœαž‘αž· េ αž€αž›αžœαž‘αž· αž›αŸαž™αŸαž” αž› αž™ αŸ‚αžŸαž„αž™αž›αŸ‹αž“αž·αž„αŸαžš αž”αž…αžŸαŸ†αžšαŸαžŸαžšαŸ ម

αžšαŸ‚αžŽ αŸ‚αŸ†αžŠαž› αž“αž›αž˜αžαž·αŸ αž€αž»αž„αž‚ ម αž”αŸ‹ αž˜αž½αž™ αž”αŸ‹αŸαž“αŸ‡αŸ”

αž…αŸ†αŸ αŸ‡ αž›αŸ‹αžœαž’αžΈαž· ស αž“αž·αž„ រ វ វ តវ αž“αž›αž€αžŽαŸˆαžœαž‘αž· សេ αž™ αž“αžšαž–αž·αž“αž·αž ឱ αž“αž… αžŸαŸ‹ αžŸαŸ‹αž–αžΈαžšαŸαž” αž”αŸƒαž“ រ αž”αž˜αžΌαž›αž‘αž·αž“αž“αŸαž™ រវ ិ αž‚αž‘αž·αž“αž“αŸαž™ រសរេសរ αžšαžŸαž“αž· αž“αž“αž·αž„αŸαžš αž”αž…αŸ†αž…αž„ αž€αž„ េស វេ (Hard Copy and Soft Copy) αž€αŸ‹αž‡αžΌαž“αžŠαž›αŸ‹

រ αž‘αž‘αž›αž½αž”αž“αž»αž€αž˜αž»αž“αŸαž–αž›αŸαž‘αž„αžΈαŸαž’αžΈαž”αž‘αž” αž‰αŸ”

αžŸαžΌαž˜αž“αž·αžŸ αžαž·αŸƒαž“αž˜ αžœαž‘αž· αž›αŸαž™αžœαž‘αž· ស αž“αž·αž„αž”αŸαž…αž€αžœαž‘αž· αžαž·αžαžαŸ†αž€ αž„ αŸƒαžŠαŸƒαž“ រ αŸαž’αžΈ AssignmentαŸαž“αŸ‡αž€αŸαžŠαžΌαž… រសរេសរ រ ឱ αž“αž› αž”αŸαžŸαžΈαžšαžŸ αž”αŸ‹αž‘αž»αž€αž‡αžΌαž“αž“αž·αžŸ តិ

αž‡αŸ† αž“αŸ‹αŸ αž™αŸ— αž“αž·αž„ αž“αŸ‹αžŸ αž”αŸ‹αŸαžš αž”αž…αŸ†αž’ αž‚αžαž± αž“αž›αž€αžŽαŸˆαž› αž”αŸαžŸαžΈαžšαž“αž·αž„ αžαŸαž…αŸ‡ αžαž…αž„αŸ‹ αž•αž„αŸ‚αžŠαžšαŸ”

αžŸαžΌαž˜αž“αž·αžŸ តិ αž„αŸ†αž’αžŸαŸ‹αž‘αž‘αž›αž½αž“αžΌαžœ រ αž”αŸ‹ αž“αžŠαŸαŸ αŸ‡αž’αŸ†αž–αžΈαžαŸ†αž»αŸ”

αŸƒαžαž‘αžΈ........αŸ‚αž.............. αŸ’αŸ†αŸ αŸ‘3

αž‡. αž€αž› αž‘ αž’ រ αž€αž› αž‘ αž’ αžšαžšαž„αž‘αž‘αž›αž½αž”αž“αž»αž€

រ αž‘αž‘αž›αž½αž”αž“αž»αž€

αž… αžšαžŸαž€ αž€ αž˜αžαž”αžš

Page 4: 2013 y4-s2-414-group01

αž€αž› αž‘ αž›αž™αŸ αŸαž” αž› αž™

BUILD BRIGHT UNIVERSITY

αž“αž”αž‘αžŸαž’αž–αŸ†

េ αž›αž“αŸ αž™αžŸαž“αžŸαžαž»αž–αžαŸŒ αž“

Information Security policy េរ αž”αŸαžš αž„αŸ αž™αŸ– ៑-αž“αž·αžŸ តិ αž‚αž‡αž» αžŸαž˜αž»αž“αžšαž„

្-αž“αž·αžŸ តិ េរ αž“ αž“αžαŸ‹αž“

៣-αž“αž·αžŸ តិ αž“ αŸ‹αž”αŸŠαž“αž»αŸαž’αž“

ៀ-αž“αž·αžŸ តិ αž›αž˜ αžŸαžαž»αŸαž› αž„

αŸ₯-αž“αž·αžŸ តិ រស αŸ‹ αžšαžαž“αŸˆ

រ  αŸ–    αž’៊ ូ αž“αŸ‹ αžšαž‘

αž―αž€αŸαž‘αžŸ αž–αž“αŸ αž‚αž”αŸ‹ αž‚αž„αŸαžŽαžαŸ αž€

αž“αžŸ αžαž‡αŸ† αž“αž‘αŸ‹αŸ‘αŸ 

αŸ†αžŸαž€ ្០៑្    -្០៑៣

Page 5: 2013 y4-s2-414-group01

αžšαž˜αž€

αžŸαž–αŸƒαžαŸαž“αŸ‡αž–αžΈαž˜αž™αž½αŸƒαžαŸ αž˜αž½αž™αŸƒαžαž”αŸαž…αž€αžœαž‘αž· αž“ αžšαžšαž€αžΈαž…αŸ†αŸαžšαž“αžΈαž₯αžαžˆαž”αŸ‹αžˆαžšαŸαž›αžΈαž‚αž”αŸ‹αžœαžŸαŸαž·αž™ αž–αž·αŸαžŸαžŸαžœαžŸαŸαž·αž™αž–αžαŸ αž“αžœαž‘αž·αž“ αžšαžšαž€αžΈαž…αŸ†αŸαžšαž“αžΈ αž„αŸ† αž”αŸ†αž•αž»αžαŸ”αž–αžαŸ αž“αŸ αž”αžΈ αžŸαŸ‹αŸαž›αžΈ αž‚αž”αŸ‹αžœαžŸαŸαž·αž™ αž„αŸ†αž’αžŸαŸ‹αžŠαžΌαž… αžšαž‘αŸ† αž€αŸ‹αž‘αŸ†αž“

αž„αž–αžαŸ αž“αŸ αŸαž›αžΈαž‘αžΈαž• αžšαž–αž·αž—αž–αŸ αž€ αžšαž‘αŸ† αž€αŸ‹αž‘αŸ†αž“αž„αž• αž–αž• αž™

αžŽαž·αž‡αž€αž˜ រ αž‚αž”αŸ‹ αž‚αž„αžšαžŠ αž›αžš αž‚αž”αŸ‹ αž‚αž„ αž”αž–αŸαž“αž’αž‚αž·αžŸαž“αžΈ αž‚αž”αŸ‹ αž”αž–αŸαž“αž‘αžΌαžšαž‚αž˜ αž‚αž˜αž“αŸαž“αž·αž„ រ αž‚αž”αŸ‹ αž‚αž„αž‚αžŽαŸαž“αž™ αŸαžŠαžΈαž˜αŸ”

αŸαž›αžΈαžŸαž–αžΈαŸαž“αŸ‡αŸ αŸαž‘ αžαž–αžαŸ αž“αžœαž‘αž· αž”αŸ†αŸαžšαŸαžΈ αž™ រ វ αžœαŸ‚αžŸαž„αž™αž›αŸ‹

αžšαž»αž€αžšαž€αž―αž€ αžšαž–αžΈαž” αž”αŸαž‘αžŸαŸαž‡ αž“αŸαž› αž“ αž˜αžšαž™αŸ‡ αž”αž–αŸαž“ Network αž–αžαŸ αž“αžœαž‘αž· αŸαž“αŸ‡αž―αž„αŸ”αŸ αž™αž™αž›αŸ‹αŸαžƒαž‰αžΈ αž”αž–αŸαž“ Network

αž“ αžšαŸ‡αžŸαŸ† αž“αŸ‹αžŸαŸ† αž”αŸ‹ αž”αŸ‹αž–αžΈαžαŸ†αž”αž“αŸ‹αž˜αž½αž™αŸ αžαŸ†αž”αž“αŸ‹αž˜αž½αž™αŸαž‘ αžαžŸαŸ† αž”αŸ‹ Share information,

Resource, Data េ αž™ េ αžœαž‰αž·αŸ αž˜αž€ αž“ αž˜αž§αž”αž€αžšαžŽαŸ Router

αŸαž‘αžΈαž”αž’αž„ αžšαž˜αž™αž½αž…αŸ†αž“αž½αž“αžŸαŸ†αŸαžšαž…αž…αž·αžαŸ αž”αžΈ αžŸαŸ‹ αž”αž–αŸαž“αž–αžαŸ αž“αžœαž‘αž· αŸ”

αžαŸ†αž» αž‘αžŸαžΌαž˜αž’αž—αŸαž™αŸ αžŸαž–αžΈαžŸαŸ† αž€αŸ‹αž’αžŸαŸ‹αŸ αž€ េ αž€ សី αž”αž·αž™αž˜αž·αžαž’αž€ αž“

αž–αž˜ αž„αŸ†αžŸαž·αžŸ αž“αž·αžŸ តិ αž„αŸ†αž’αžŸαŸ‹αž“αžΌαžœαž€αŸ†αž αž»αžŸαž†αž„αŸ‚αžŠαž›αŸαž€αžΈαž αž“αŸαž‘αž„αžΈαŸ”αŸαž αž™αžΈαžαŸ†αž» αž‘ αž‚αž˜αž“αŸ

αŸ‰ αž„αž€αž€αŸ‹αŸ αž›αŸ‹ αžšαžšαŸ‡αž·αž‚αž“αŸ‹αž“αž·αž„αžαž· αž“αž–αžΈαž’αžŸαŸ‹αŸ αž€ េ αž€ សីេដីម ី αž” αŸαž‘αž„αžΈαžœαž‰αž·

αž›αŸ‹αž€αž„αŸ‡ តេ αž™αž€αžΈαžš ី αž™αŸ”

αž…αž»αž„αž” αž”αŸ‹αžαŸ†αž» αž‘ αžŸαžΌαž˜αŸ‚αžαž„αž’αŸ†αžŽαžšαž‚αž»αžŽαžŠαž›αŸ‹ αž”αž·αž™αž˜αž·αžαž’αž€ αž“ αž„αŸ†αž’αžŸαŸ‹αŸ‚αžŠαž›

αž“ αŸ† αž‘αž“αžΌαžœ αŸƒαžŠαž“αž·αž„ αžšαžαž·αžαžαŸ† αž”αžΉαž„αŸ‚ αž”αž„αžšαž”αžŸαŸ‹αŸαž™αž„αžΈαžαŸ†αž» αŸαž αž™αžΈαžŸαžΌαž˜αŸ αž™ αž”αž·αž™αž˜αž·αž αž„αŸ†αž’αžŸαŸ‹

αž‘αž‘αž›αž½ αž“αŸαžŸαž…αž€αžΈαžŸαž»αž េសរសីួស ី αž–αž˜ αž„αŸ† αžŸαŸƒαžœ េរ αž„αžŠ αž”αŸ”

Page 6: 2013 y4-s2-414-group01

I. Introduction to Information Security Policy…… II. Internet Usage Policy……………………………………………

ll.៑.   αž•αž› αž€αŸƒαž“ αžšαž”αŸ† αž“   (Consequence of violation)

ll.្. αžšαž‚αŸ† αž˜αž‚αŸ†αŸ‚αž αž„ រេ ស αŸ‹(Usage threats)……….

ll.្.៑. រេ αžŸαž’αŸ‹αž“ αž“αŸ αž™αž˜αž“αžŸαž˜αžšαž˜   (Inappropriate use of Resource)………………………………………

ll.្.្.   αž–αžαŸ αž“αŸ‚αž€αž„ αž™  αž¬  αž˜αž“αž–αž(Misleading of false

information)…………………………………………………………………

ll.៣.  αŸαžŸ  Internet  (Internet  Service)………………………………

ll.៣.៑.  αŸαžŸ αž’αž€αŸ ស αŸ‹ (User Service)……………………...

៣.៑.៑.េស Internet αž’αž“αž» ត(Internet Service allowed)

៣.្.  αž‘ αž˜αž„αŸ‹ αžšαž™αž›αŸ‹ αž–αž˜αž“αž„  αžŸαŸ†αŸαžŽαžš  (Request and

Approval)……………………………………………………………………..

៣.្.៑. αžšαŸαžŸαžŸαž»αŸ†  Access αž…αž›αžΌ  Internet(Request for

internet access)…………………………………………………………….

៣.្.្.   αžšαž’αž“αž˜αž»αžαŸ  (approval)………………………………………

៣.្.៣.   αžšαžŠαž€αž αžαžΌαžŸαž‘  (Removal of Privileges)……………

ៀ.  αŸ αž›αž“αŸ αž™ រេ ស αŸ‹ (Usage Policy)………….

ៀ.៑.   រេ αžŸαž’αŸ‹αž“ αž“  (Usage Resource)………………..

ៀ.្.   រេ αžŸαŸ‚αŸ‹αžŠαž›αž’αž“αž» ត  (allowed Usage)…………

ៀ.៣.   រេ αžŸαŸ‹ αž›αžαŸ‹αž“αž½  (Personal Usage)……………….

ៀ.ៀ.   រេ αžŸαŸ‚αŸ‹αžŠαž› ម ត αŸ‹ (Protribied Usage)……

III. េ αž›αž“αŸ αž™  Access αž…αž›αžΌαž–αž…αŸ† αž™  

Page 7: 2013 y4-s2-414-group01

(Remote Access Policy)…………………………………………

III.៑.េ αž›αž”αŸ†αžŽαž„(Purpose)………………………………………...

III.្.  αž‘αž αŸ†(αŸ†Scoop)………………………………………………………..

III.៣.  αŸ αž›αž“αŸ αž™  (Policy)……………………………………

IV. េ αž›αž“αŸ αž™αžŸαž“αžŸαžαž»αžŸ αž”RαŸ‹outer

(Router Security Policy)………………………………………………….

IV.៑  .េ αž›αž”αŸ†αžŽαž„  (Purpose)………………………………………..

IV.្.αž‘αŸ†αž αŸ†  (Scoop)………………………………………………………..

IV.៣.េ αž›αž“αŸ αž™  (Policy)……………………………………...

IV.ៀ. αžšαž’αž“αžœαž»αžαž… αž” αŸ‹ (Enforcement)………………………………

IV.αŸ₯.αž“αž™αž˜αž“αž™αŸ  (Definition )…………………………………………..

V. េ αž›αž“αŸ αž™αžŸαž“αžŸαžαž»  Server(Server Security Policy)

V.៑.  αŸ αž›αž”αŸ†αžŽαž„  (Purpose)…………………………………………

V.្.  αž‘αŸ†αž αŸ†  (Scoop)………………………………………………………...

V.៣.  αŸ αž›αž“αŸ αž™  (Policy)……………………………………..

V.៣.៑. αž–αž‘αŸ† αž€αž‘αŸ†αŸ‹αž“αž„  αž“αž„   αž– ស αŸ‹ (Ownership and

Relationship)…………………………………………………………………

V.៣.្.αž˜αž‚αŸαž»αž‘αžŸ រ  Configuration αž‘αŸαžΌ   (General Configurationguideline)………………………………………

V.៣.៣. រ αžαžαž–αž“αž  (Monitoring )…………………………………

V.ៀ. αžšαž’αž“αžœαž»αžαž… αž” αŸ‹ (Enforcement)………………………………..

VI. េ αž›αž“αŸ αž™αž‘αŸ† αž€αž‘αŸ‹αž“αŸ†αž„αŸ αž™αž˜αž“αŸ αŸ‚αž

(Wireless Communication Policy)……………………………………

Page 8: 2013 y4-s2-414-group01

VI.៑.αžŸαŸαž„αž”  (Overview)……………………………………………..  ..              

VI.្.αž‘αŸ†αž αŸ†  (Scope)………………………………………………………..               VI.៣.αŸαžŸαž… αŸ‚αžαž„ αžšαŸƒαž“αŸ αž›αž“αŸ αž™

(Policy Statement)…………………………………………………………..

VI.៣.៑.αžαŸ† មវ រ  Access αž…αž›αžΌ  Network αž‘αŸαžΌ   (General Network Access)………………………………………………

VI.៣.្.ត មវ αžšαž§αž”αž€αžšαžŽ ៍ wireless αž˜αž•αŸ‡   (Home wireless device Requirement)…………………………………

VI.ៀ. αžšαž’αž“αžœαž»αžαž… αž” αŸ‹ (Enforcement)……………………………….

Page 9: 2013 y4-s2-414-group01

Information Security Policy of the Asia Pacific Organization

I. Introduction:

αžŸαž–αŸƒαžαŸαž“αŸ‡ αž“ αž€αž˜αž αž»αŸŠαž“αž–αž αž» តិ េ αž…αž“αž€αžŠαžΌαŸαž… αž’αž„αžš αžšαž˜αž™αž½αž…αŸ†αž“αž“αž½αŸ‚αžαž„αŸ‚αž αž“αž“αžΌαžœ Information Security office (ISO) េ αž˜αžαŸ†αž”αž“αž“αžΈαŸ‹αž˜αž™αž½αŸ—αžšαž”αžŸαŸ‹αžαž½αž“αŸαžŠαž˜ តី មវ αžšαžšαž”αžŸαŸ‹

αž’αž„ រស αž”αŸ‹ រ រេ αŸ‡ αž™αžΈαŸ αž–αžαŸ αž“ αž“αž·αž„αž” αž‰αžšαž˜αž½ αŸ”

រ ិ αž›αŸαž™αžŸαž“αž·αžŸαž»αžαž–αžαŸ αž“ αž˜αžαŸ†αž”αž“αž˜αŸ‹αž™αž½αž€αž»αž„ Asia Pacific តវ αž“αž”αŸαž„αžαŸαž‘αž„αŸ αŸ‚αž

ឧស αŸ†αŸ’αŸ αŸ 7 αŸαž αž™αž€αŸ IOS αž˜αžαŸ†αž”αž“αž˜αŸ‹αž™αž½αž€αž»αž„αž…αŸ†αŸ ម IOS αž˜αžαŸ†αž”αž“αŸ‹ េ αž…αž“

αŸ‚αžŠαž› αž“ αžšαž‘αž‘αž›αž½αžαž»αžŸ αžαžœαŸαž›αž€αžαŸ†αž”αžΌαž„αžšαž”αžŸαŸ‹αžαž½αž“αž‚αžΊ αžαžœαŸ‚αžŽ αŸαŸ† αž›αž“αŸ αž™αžŸαž“αž·αžŸαž»αžαž–αžαŸαž“(Information Security Policy) េ αž™αž”αž»αž‚αž›αž·αž€ Asia Pacific αž„αŸ†αž’αžŸαŸ‹αŸ αž™ αž“αž›αŸ‹  αžš ឺ αžŠαžΉαž„αž“αžΉαž„αž’αž”αžšαŸ‹αž–αŸ†αž€αž½αŸαž‚αŸ αž™αžŠαžΉαž„αž–αžΈαŸ αž›αž“αŸ αž™ αž„αŸ†αŸ αŸ‡αž•αž„αŸ‚αžŠαžšαŸ” េ αž€αž»αž„αž’αž„ រ

Asia pacific αž“αž’αž“αž»αžœαžαž“αŸ រ αž‚αž”αŸ‹ αž‚αž„αžαŸ‹αž½ αž‘αžΈ រមុឺខ αžšαž˜αž™αž½αž…αŸ†αž“αž“αž½αžŠαžΌαž… αŸ– - αžšαž’αž—αžœαž·αžŒ αž“αžŸαŸ αž” αŸ‹Information Security Policy

αž“αž·αž„ រ αž” αž–αžΉαžαŸ αž˜αž… αž” αŸ‹

- រ αžαžαž–αž·αž“αž·αž αŸαž˜αž› រ ឺ រ ម αž“αžšαž€αŸαžƒαž‰αž“αžΌαžœ αžšαž…αžΌαž›αŸ αž™ αž“αžŸαž·αž‘αž· រ ឺ αž“ αžšαž’αž“αž» ត αŸαž αž™ αžšαŸαžŸαž»αž”αž’αŸαž„αž αž“αž·αž„ αž”αžαž·αž€αž˜αž€αžαž”

- រ αž‚αž”αŸ‹ αž‚αž„αŸαŸ‹αž› αž”αž–αž“αŸ αž‚αž”αŸ‹ αž‚αž„αž…αžΌαŸ‹αž›

- រ αž™αžαŸƒαž˜αžŸαž“αž·αžŸαž»αž αž“αž·αž„ αžšαž’αž—αžœαž·αžŒ αž“αž€αŸ រ ររឺ αž™ αžšαžŽαŸαž”αŸαž…αž€αŸαž‘αžŸ

- រ αž” αž–αžΉαžαŸαž’αžŸαž˜ αž‡ ៈ αžšαŸαž’ αžšαž’αž”αžšαŸ‹ αŸ†αž“αž·αž„ αžšαŸαž’ αžšαž”αžŽαž»αŸ‡αž” αž›αŸ”

αž₯αž‘αžΌαžœαŸαž“αŸ‡αžαŸ†αžŸαžΌαž˜αŸαž›αž€αŸαž‘αž„αž’αŸ†αž–αžΈαŸ αž›αž“αŸ αž™αžŸαž“αž·αžŸαž»αžαž–αžαŸ αž“αŸ‚αžŠαž› αž€αž‘αŸ‹αž„αŸαž“αž·αž„αž’αž„ រ AsiaPacific េតធីេ េ αž“αŸ αž™αžŸαž“αž·αžŸαž»αžαž–αžαŸ αž“αŸ”

៑   .េតធីេ េ αž›αž“αŸ αž™αžŸαž“αž·αžŸαž»αž)   ?what is an information Security

Policy?( - េ αž›αž“αŸ αž™αžŸαž“αž·αžŸαž»αžαž‚αžΊ αž€ αž“αž… αž”αž˜αžΌαŸ‹αž› αž“  αž¬ αžšαŸ‚αžŽ αžŠαŸ†αž›αŸ‹αž’αž€αŸ αž”

αžŸαŸ‹ តវេ αžšαž– មេដម ី αž€αžŠαŸ αž™ αž“αž“αžΌαžœαžŸαž“αž·αžŸαž»αžαž–αžαŸ αž“αŸ”

្.   េហតុធី តវ αž“αžŸαž“αž·αžŸαž»αžαž–αžαŸ αž“ ?  ) why have Information Security

Policy?)

- Information security Policy αž‚αžΊ តវ រ αŸ† αž…αŸαŸ‹αžŠαž˜ ី សុវតិ αž–αž‘αž·αž“αž“αž™αŸ

αžŸαŸ† αž“αŸ‹αŸ— (Importance data) , αŸ‚αž•αž“ αžšαž‡αŸ†αž“αž‰αž½ (business Plane) αž“αž·αž„αž–αžαŸ αž“αžŸαŸ† ត αŸ‹

Page 10: 2013 y4-s2-414-group01

αŸαž• αž„αŸαž‘ ត  )other Conficlential Information) αŸ‚αžŠαž› តវ រ αžšαž–αžΈαŸ αžšαž›αž½αž… រ ឺ  រ ត

ត αž„αŸ αž™ αž“αžŸαž·αž‘αž·αž’αž“αž» αžαž–αžΈ αžŸαŸ‹αžšαž”αžŸαŸ‹αŸαž‚αŸ”   αž”αžŸαž·αž“αŸαž” េ αž‡αž·αž€  αžš ឺ  េ αž‡αž€αŸαŸ‹ αž€αž»αž„αž’αž„ រ αž˜αž™αž½αž˜αž“αž· αž“αž™αž›αŸ‹αžŠαžΉαž„αž’αŸ†αž–αžΈαŸ αž›αž“αŸ αž™ αž„αŸ†αŸ αŸ‡αŸαž‘  αž–αž€αž½αŸαž‚αž“αžΉαž„αž˜αž“αž·αžŠαžΉαž„ αž’αžΈαŸ‚αžŠαž›αžšαž–αžΉαŸ†αž„ αŸαž€αžαŸαž‘αž„αž…αŸ†αŸ αŸ‡αž–αž€αž½αŸαž‚αŸ αŸ‡αŸαž‘  αŸ αŸαž–αž›αŸ‚αžŠαž›αž–αž€αž½αŸαž‚αž”αž€ αž™αž–αžαŸ αž“αžŸ αžαŸ‹αŸ‚αž”αž”αž“αžΉαž„αŸ”  αžŠαžΌαŸαž…αŸ‡αŸαž αž™αž‚αžΊ αžŸαŸ† αž“αŸ‹ αž„αŸ† αžŸαŸ‹αŸ‚αžŠαž›αž–αž€αž½αŸαž‚αŸαž’αŸ αž›αž“αŸ αž™αžŸαž“αž·αžŸαž»αžαž–αžαŸ αž“αŸαž αž™αž”αž»αž‚αž›αž·αž€ αž„αŸ†αž’αžŸαŸ‹αž€αŸ តវ αž“αŸαž‚αž’αž”αžšαŸ‹ αŸ† αž“αž·αž„αž”αžŽαž»αŸ‡αž” αž›αž’αŸ†αž–αžΈαŸ αž›αž“αŸ αž™αŸαž“αŸ‡αž•αž„αŸ‚αžŠαžšαŸ”

αž…αŸ† αŸ–αŸ† េ αž€αž»αž„αž’αž„ រ Asia Pacific αž“αž”αŸαž„αžαŸ αž›αž“αŸ αž™αžŸαž“αž·αžŸαž»αžαž–αžαŸ αž“αž…αŸ†αž“αž“αž½αŸ₯  αžŠαž›αŸ‹ េ αž‡αž·αž€  αžš ឺ េ αž‡αž€ αŸ‹ αžšαž€αžΊαž”αž»αŸαž‚αž›αž·αž€ αž„αŸ†αž’αžŸαŸ‹αŸ αžšαž– αž˜αŸ”  αŸαž αž™αŸ αž›αž“αŸ αž™ αž„αŸ†αŸ αŸ‡ αž“αžŠαžΌαž… αŸ–

II. Internet Usage Policy:

េ αž›αž“αŸ αž™αŸƒαž“ រេ αž” αžŸαŸ‹ Internet αžαžœαž’αž“αž»αžœαžαž…αŸ†αŸ αŸ‡αž’αž€αŸ αž” αžŸαŸ‹ Internet  αž„αŸ†αž’αžŸαŸ‹ )រ រ αž›αŸ‹αžŸ αž”αŸ‹ αž€αž˜αž αž»αŸŠαž“αŸ αž™αžšαž˜αž½αž” ូ αž› αž„αŸ†αž”αž»αž‚αž›αž·αž€αŸ េ αŸ‰ αž„    αž“αž·αž„αŸαž–αž‰

េ αŸ‰ αž„ αž’αž…αž·αŸƒ αž“  αž”αž»αž‚αž›αž·αž€αŸ‚αžŠαž›αž…αž»αŸ‡αž€αž»αž„  αž”αž»αž‚αž›αž·αž€ αž€αŸ‹ αžšαž”αŸ αŸ‡ αžŸαž“  αŸƒαžŠαž‚αžΌαžšαž‡αŸ†αž“αž‰αž½    αž“αž·αž„αžˆαž½αž‰  αžš ឺ αž’αž€αž›αž€αŸ‹  (αŸ‚αžŠαž›αž…αžΌαž›αŸ αž“αŸ‹ internet αž˜αžšαž™αŸˆαž’αž“ αž“αžšαž”αžŸαŸ‹αž” αž‰αžšαž€αŸ†αž»αžΊαž– αž‘αžΌαžšαŸαŸ”  αž’αž€αŸ αž” αžŸαŸ‹Internet αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“ αž„αŸ†αž’αžŸαŸ‹ αžαžœαžŠαžΉαž„αž’αŸ†αž–αžΈαŸ αž›αž“αŸ αž™αŸαž“αŸ‡  αŸαž αž™αŸ αžšαž– មេ αž›αž“αŸ αž™αŸαž“αŸ‡αž€αžαŸ មវេ αž™αŸ αž” αžŸαŸ‹ រ αžšαžšαž”αžŸαŸ‹αž–αž€αž½αŸαž‚αŸ αž™αžŸαž˜αŸαž αžαž»

αž•αž›αž“αž·αž„ αž“αž›αž€αž»αž„αžαžŽαŸˆαŸαž–αž›αŸ‚αžŠαž›αž–αž€αž½αŸαž‚αŸ αž” αžŸαŸ‹αŸαžŸ  Internet αž•αž„αŸ‚αžŠαžšαŸ”

៑. αž•αž› αž€αŸƒαž“ αžšαž”αŸ† αž“αŸˆ    )Consequence of Violation( αžšαž”αŸ† αž“αŸαž›αŸ αž›αž“αŸ αž™αŸƒαž“ រេ αž” αžŸαŸ‹ Internet  αž“αž·αž„ តវ αž“αŸαž‚αž•αž›αŸ‹αž―αž€ រ

αŸαž αž™ αž… αž²αŸ† αž“ αžšαžŠαž€αž αžΌαžαžŸαž·αž‘αž·αŸ αž” αž”αž–αž“αŸ  ,αžŸαž€αž˜ αž– αž€αž–αž·αŸ‹αž“αž™αŸ  αž“αž·αž„αž”αžΌαž€αžšαž˜αž½ αž„αŸ† αžšαž”αŸαžŽαž‰αŸαž…αž‰αž–αžΈ រ αžšαŸαž‘ αžαž•αž„αŸ”

                េ αž™αž”αŸ‚αž“αž˜αŸαž‘ ត αž€αž˜αž αž»αŸŠαž“αŸ‚αžŠαž›αž មវ αž˜αž… αž”αŸ‹ αžαžœαŸαž’αžš αž™ αžšαžŽαŸαž’αŸ†αž–αžΈαžŸαž€αž˜ αž–αžαž»αžŸαž… αž”αž–αž·αŸ‹αžαŸ—αŸ αž€αŸ‹ αžšαž’αž“αž»αžœαžαž… αž”αŸαŸ‹ αž™ αž“ តឹម αžαžœαž•αž„αŸ‚αžŠαžšαŸ”

αž˜αž»αž“αŸαž’ αžšαž…αžΌαž› Internet αž†αž„ αžαž”αŸ‹ αž‰ Networkαžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αž‚αžΊ តវេ αž™αŸαž‚αž’αž“αž»αž˜αžαŸ αž˜αž»αž“αžŸαž·αž“  αŸαž αž™αž’αž€αŸ αž” αžŸαŸ‹ Internet  αŸ‚αžŠαž› αž“αžŸ αž“αž»αž–αž›αž‚αžΊαž មវេ αž™ αž“αŸ េ αž›αž“αŸ αž™αŸƒαž“ រេ αž” αžŸαŸ‹  Internet αŸαž“αŸ‡αžŸαž·αž“αŸαž αž™αž…αž»αŸ‡αŸαž αžαŸαž› េ αŸαž› Form

αž‘αž‘αž›αž½ αž›αŸ‹)Acknowledgement form (αŸ‚αžŠαž› សិតេ αž‘αŸ†αž–αžαŸαž…αž»αž„αŸ αž™αŸƒαž“  αž―αž€ αžšαŸαž“αŸ‡αŸ”  αžŸαŸ†αžŽαŸ†αž»αŸ‚αž”αž”αž”αž‘αž‘αž‘αž›αž½ αž›αŸ‹αŸ‚αžŠαž› αž“αž…αž»αŸ‡αŸαž αžαŸαž› αž‚αžšαž½αŸ‚αžαŸαž‚ αž”αž‚αž›αŸ‹αŸαž αž™αž“αž·αž„αžšαž€ αž‘αž»αž€  file

Page 11: 2013 y4-s2-414-group01

ស αž”αŸ‹ αžšαž•αž›αŸ‹αžŸαž·αž‘αž·αž…αžΌαž› αŸ‰ αž„ αž™ αžŸαž›αŸ”  αžŸ αž”αžŸαŸ†αŸ‹αž“αžšαž½ េ αž…αž“αŸαž‘ αžαžŸαžΈαž’αŸ†αž–αžΈ Internet

Usage Policy, please Contact the Information Technology (IT) Departments αŸ”

្. αžšαž‚αŸ† αž˜αž‚αŸ†αŸ‚αž αž„αžŠαž›αŸ‹ េ ស αŸ‹ (Usage threats)   រ αž” αŸ‹ Internet  αž” αž‰ αž”αŸ‹ αž€αž˜αž αž»αŸŠαž“ αž˜αž™αž½αž“αž·αž„ αž“αž·αž—αž™αŸαžαžΈαŸ—  αŸ‚αžŠαž› តវ αž“αŸαž‚

αžŸαŸ†αŸ េ αžšαžšαž€ αžŸαž“αž·αžŸαž»αžαžŠαž›αŸ‹ αž‘αž– សម αžαž·αž–αžαŸ αž“αžŠαž…αŸ†αŸαž”αž„αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“  αžš ឹ αž’αž„ αžšαŸ”  αž“αžΈαž—αž™αŸ αž„αŸ†αŸ αŸ‡αžšαž˜αž½ αž“αŸ–

្.៑. រេ αžŸαž’αŸ‹αž“ αž“αŸ αž™αž˜αž“αžŸαž˜αžšαž˜ (Inappropriate Use of Resources) αžšαž…αžΌαž›αŸ αž“ αŸ‹Internet  αŸ αž™αž”αž»αž‚αž›αŸ‚αžŠαž›αž˜αž“αž· តវ αž˜αž™αž½αž មវ αžšαž‡αŸ†αž“αž‰αž½αž‚αžΊαž₯αž‘αž·αž–αž› αŸαŸ† αž™ αž“ រេ αž” αžŸαŸ‹αžαž»αžŸαž…αŸ†αŸ αŸ‡αž’αž“ αž“ αž„αŸ†αŸ αŸ‡αŸ”αžŸαž€αž˜ αž– αž„αŸ†αŸ αŸ‡ αž…αž‡αŸ‡αž₯αž‘αž·αž–αž›αžŠαž›αŸ‹αž•αž›αž·αž αž–αŸ αž™ αžšαŸ‚αžαŸαž–αž›αŸαžœ αŸ‚αžŠαž› αž“αž…αŸ†

αž™αž€αž»αž„ រេ αž” Internet or Surfing the internet  αŸ” េ αž™αž“αž· αž™αž”αŸ‚αž“αž˜αŸαž‘ ត   αž€αž˜  αž αž»αŸŠαž“  αžš ឺ αž’αž„ រ αž… αž”αžˆαž˜αž˜αž»αžαž“αžΉαž„ រ αžαž”αŸ‹αž„αŸαŸ‹αž€αžšαŸ αŸ‡  αž“αž·αž„αžŸαž€αž˜ αž– αžŸαž”αž… αž”αŸ‹ αž…αŸαž€αž

αž“αŸαž‘αž„ αž˜αžšαž™αŸˆ αž”αŸαž—αž‘αŸƒαž“ រេ αž” αžŸαŸ‹αžαž»αžŸαŸαž• αž„αŸ—αŸαž‘ αžαŸ”

្ .្. αž–αžαŸ αž“αŸ‚αž€αž„ αž™αžšαž˜αž“αž–αžαžš αŸ†αŸ αžšαž€αž•αžΌαžœαžαžŸαž» αž‚αž”αŸ‹αž–αžαŸαž αž“ αž„αŸ†αž’αžŸαŸ‹αŸ‚αžŠαž› αž“αžšαž€αŸαžƒαž‰αžΈαŸ αŸαž› ីInternet αž‚αžšαž½ តវ αž“αŸαž‚αž–αž· រ  

េ αž™ αž“ αžšαžŸαž„ αž™αŸ  αžš ឺ αž˜αž“αž·αž›  αžšαž αžΌαž αž›αŸ‹αŸ‚αž αž“ αžšαž’αŸ‡ αž„αž” αž€αŸ‹αž–αžΈ αž”αž—αž–αŸαž• αž„αŸ—αŸαž‘ ត  αŸ‚αžŠαž› αž…αž‘αž»αž€αž…αž·αž αž“αŸ”   αž“αžŠαŸ†αŸαžŽαžΈαžš រ αžαžαž–αž·αž“αž·αž αž‚αž»αžŽ αž–αŸ  Internet

េ αŸ‡αŸαž‘αŸαž αž™αžΈαž…αŸ†αž“αž“αž½αŸ‚αžŠαž›αŸ αž…αžΈαž“αŸƒαž“αž–αŸαž αž“αžšαž”αžŸαŸ‹αžαž½αž“αž‚αžΊαž αžŸαž½αžŸαž˜αŸαž™  αžαž»αžŸ  αžš ឺ αž˜αž·αž“ តឹម αžαžœαŸ”

៣.េស αž€αž˜  Internet  (Internet Service)

      αžšαž…αžΌαž›αŸ αž“αŸ‹  Internet  αž‚αžΊ តវ αž“αž•αž›αŸ‹αžŠαž›αŸ‹αž’αž€αŸ αž”αžΈ αžŸαŸ‹ េ αž…αžΈαž“αŸαžŠαžΈαž˜ ី αž‘ αž‘αž„αŸ‹  αžŸαž€αž˜ αž–αž‡αŸ†αž“αž‰αž½αž˜αž™αž½αž…αŸ†αž“αž“αž½αž“αž·αž„ αž˜αžΌαž› αž“ αž‚αžΉαŸ‡αžŠαŸ αŸ† αž…αŸ‹αžŸ αž”αŸ‹αž’αž“αž»αžœαžαž˜αž»αžαžšαž”αžš  αžš ឺ រ αžšαžšαž”αžŸαŸ‹αž–αž€αž½αŸαž‚αž“αž·αž„αžαž½ αž‘αžΈ  αžšαž˜αž»αžΊαž រ αž„αžœ ិ αž‡αžΈαžœαŸˆαŸ”

       αŸ£.៑េស αž’αž€αŸ ស(αŸ‹User Service):

               αŸ£.៑.៑េស Internet αŸ‚αžŠαž› αž“αž’αž“αž» ត

(Internet Service allowed) αžšαž…αžΌαž›αŸ αž“αŸ‹ Internet  αž‚αžΊαž–αž·αž តវេ αž”αžΈ αžŸαŸ‹αžŸ αž”αŸ‹αŸ αž›αž”αŸ†αžŽαž„αŸαž’αžΈαž‡αŸ†αž“αž‰αž½αŸ‚αžαž”αž»αŸ‰

េ αŸ‡αŸ”  αžŸαž˜αž αž– េ αž…αžΈαž“αžŸ αž”αŸ‹αŸαžŸ Internet αž”αž‘ αž“αž“αž·αž„αž•αž›αŸ‹αžŠαž›αŸ‹αž’αž€αŸ αž”αžΈ αžŸαŸ‹  αžŠαžΌαž…  αŸ‚αžŠαž› αž“αŸ αž„αŸ αž˜αŸαž“αŸ‡αŸ–

Page 12: 2013 y4-s2-414-group01

+ αžŸαŸ†αž”αž» αžαŸαž•αžš αž˜αŸƒ សណេ αž™αŸαž’αž‘αž… αžαž“αž·αž…  (E-mail:electronic-mail)  

αž‘αž‘αž›αž½ រ  αž¬αžŠαŸ†αžŽαžΉαž„αžšαž”αžŸαŸ‹ E-mail េ αž“αŸ‹  Internet ( αž˜αž™αž½ រ αž”αŸ‹  αž―αž€ រ  αž¬αž˜αž·αž“ αž“ αž”αŸ‹αž―αž€ រ  )αŸ”

+ αžšαžŸαž„αŸαŸ‹αž˜αž›αž‘αžŸαž‘  αž¬ αžšαŸαž’ αžŸαž…αžšαžŽ(៍Navigation)αŸ– េស  www   រ αŸ† αž…αŸ‹αžŸ αž”αŸ‹αŸ αž›αž”αŸ†αžŽαž„αž‡αŸ†αž“αž½αž‰αŸ αž™ រេ αž”αžΈ αžŸαŸ‹ Hypertext

Transfer protocol (HTTP) browser tool αŸ”  αžŸαž·αž‘αž…αžΌαž›αŸ αž“αŸ‹Internet   αŸ‰ αŸαž–αž‰αŸαž›αž‰  αžšαž…αžΌαž›αŸ‚αžŠαž› αž“ αžšαž€αŸ†αžŽαžαŸ‹αž–αžΈ Internet េ αž“αŸ‹ Web Server αžšαžŽαŸˆαŸ‚αžŠαž› αž€αž˜αž αž»αŸŠαž“αž“αž•αž›αŸ‹αž‡αžΌαž“αŸ”

+ αž–αž’ រស αž”αŸαŸ‹αž•αžš  αž¬  αž” ូ αž“  File (File Transfer protocol (FTP))

αž” ូ αž“αž‘αž·αž“αž“αŸαž™  αž¬ File  αž“αž·αž„αž‘αž‘αž›αž½αž‘αž·αž“αž“αŸαž™  αž¬ File αŸ‚αžŠαž› αžαž‘αž”αŸ‹αž˜αž€αžœαž‰αž· រ αŸ† αž…αŸ‹

ស αž”αŸ‹αŸ αž›αž”αŸ†αžŽαž„αž‡αŸ†αž“αž½αž‰αŸ”

+  Telnet  αž–αž·αž’αžΈ αžšαž”αž‘ αž“  Internet ស αž”αŸ‹αŸ‚αž€αŸ‚ αž” αž”αž–αŸαž“αž€αŸ†αž»αž– αž½αž‘αŸαžšαŸαžŠαžΈαž˜ េី αž™ αž€αŸ‹αžŠαžΌαž… αž” αž–αžΉαžαžŠαžΌαž… αž”αž–αŸαž“αž€αŸ†αž»αž– αž½αž‘αŸαžšαŸαž• αž„αŸαž‘ αžαŸαž αž™αžΈαŸ αž™ αžšαŸαž αžαž»αŸαž“αŸ‡ αž…αž‘αž‘αž›αž½αž‘αž·αž“αž“αŸαž™  αž“      αž“αž·αž„ αž…αžŠαŸ†αŸαžŽαžΈαžš αžšαž€αž˜αžœαž’αž·αž·αŸ‚αžŠαž› តវ αž“αŸαž‚αž”αŸαž„αžΈαžαžŸ αž”αŸ‹ αž”αž–αŸαž“αŸ‚αžŠαž›αž€αŸ†αž»αž–αž»αž„   តវ αž“αŸαž‚  

αŸ‚αž€αŸ‚ αž”αŸαž“αŸ‡αŸ”

រ αž‚αž”αŸ‹ αž‚αž„αŸ‹αžšαž€ αž“αžΌαžœαžŸαž·αž‘αž·αŸαžŠαžΈαž˜ αž”αžΈαŸ‚αž“αž˜αž¬αž›αž»αž”αŸαžŸ េ αŸαž–αž›αŸ‚αžŠαž› αž€αž˜αž αž»αŸŠαž“ តវ រ αžŸαŸ‹αž”αžΌαžš  αž¬ រ αžšαž’αŸ‡ αž„αž’αŸ†αž–αžΈαž›αž€αžαžŽ αž‚αž”αŸ‹αŸαžŸ αž€αž˜αŸαž• αž„αŸ— េ αž…αžΈαž“αž“αž·αž„ តវ αž“αŸαž‚   αžαŸ‹  αž‘αž»αž€  

αžšαž…αžΌαž›αŸ αž“αŸ‹  Internet  αŸ αž™αž˜αž·αž“ αž“αžŸαž·αž‘αž·  αž¬αž–αžΈ Internet αž˜αž·αž“ តវ αž“αŸαž‚ αž’αž“αž» ត

αŸαž‘αž™αžΈαŸ”

+  αž‘ αž˜αž„αŸ‹ αžšαž™αž›αŸ‹ αž–αž˜  αž“αž„αžŸαŸ†αŸαžŽαžš(Request and Approval  Procedure)

αžšαž…αžΌαž›αŸ αž“αŸ‹ Internet αž“αž·αž„ តវ αž“αŸαž‚αž•αž›αŸ‹αžŠαž›αŸ‹αž’αž€αŸ αž”αžΈ αžŸαŸ‹αŸαžŠαžΈαž˜ ី αž‘ αž‘αž„αŸ‹αžŸαž€αž˜

αž–αž‡αŸ†αž“αž‰αž½αžšαž”αžŸαŸ‹αŸαž‚  αž’αž“αž»αžœαž រ αžšαžšαž”αžŸαŸ‹αŸαž‚αŸ αŸαž–αž›αŸ‚αžŠαž›αž–αž€αž½αŸαž‚ តវ រ αŸ”

៣ .្.៑.   αžšαŸαžŸαžŸαž»αž…αŸ†αž›αžΌαŸ αž“αž’αŸ‹αŸαž»αž’αŸαžŽαž

(Request for Internet Access) αŸ‚αž•αž€αžŠαŸ†αŸαžŽαžΈαžš αžšαŸαžŸαžΈαžšαžŸαž»αŸ†αž…αžΌαž› αž“αŸ‹  InternetαŸαž‚αž មវេ αž™αž”αž»αž‚αž›αž·αž€ αž„αŸ†αž’αžŸαŸ‹ αž“   αž„αŸ†  Internet Usage policy  αŸαž“αŸ‡αž“αž·αž„  Internet / Intranet Security Policy  αžšαž˜αž½  αŸαž αž™αžΈαž” αž”αŸ‹αž˜αž€αž’αž€αŸ αž”αžΈ αžŸαŸ‹ αžαžœαŸ‚αžαž…αž»αŸ‡αŸαž αžαŸαž› αŸαž›αžΈαŸαžŸαž…αž€αžΈαŸ‚αžαž„ រណ៍  αŸ‚αžŠαž›αž–αž½αž€αŸαž‚αž™αž›αŸ‹  αŸαž αž™αžΈ  αž–αž˜αž’αž“αž»αžœαž មេ αž›αž“αŸ αž“ αž™αŸ αŸ‡αŸ”  αž’αž€αŸ αž”αžΈ αžŸαŸ‹αŸ‚αžŠαž›αž˜αž·αž“αž’αž“αž»αžœαž មេ αž›αž“αŸ  αž™   αž„αŸ†αŸ αŸ‡αŸαž‘ αž…αž‘αž‘αž½αž›αžšαž„αž“αžΌαžœαžŸαž€αž˜ αž– αž€αŸ‹αž–αž·αž“αŸαž™αž“αž·αž„αž”αžΌαž€αžšαž˜αž½ αž„αŸ† αžšαž”αŸαžŽαž‰αŸαž…αž‰αž–αžΈ  αžš αžšαŸαž‘ αžαŸ”

Page 13: 2013 y4-s2-414-group01

៣ .្.្.   αžšαž’αž“αž˜αž»αžαŸ(Approval):

Internet Access   តវ αž“αŸαžŸαžΈαžŸαž»αŸ†αŸ αž™αž’αž€αŸ αž”αžΈ αžŸαŸ‹  αž¬αž’αž€ αž‚αž”αŸ‹ αž‚αž„αŸ‹αž’αž€αŸ αž”αžΈ αžŸαŸ‹  αŸ‚αžŠαž›αž” ូ αž“αž‘ αž˜αž„αŸ‹αŸαžŸαžΈαžŸαž»αŸ†αžŸαž·αž‘  Access  αž…αžΌαž›αŸ‚αž•αž€ IT αŸ‚αžŠαž› αž€αŸ‹αž–αŸαž“αž“αž·αž„ αžšαžαžαž…αž˜αž„ αž”αŸ‹αž“αžΌαžœ  αž‘αŸ†αžšαž„αŸ‹αž‘αž‘αžΌαž› αž›αŸ‹αž’αŸ†αž–αžΈαž‘αŸ†αž αŸƒαŸ†αž“ រេ αž”αžΈ αžŸαŸ‹ Internet αŸ‚αžŠαž› αž“αž…αž»αŸ‡αž αžαŸαž› αžšαž…αž½  (Signed Internet Usage Coverage acknowledgment form) ៣.្.៣.   αžšαžŠαž€αž αžαžΌαžŸαž‘  (Removal of Privileges)

Internet access  αž“αžΉαž„αž˜αž·αž“αž”αž“αŸαž‘ αžŸαŸαž™αŸαž›αžΈ αžšαž”αŸαžŽαž‰αž”αž»αž‚αž›αž·αž€αŸαž…αž‰αž–αžΈ រ រ  αž“αž·αž„αžšαž” αž”αŸ‹αž€αž»αž„ αž¬αžŸαž€αž˜ αž– αž€αŸ‹αžœαž“αŸαž·αž™αŸ‚αžŠαž›αŸαž€αžΈαžαŸαž‘αž„αžΈαž–αžΈ αžšαž”αŸ† αž“  αŸαž›αžΈαŸ αž›αž“αŸ   αž™

αŸαž“αŸ‡αŸ”   αž”αžŸαž·αž“αŸαž”αžΈ αŸ† αž…αŸ‹αž“αž·αž„ αž“αžŸαŸ†αŸαžŽαžΈαžšαžαžΈαžŸ αž”αŸ‹ រ  Access αž…αžΌαŸ αž“αŸ‹  Internet តវ αž“

αŸαž‚αž’αž“αž»αž˜αŸαž  αŸ αŸ‡αŸαž‚αž“αžΉαž„αŸαž…αž‰ αž” αžŸαž˜αž„αŸαž‘ αžαŸ”

ៀ.េ αž›αž“αŸ αž™ រេ ស αŸ‹ (Usage Policies)αŸ–

  ៀ.៑. រេ αžŸαž’αŸ‹αž“ αž“  (Resource Usage) αŸαž‚αž“αžΉαž„αž’αž“αž»αž˜αŸαž  αž“αž·αž„αž•αž›αŸ‹αžŸαž·αž‘αž…αžΌαž›αŸ αž“αŸ‹  Internet αž”αžŸαž·αž“αŸαž”αžΈαž មវ αžšαž˜αž»αžαž‡αŸ†αž“αž‰αž½αžŸαž˜  

αŸαž αžαž»αžŸαž˜αž•αž›αŸ”  αŸαž αž™αžΈαŸαž‚αž“αž·αž„αž•αž›αŸ‹αŸαžŸ Internet  αŸ αž™αŸ αž”αžΈ αžŸαŸ‹ αžŸαŸαž™αŸαž›αžΈ αžšαž‘αž‘αž›αž½  αžαž»αžŸ αžαžœαž…αŸ†αŸ αŸ‡ រ αžšαŸ‚αžŠαž›αž€αŸ†αž–αž»αž„αŸαž’αžΈαžšαž”αžŸαŸ‹αž”αž»αž‚αž›αž·αž€αŸ”    αž”αžŸαž·αž“αŸαž”αžΈαž”αž»αž‚αž›αž·αž€ αžŸαŸ‹αŸ αž˜αž»αžαž‡αŸ†αž“αž‰αž½αŸαž• αž„αŸαž‘ ត  αž¬αž”αžΌαžšαžαž½ αž‘αžΈ រ រេ αŸ‡αžŸαŸ†αŸαžŽαžΈαžšαžŸαž»αŸ†αžŸαž·αž‘αž·αž…αžΌαž›  αŸ αž“αŸ‹  Internet αžαžΈαž“αž·αž„ តវ αž“αŸαž‚αž” ូ αž“αž˜αž€αž€αž„αžšαž™αŸˆαŸαž–αž›αŸ₯αŸƒαžαŸ” ត មវ រស αž”αŸ‹αžŸαž·αž‘αž·αž…αžΌαž›αŸ αž“αŸ‹ Internet  αžšαž”αžŸαŸ‹αž’αž€αŸ αž”αžΈ αžŸαŸ‹αž“αž·αž„ តវ αž“ តត

αž–αž·αž“αž·αž αŸαž‘αž„αžΈαžœαž‰αž·αŸ αž™αž€αŸ†αžŽαžαŸ‹αŸαž–αž›αŸ αž™ αž™αž€ αž“ αž€αž˜αž αž»αŸŠαž“αŸαžŠαžΈαž˜ ី រ αžšαž”αž“ αžšαŸαž’αžΈαŸ αŸ‚αž αž“αŸ”

ៀ .្. រេ αžŸαŸ‚αŸ‹αžŠαž› αž“αž’αž“αž» ត (Allowed Usage)

រ αž”αžΈ αžŸαŸ‹  Internet តវ αž“αŸαž‚αž•αž›αŸ‹αŸ αž™αžŸ αž”αŸ‹αŸ αž›αž”αŸ†αžŽαž„αžŸαŸ† αž”αŸ‹αŸ‚αž  αž‘ αž‘αž„αŸ‹ αž– αŸ† αž“αŸƒαž“αžŸαž€αž˜ αž–αž‡αŸ†αž“αžΌαž‰αŸαžŠαžΈαž˜ αž’αžΈαž“αž»αžœαžαžαž½ αž‘αžΈ រ រ αž‚αž”αŸ‹αž’αž€αŸ αž”αžΈ αžŸαŸ‹ αžαžœαž’αž“αž»αžœαž  αž˜αŸ αž› រណ៍រមួ αž€αŸ‹αž‘αž„αž“αž·αž„ រេ αž”αžΈ αžŸαŸ‹αž’αž“ αž“αž“αž·αž„ រេ αž”αžΈ αžšαžœαž“αž·αž·αž…αŸαž™αž›αŸ—αž€αž»αž„ រ

េ αž”αžΈ αžŸαŸ‹  Internet  αŸ”

+ រេ αž”αžΈ αžŸαŸ‹  Internet  αŸ‚αžŠαž› αž…αž‘αž‘αž›αž½αž™αž€ αž“αžŸ αž”αŸ‹αž’αž“αž»αžœαžαžαž½ αž‘αžΈ រ αžšαž“αžΉαž„  αž”αŸ‹αž” ូ αž›αž‚αžΊαŸ–

- αžšαž‘αŸ† αž€αŸ‹αž‘αŸ†αž“αž„αžš αž„αž”αž»αž‚αž›αž·αž€αž“αž·αž„αž˜αž·αž“αŸ‚αž˜αž“αž”αž»αž‚αž›αž·αž€αžŸ αž”αŸ‹αŸ αž›αž”αŸ†αžŽαž„ αž‡αŸ†αž“αž‰αž½

Page 14: 2013 y4-s2-414-group01

- រ αž‘ αž‘αž„αŸ‹αž”αŸαž…αž€αžœαž‘αž· IT េ αž™  download Software  αŸαž αž™αžΈ  Upgrade  

αŸαž’αžΈαž² αž”αŸαžŸαžΈαžšαŸαž‘αž„αžΈ

- αžαžαž–αž·αž“αž·αž αŸαžœαž” αž™αžšαž”αžŸαŸ‹αž’αž€αž›αž€αŸ‹  αž¬αžˆαž½αž‰  αŸαžŠαžΈαž˜ αžŠαžΉαžΈαž„αž’αŸ†αž–αžΈαž–αŸαž αž“  αž•αž›αž·αžαž•αž›

- αž–αŸαž αž“αž’αŸ†αž–αžΈαž”αŸαž…αž€αŸαž‘αžŸ  αž“αž·αž„ រ វ វ  (Research)

ៀ.៣. រេ αžŸαŸ‹ αž›αžαŸ‹αž“αž½  (Personal Usage)

រេ αž”αžΈ αžŸαŸ‹αž’αž“ αž“ αž˜αž€αŸ†αž»αž– αžΌαž‘αŸαžšαžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αŸαžŠαžΈαž˜ αž…αžΌαžΈαž›αŸ αž“αŸ‹ Internet αžŸαŸ† αž”αŸ‹

េ αž›αž”αŸ†αž“αž„ αž›αŸ‹αžαž½αž“αŸ αž™ αž“ αžšαž’αž“αž»αž˜αŸαžαž–αžΈ  Manager αž“αžΉαž„  IT department αž“αžΉαž„ តវ αž“

αŸαž‚ αžαŸ‹αž‘αž»αž€ αž˜αžΌαž›αŸαž αžαž»αžŸαŸ† αž”αŸ‹αžŸαž€αž˜ αž– αž€αŸ‹αžœαž“αŸαž·αž™  αž“αžΉαž„ αž”αžΌαž€αžšαžΌαž˜ αž„αŸ† αžšαž”αŸαžŽαž‰αŸαž…αž‰

αŸαž‘ αžαž•αž„αŸ”

αž‚αž”αŸ‹  User αŸ‚αžŠαž›αŸ αž”αžΈ  Internet αž‚αžšαž½αŸ‚αžαž™αž›αŸ‹αžŠαžΉαž„ αž” αž‰Network αž€αž˜αž αž»αŸŠαž“αž”αŸαž„αžΈαž  audit log( αžšαžŸαžšαŸαžŸαžšαž…αž»αŸ‡ αž–αžΉαžαž· αžšαžŽαŸαžŸαŸ† αž”αŸ‹αž–αž·αž“αž·αž αž” αž€αŸ‹)េ αž™αž†αž»αŸ‡αž” αž„αŸ†αž–αžΈαžŸαŸ†αŸαžŽαžΈαžš αžŸαŸ† αž”αŸ‹

េស αŸαž“αŸ‡ αž„αŸ† αžŸαŸαž™ αž“ αž„αž€αž»αž„  αž“αžΉαž„ αž„αŸ αž“αžΉαž„ តវ αž“αŸαž‚ αžαžαž–αž·αž“αž·αž េ αž˜αŸαž–αž›αž€αŸ†αž“αžαŸ‹αŸ”αž’αž€αŸ αž”αžΈ αžŸαŸ‹αŸ‚αžŠαž›αŸ αž‡αžΈαžŸαŸαžšαžŸαžΈαžšαž€ αž‘αž»αž€  αžš ឺ αŸαž•αžšαž–αžαŸ αž“ αž›αŸ‹αžαž½αž“αžŠαžΌαž…  private keys, Credit

Card number or Certificate េ αŸ‡ αž…αŸαž’αžΈαŸ αž™ αž“ αž“αžΈαž—αŸαž™ αž›αŸ‹αžαž½αž“αž–αž½αž€αŸαž‚  αžŠαžΌαŸ αŸ‡  αŸαž αž™αžΈ αž€αž˜αž αž»αŸŠαž“αž˜αž·αž“αž‘αž‘αž›αž½αžαž»αžŸ តវ  αž…αŸ†αŸ αŸ‡ រ αžαŸ‹αž”αž„αŸ‹αž–αžαŸ αž“ αž˜αž™αž½αžŠαžΌαž… αž–αžαŸ αž“αŸ‚αžŠαž›  αž“αžšαž€ αž‘αž»αž€αŸ αž€αž»αž„walletរ ឺ រ αžαŸ‹αž”αž„αŸ‹ αž‘αž– សម តិ αž›αŸ‹αžαž½αž“αŸ‚αžŠαž›αžŸαŸ† αž“αŸ‹ αž˜αž½αž™αŸ αŸ‡αŸαž‘αŸ”

ៀ.ៀ រេ αžŸαŸ‚αŸ‹αžŠαž› ម ត(αŸ‹Prohibited Usage) : αžšαž‘αž‘αž›αž½αž“αž·αž„αŸ‚αž”αž„αŸ‚αž…αž€αž‘αž·αž“αž“αŸαž™  , αžšαžšαž€ αž‘αž»αž€αž‘αž·αž“αž“αŸαž™  αž“αž·αž„ αžšαŸ‚αž…αž€ αž™αž‘αž·αž“αž“αŸαž™αŸ‚αžŠαž›

αžαž»αžŸαž… αž”αŸ‹, ម ស  αžš ឺ αŸ αž›αž‡αŸ†αŸαž“  αžš ឺ αž•αžΌαžœαŸαž—αž‘αž€αŸ αžαžœαŸαž‚ ម αžαŸ‹αŸ‚αžŠαžšαŸ”

αž€αž˜αž αž»αŸŠαž“αž€αŸ αž“ ម αžαŸ‹αŸ αžαŸ†αŸαž“αžΈαžš αžšαž‡αŸ†αž“αž™αž½,αžŸαž€αž˜ αž–αž“αŸ αž™, αžŸαž€αž˜ αž–  αž˜αž·αž“αžŸαž»αž…αžšαžαž·  αžš ឺ αžšαŸ‚αž…αž€ αž™αžαž»αžŸ , αž“αž·αž„αŸαžš αž„ αŸ‰ វ αŸ† αž…αŸ‹αŸ‚αžŠαž›αž”αž„αžΌαž…αŸαž€αžš αž·αž•αŸαž„αŸ‚αžŠαžšαŸ”  αžŸαž€αž˜ αž–αž˜αž™αž½αž…αŸ†αž“αž“αž½αŸ‚αžŠαž› តវ αž“αŸαž‚ ម αžαŸ‹ αŸ‰ αž„αžαžΉαž„αžšαž„αžΉαžšαž˜αž½ αž“  : +       αžšαž…αžΌαž›αŸ αž“αŸ‹αž–αžαŸ αž“ αž€αž˜αž αž»αŸŠαž“αŸ‚αžŠαž›αž˜αž·αž“αžŸαž·αžαŸ αž€αž»αž„αž‘αŸ†αž αŸ† រ αžšαžšαž”αžŸαŸ‹αž’αž€

αž€αŸ‹αž‚αžΊ រ αž“αž–αžαŸ αž“αž’αŸ†αž–αžΈαž‚αžŽαž“αžΈαž’αžαž·αžαž·αž‡αž“αŸ αž™αž˜αž·αž“ αž“ αžšαž’αž“αž» តិ  ,   αžšαž…αžΌαž›αŸ αž“αŸ‹

αž–αžαŸ αž“αž–αžΈ File αž›αŸ‹αžαž½αž“αŸ αž™αž˜αž·αž“ αž“ αžšαž’αž“αž» តិ  αž“αž·αž„ αžšαž…αžΌαž›αŸ αž“αŸ‹αž–αžαŸ αž“αŸ‚αžŠαž›αž˜αž·αž“ αŸ†

αž…αŸ‹αžŸαŸ† αž”αŸ‹ αž”αž·αžαž”αžαž· រតួ αž‘αžΈ រ រ  (Job Function)  αŸ”

+ រេ αž”αžΈ αžŸαŸ‹αžαž»αžŸ , រ ត ត αž„αŸ αž™αžŠαžΉαž„αŸ αž™ αž“αžŸαž·αž‘αž· តឹម តវ,αžšαž€αŸαžΊαŸ‚αž€αŸ‚ αž”

αž–αžαŸ αž“αž”αž»αž‚αž›  αžšαž’αžΊαžαž·αžαž·αž‡αž“αŸ αŸ‡αž‚αžΊ αžšαŸαž’αžΈ រ αžŸαŸ‹αž”αžΌαžšαŸ αž™ αž“αžŸαž·αž‘αž·αž…αŸ†αŸ αŸ‡  File αž›αŸ‹αžαž½αž“αžšαŸ‚αžΊαž…αž€

Page 15: 2013 y4-s2-414-group01

αž™αž‘αž·αž“αž“αŸαž™αž”αž»αž‚αž›  αžšαž’αžΊαžαž·αžαž·αž‡αž“ ម αž”αž–αŸαž“αŸαž’αž‘αž· αžαž“αž·αž… αž˜αž™αž½αž“αžΉαž„αž”αž»αž‚αž›αŸ‚αžŠαž›αž˜αž·αž“ αž“αžŸαž·αž‘αž·αŸαž‘   + Link αž”αŸ‹  Website  αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αŸ Internet αŸαž• αž„  αžš ឺ www site αŸαž• αž„αŸ‚αžŠαž›  content ខឹម αžšαžšαž”αžŸαŸ‹ αž˜αž·αž“ តវ  αžš ឺ αž“αž”αŸ†αž“αž„αž”αŸ† αž“αŸαž›αžΈαŸ αž›αž“αŸ αž™αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αŸ”

+ រ αž” αž–αžΉαž αž˜αž™αž½αŸ‚αžŠαž›αž“αžΉαž„αž”αŸαž„αžΈαžαžšαž‡αžΊαž™αž½αž‡αŸ†αžšαž»αž‰αŸ αž™ αž“αž”αž‘αŸαž›αžΈαžŸ αž–αž αž‘αžŽ

αž… αŸαŸ† αž™αžαžΌαž… αž”αŸ αž‡αž“αŸαžŸαž»αžΈαžœαž›αž·  αžšαž˜αžΊ αž„αŸ‰αžœαž‰αž·αŸαž‘ αžαž‚αžΊαž”αŸ† αž“αŸαž›αžΈαž”αž‘αž”  αž… αž”αŸ‹ αžαž·αžšαž’αžΊαž“αžš តិ,

រដ, αž˜αžΌαž› αž“αž•αž„αŸ‚αžŠαžšαŸ”

+ រេ αž”αžΈ αžŸαŸ‹, αžšαž” ូ αž“, αžšαž…αž˜αž„,រ ឺ αžšαž‘αž‘αž›αž½αžœαžαž» តុេដីមេ αž™αž–αŸ†αž»αž‚αž·αžαŸƒαžαž‚αžΉαžšαŸαŸ† αž—

αŸαž›αžΈ αžšαžšαž€ αžŸαž·αž‘αž·, αŸ‰ αž€αžšαž™αžΊαŸαžΈ , αžšαžŸαŸ† αžαŸ‹ αžŽαž·αž‡αž€αž˜  αžšαžšαžΊαŸαŸ† αž—αŸαž›αžΈαžŸαž·αž‘αž· αŸ‰ αžαž„αŸ‹αžšαž”αžŸαŸ‹αž˜αž“αž»αžŸ

αž€αŸ‹  αžšαž’αžΊαž„ រ αž˜αž™αž½αŸ”αŸαž αž™αžΈαžŸαž“αžαŸ‹ αž‚αž”αŸ‹αžœαžαž» តុេដីម αž„αŸ†αž’αžŸαŸ‹αŸ αŸαž›αžΈ  Internet αž‚αžΊ αž“ រ αžšαž€ αžŸαž·αž‘αž·  αžš ឺ αž“ αž” αžŸαž“αžΈαž™αž”αŸ αžαžαž€αž€αž˜αŸ”

+ αžšαž” ូ αž“αž‘αž·αž“αž“αŸαž™αŸƒαž“ αžŸαŸ‹αž€αž˜αžŸαž·αž‘αž· αž˜αž™αž½αŸ‚αžŠαž›αžŸαŸ† αžαŸ‹αžšαž–αžΊαžαŸ αž“αŸ‚αžŠαž› αž€αŸ‹αž‘αž·αž“

αž“αžΉαž„ αžšαžŸαŸ† αžαŸ‹  αž‚αžΊαž–αŸ†αž» αž“ រ αžαžαž–αž·αž“αž·αž តឹម តវេ αŸ‡αŸαž‘αŸ”

+ αžšαž”αŸαž„αžΈαž, αžšαŸαž•αžΈαžš αž˜αŸƒ αž”αžŽαžΈαž™,៏ αžšαž” ូ αž“ រ ឺ αžšαž‘αž‘αž›αž½αŸ αž™αž–αŸ†αž»αž‚αž·αžαŸƒαžαŸ αž’αž„

តុ αž™ αž” αžšαž’αž„ αžαž»αž‚αŸ† αž˜αž€αŸ†αŸ‚αž αž„, αž’αž„ αžαž»αŸ‚αžŠαž›αŸαž’αžΈαŸ αž™αžαžΌαž…αŸαž€αžš ិេ៏ αŸ‡, αŸαž›αžΈαžŸαž… αž”αŸ‹

αžšαžαž»αžΊαžŸαž… αž”αŸ‹αž˜αž™αž½αž…αŸ†αž“αž“αž½αŸ αž™αžšαž˜αž½αž” ូ αž›  αŸ‚αžαž˜αž·αž“αž€αŸ†αž“αžαŸ‹αŸαž›αžΈ αžšαž’αž’αž·αž” αž™ αž„αŸ† αž™αŸ‚αžŠαž›αž–αžΉαž„

αŸ‚αž•αž€αŸαž›αžΈ តិ αžŸαž“αŸ, αŸαžŠαžΈαž˜αž€αŸ†αŸαžŽαžΈαž តិ, αŸαž—αž‘, αž’αž“αž» αž”αŸαž“αŸƒαž“αŸαž—αž‘, αžšαž™αŸ‡ αž› αž–αž–αž· រ  αžš ឺ αž’សមត αž–, ស  αžšαž‡αŸ†αžΊαŸαž“ αž“αŸ αž™...αŸ”

+ αž‘αŸ†αžšαž„αŸ‹αŸ‚αž› αž„αžŸαž»αžΈαžŸαž„αž˜αž™αž½αž…αŸ†αž“αž“αž½

+ downloadαž€αž˜αžœαž’αžΈαž· Free Trial រFឺileេ αž™ αž“αžŸαž·αž‘αž·αžŸαŸ† αž”αŸ‹αŸ αž”αžΈ αžŸαŸ‹αŸ αž™ αž“ រ αž’αž“αž» ត αž˜αž»αž“αž–αžΈ αž™αž€ αž“ IT រ ឺManager αž‚αž”αŸ‹ αž‚αž„

+ αž” αž‘αž·αž‰αžŸαŸ† αžšαŸ‡  αŸ αž”αžΈ αžŸαŸ‹  αžšαŸαžΊαžŸ αž€αž˜αž˜αž™αž½αž…αŸ†αž“αž“αž½ ម Internet

+ αŸαž›αž„αŸ‚αž› αž„ (Game) αž˜αž™αž½αž…αŸ†αž“αž½αž“

+ αž” ូ αž“αž”αž“αŸ រ  αžšαž›αžΊαž·αžαž·αž αž”αž“αž” αž”αŸ‹

` + αž…αžΌαž›αžšαž˜αž½ រ αž”αž€αž½αžαŸαž• αž„αŸ— ម  On-line  αžš ឺ Promotion

*  Note : (Band width) αž‘αŸ†αž αŸƒαŸ†αž“αŸ αž”αž€αž„αŸ‹ αž„αŸ†αž€αž»αž„ αž€αž˜αž αž»αŸŠαž“  αž“αž·αž„ αž„αŸ† αž”αŸ‹αŸ Internet

តវ αž“αŸ‚αž…αž€αžšαŸ‚αŸ†αž›αž€  αŸαž αž™αžΈαž’αž“ αž“αž€αŸ αž“αž€αŸ†αž“αžαŸ‹αŸ”   αž‚αž”αŸ‹User αžαžœαŸαž’αžΈ αžšαžαŸ† αž”αžΉαž„αŸ‚ αž”αž„αŸ αž™ សម

αŸαž αžαž»αž•αž›αŸαžŠαžΈαž˜ េី αž”αžΈ αžŸαŸ‹αž’αž“ αž“αŸαž“αŸ‡  αž€αž»αž„αž˜αž’ αž™ េ αž…αžΈαž“αŸ‚αžŠαž›αž˜αž·αž“αž”αŸ‰αŸ‡ αž›αŸ‹  αžšαž‡αžΊαŸ‡αž₯αž‘αž·αž–αž›

αžŠαž›αŸ‹αž”αž»αž‚αž›αž·αž€αžŠαŸαŸƒαž‘αŸαž‘ តេ αž™αž’αžœαž‡αž· αž“αŸ αŸ‡αŸαž‘αŸ” αž™αž€ αž“ αž€αŸ‹ αž€αŸ‹αž“αžΉαž„αž€αŸ†αž“αžαŸ‹αŸ αž› រណ៏

αŸ‚αžŽ αŸαŸ† αŸαž›αžΈ រេ αž”αžΈ αžŸαŸ‹ Bandwidth αž“αž·αž„αž€αŸ†αžŽαžαŸ‹αž’αž“ αž“αŸ αž™αŸ‚αž‘αž€αŸαž αž™αžΈαž“αžΉαž„ ម

αžαŸ‹ រ download αž”αŸαž—αž‘ file αž–αž·αŸαžŸαžŸαŸ— េ αž…αžΈαž“αŸαž‘ αžαŸ”

III. េ αž›αž“αŸ αž™  Access αž…αž›αžΌαž–αž…αŸ† αž™

Page 16: 2013 y4-s2-414-group01

(Remote Access Policy): III.៑. េ αž›αž”αž“αŸ†αž„(Purpose): េ αž›αž”αŸ†αž“αž„αŸƒαž“αž“αŸ αž™αŸαž“αŸ‡  αž‚αžΊ តវ αž€αŸ†αž“αžαŸ‹αž”αž‘ αž“αžŸ αž”αŸ‹ αž”αŸ‹αŸ αž“αŸ‹ Network

αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“  αž¬  αž’αž„ αžšαž–αžΈ Host (Pc) αž˜αž™αž½αŸ”  αž”αž‘ αž“ αž„αŸ†αŸαž“αŸ‡ តវ αž“αž”αŸαž„αžΈαžαŸαž‘αž„αžΈαŸαžŠαžΈαž˜ αž”αžΈ αž„αž˜αŸ αž™αžαžΌαž…αŸ αžšαž• αž™αŸ αž™αžŠαžΉαž„αž›αžΊαžšαžŽαŸ‡  αŸ αž™ αž“αžŸαž»αž–αž› αž–  αž…αŸ†αŸ αŸ‡ αž€αž˜αž αž»αŸŠαž“  αž¬  αž’αž„ αžšαž–αžΈ αžšαžαžΌαž… αžαŸαž• αž„αŸ—αŸ‚αžŠαž› αž…

αž›αž‘αž•αž›αŸ‚αžŠαž›αž” αž›αž˜αž€αž–αžΈ រេ αž”αžΈ αžŸαŸ‹αž’αž“ αž“αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αŸ αž™αž–αŸ†αž» αž“ រ αž’αž“αž» αžαžŸαž·αž‘αŸ αž™ αž“ តឹម αžαžœαŸ”  αžšαžαžΌαž… ត αž„αŸ†αŸ αŸ‡αžšαž˜αž½ αž“αŸˆ រ αžαŸ‹αž”αž„αŸ‹αž‘αž·αž“αž“αŸαž™αžŸαŸ† αžαŸ‹αžšαž”αžŸαŸ‹ αž€αž˜

αž αž»αŸŠαž“  αž¬  αž‘αž·αž“αž“αŸαž™αŸ‚αžŠαž› αž€αŸ‹αž‘αž„αž“αžΉαž„ αžšαžŸαŸ† αžαŸ‹, αž‘αž– សម αžαž·αž” αžœαž“, αžαžΌαž… αžαžŠαž›αŸ‹αž˜αž»αž αžαŸ‹  αž¬αŸαž€αžšαŸ αŸ‡ រណៈ,  αž“αž·αž„αžαžΌαž… αžαžŠαž›αŸ‹ αž”αž–αŸαž“ αž„αž€αž»αž„αžŠαŸαžŸαŸ† αž“αŸ‹αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αž•αž„αŸ‚αžŠαžš  (damage to critical company internal system)  αŸ”

III.្.αž‘αŸ†αž αŸ†( Scope): េ αž›αž“αŸ αž™αŸαž“αŸ‡αž’αž“αž»αžœαžαž…αŸ†αŸ αŸ‡αž”αž»αž‚αž›αž·αž€ αž€αž˜αž αž»αŸŠαž“ αž„αŸ†αž’αžŸαŸ‹, αž’αž€αž›αž€αŸ‹αžšαžˆαž½αžΊαž‰,αž’αž€

αž…αž»αŸ‡αž€αž»αž„ αž¬αž’αž€αŸ αŸ‰ រ  αž“αž·αž„ αž€αŸ‹ αžšαŸ‚αžŠαž› αž“  Computer or workstation αŸ‚αžŠαž› αž‚αž”αŸ‹ αž‚αž„

េ αž™ αž›αŸ‹  αž¬ αž‚αž”αŸ‹ αž‚αž„αŸ αž™ αž€αž˜αž αž»αŸŠαž“αŸ‚αžŠαž› αž“αŸ αž”αžΈ αžŸαŸ‹αŸαžŠαžΈαž˜ ី αž”αŸ‹αž˜αž€ αž“αŸ‹ Network

αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αŸ”αŸαž αž™αžΈαŸ αž›αž“αŸ αž™αŸαž“αŸ‡αž’αž“αž»αžœαžαž…αŸ†αŸ αŸ‡ រ αž”αŸ‹αž‘αŸ† αž€αŸ‹αž‘αŸ†αž“αž„αŸƒαž“ រ  Access

αž…αžΌαž›αž–αžΈαž…αŸ† αž™αŸ‚αžŠαž› αž“αŸ αž”αžΈ αžŸαŸ‹αŸαžŠαžΈαž˜ αŸαžΈαž’αžΈ រ រ  αž¬αž€αž·αž… αžšαž€αž»αž„ αž˜αžαŸ† αž„αŸ αž™ αž€αž˜αž αž»αŸŠαž“

េ αž™ αž”αŸ‹αž” ូ αž›αŸ រ   αž“  αž¬ αžšαŸαž•αžΈαžš  E-mail αž“αž·αž„ រ αžαžαž–αž·αž“αž·αž αž’αž“ αž“ ម Web αŸƒαž“  Intranetេ αŸ‡αŸ” រ αž”αžαž·αž”αž ម Remote AccessαŸ‚αžŠαž› αž‚αž”αžŠαžŽαž”αŸ‹αŸ αž™αŸ αž›αž“αŸ αž™

αŸαž“αŸ‡αžšαžΌαž˜αž” ូ αž›  αž”αž»αŸ‰αŸ‚αž“αž˜αž·αž“αž€αŸ†αž“αžαŸ‹αž…αŸ†αŸ αŸ‡dial in modems , frame Relay, ISDN,

DSL,VPN,SSH, αž“αž·αž„ Cable Modems .αž›.αŸ”

III.៣.េ αž›αž“αŸ αž™(Policy): ៣.៑ General: ៑. αž‚αžΊ αžšαž‘αž‘αž›αž½αžαž»αžŸ αžαžœαžšαž”αžŸαŸ‹αž”αž»αž‚αž›αž·αž€αž€αž»αž„ αž€αž˜αž αž»αŸŠαž“, αž’αž€αŸ αŸ‰ រ, αž’αž€αž›αž€αŸ‹, αž€αŸ‹ រ αŸ‚αžŠαž› αž“αžŸαž·αž‘αž· Access αž…αžΌαž›αž–αžΈαž…αŸ† αž™αŸ αž“αŸ‹ Network αžšαž˜αž½αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αŸαžŠαžΈαž˜ ី

αžŠαžΌαž… αž“αžΉαž„ រ αž”αŸ‹ Connection αžšαž”αžŸαŸ‹ User េ αž“αžΉαž„αž€αŸ‚αž“αž„αŸ αž“αŸ‹ αž€αž˜αž αž»αŸŠαž“αŸ‚αžŠαžšαŸ”

្. រ Access αž…αžΌαž›αŸ αž“αŸ‹ Internet αž‘αžΌαŸ ស αž”αŸ‹ រេ αž”αžΈ αžŸαŸ‹αŸ‚αž”αž”αž€αŸ† αž“αŸ αž™

ស αž‡αž·αž€αŸ‚αžŠαž›αŸ αž•αŸ‡ αž˜αžšαž™αŸ‡ Network αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“ Computer αž›αŸ‹αžαž½αž“ តវ αž“αŸαž‚

Page 17: 2013 y4-s2-414-group01

αž’αž“αž» αžαžŸαŸ† αž”αŸ‹αž”αž»αž‚αž›αž·αž€αŸ‚αžŠαž› αž“αŸαžŸ αžαŸ†αŸƒαž›αŸ‚αžŠαž›αž˜αž·αž“αž” ុ αŸ‡αž”αžš ិ ណ(Flat rate Services)αŸ”  αž”αž»αž‚αž›αž·αž€ αž€αž˜αž αž»αŸŠαž“ αžαžœαž‘αž‘αž›αž½αžαž»αžŸ តវេដីម ី αžŠαž›αŸ‹αžŸ αž‡αž·αž€ αž‚ រ αžšαŸαŸ† αž—αž”αŸ† αž“αŸαž›αžΈαŸ αž›  αž“αŸ αž™ αž€αž˜αž αž»αŸŠαž“ αž˜αž½αž™αŸαž‘, αž˜αž·αž“αŸαž’αžΈαžŸαž€αž˜ αž–αžαž»αžŸαž… αž”αŸ‹, αž“αž·αž„αž˜αž·αž“αŸ αž”αžΈ αžŸαŸ‹ រAccess

αž…αžΌαž›αžŸαŸ† αž”αŸ‹αž•αž› αž”αŸ αž‡αž“αŸαž˜αž»αžαž‡αŸ†αž“αž‰αž½αŸ αž„αŸ េ αŸ‡αŸαž‘αŸ”  αž”αž»αž‚αž›αž·αž€ αž€αž˜αž αž»αŸŠαž“αž‘αž‘αž½αž›αžαž»αžŸ αžαžœαž…αŸ†αŸ αŸ‡αž•αž›αžœ ិ αž€αŸ αž™ រ Access αž…αžΌαž›  αŸαž αž™αŸ αž” αžŸαŸ‹αžαž»αžŸαŸ”

3.សូមេម αžαžαž–αž·αž“αž·αž αŸαž‘αž„αžΈαžœαž‰αž·αŸ  αŸ αž›αž“αŸ αž™ αž”αž“αž” αž”αŸ‹αŸ αž™ αž“αž–αž· រ αžŸαžΈαž’αŸ†αž–αžΈ រ រ αžšαž–αžαŸ αž“αŸ αŸαž–αž›αŸ‚αžŠαž› αž“ រ Access αž…αžΌαž›  Network  αžšαž˜αž½ αž˜αžœαž’αžΈαž·  Access

αž…αžΌαž›αž–αžΈαž…αŸ† αž™(Remote Access methods)  αž“αž·αž„ រេ αž”αžΈ αžŸαŸ‹αŸ‚αžŠαž› αž…αž‘αž‘αž›αž½αž™αž€ αž“αŸƒαž“  Network  αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αžŠαžΌαž… :

a. Acceptable Encryption Policy : េ αž›αž“αŸ αž™αžŸαžšαŸαžŸαžš αž’αž€ αžšαžŸαŸ† αžαŸ‹

b. Virtual Private Network (VPN) Policy c. Wireless Communication Policy d. Acceptable Use Policy

៣.្. αžαŸ†αžšαžœαžΌ រ(Requirements) :

1.Remote Access αžαžœαŸ‚αžαŸαž‚ αž‚αž”αŸ‹ αž‚αž„ αŸ‰ αž„αžαžΉαž„αžšαž„αžΉ រ αž‚αž”αŸ‹ αž‚αž„αž“αžΉαž„ តវ αž“αŸαž‚αž– αž„αžΉαž„  αž˜αžšαž™αŸ‡  Password authentication រPឺublic /Private  KeysαŸ‚αžŠαž› αž“ αžαŸ‹αŸ—αžŠαŸαžšαž„αžΉ αŸ”αŸ†

2.αž”αž»αž‚αž›αž·αž€ αž€αž˜αž αž»αŸŠαž“αž˜αž·αž“ តវេ αž™ Email Password or Login αžšαž”αžŸαŸ‹αž–αžΌαž€αŸαž‚αŸ

αž“αžš αž€αŸ‹ រសឺ αž‡αž·αž€ αž‚ αžšαŸαž‘αž™αžΈαŸ”

3.αž”αž»αž‚αž›αž·αž€ αž€αž˜αž αž»αŸŠαž“  αž“αž·αž„αž’αž€αž…αž»αŸ‡αž€αž»αž„ αŸ‚αžŠαž› αž“αžŸαž·αž‘αž· Accessαž…αžΌαž›αž–αžΈαž…αŸ† αž™ តវ

αž€αŸ†αž»αž– αžΌαž‘αŸαžš αž›αŸ‹αžαž½αž“  αžšαž€αŸ†αž»αžΊαž– αžΌαž‘αŸαžš αž€αž˜αž αž»αŸŠαž“αŸ‚αžŠαž› αž“ αž”αŸ‹αŸ αž“αŸ‹ Network αžšαž˜αž½αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αŸ αŸ‡ αž‚αžΊαž˜αž·αž“ តវ αž”αŸ‹αŸ αž“αŸ‹  Network αžŠαŸαŸƒαž‘αŸαž• αž„αŸαž‘ ត αž˜αž™αž½αŸαž‘αž™αžΈαŸ αŸαž–αž›αŸ‚αžαž˜αž™αž½αŸ” 4.េ αž‚ αž„αž”αžš ិ αžšαŸ‚αžŠαž›αŸ αž”αžΈ αžŸαŸ‹αŸαžŠαžΈαž˜ ី αž”αŸ‹αž˜αž€ αž“αŸ‹ Network

αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“ αžαžœαž”αŸ†αŸαž–αž‰αžαŸ†αžšαžΌαžœ αžšαŸƒαž“αŸ αž‚ αž„αž”αžš ិ រ  αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αžŸαŸ† αž”αŸ‹ Remote AccessαŸ”

III.ៀ. αžšαž’αž“αžœαž»αžαž… αž”(αŸ‹Enforcement) :

αž”αž»αž‚αž›αž·αž€αž˜αž½αž™αž…αŸ†αž“αž½αž“αŸ‚αžŠαž›αŸαž‚αž™αž›αŸ‹αŸαžƒαž‰αžΈ αž“αžšαŸαŸ† αž—αž”αŸ† αž“αŸαž›αžΈαŸ αž›αž“αŸ αž™αŸαž“αŸ‡ αž“αžΉαž„ αžαžœαž‘αž‘αž›αž½αžšαž„αŸ αž’αŸ†αŸαž–αžΈ αž€αŸ‹αžœαž“αŸαž·αž™  αž“αž·αž„  αŸ‚αžαž˜ αž„αŸ†αž”αŸαžŽαž‰αŸαž…αž‰αž–αžΈ រ αžšαŸαž‘ αžαž•αž„αŸ”

IV. េ αž›αž“αŸ αž™αžŸαž“αžŸαžαž»Router(Router Security Poicy) :

៑.េ αž›αž”αŸ†αž“αž„(Purpose):

Page 18: 2013 y4-s2-414-group01

αž―αž€ αžšαŸαž“αŸ‡αž–αžΈαž–αžŽαŸ αž’αŸ†αž–αžΈ រ  Configuration Security αžαž·αž…αžαžαž½αžŸαŸ† αž”αŸ‹ αž‚αž”αŸ‹ Router

αž„αŸ†αž’αžŸαŸ‹ αž“αžΉαž„  Switches αž„αŸ†αž’αžŸαŸ‹αŸ‚αžŠαž› αž”αŸ‹αž˜αž€ αž“αŸ‹  Production Network រ ឺ αž“αŸ αž”αžΈ αžŸαŸ‹

េ αž€αž»αž„ Production Capacity αž€αž»αž„ αž˜αžαŸ† αž„αŸ αž™ αž€αž˜αž αž»αŸŠαž“αŸ”

្.αž‘αŸ†αž αŸ†(Scope) :

αž‚αž”αŸ‹ Router & Switch αž„αŸ†αž’αžŸαŸ‹ αž“ αž”αŸ‹αž˜αž€αž” αž‰αž•αž›αž·αžαž€αž˜  (Production

Network) αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αž‚αžΊ αž“αž•αž›αž”αŸ‰αŸ‡ αž›αŸ‹  αŸαž αž™αžΈ Router & Switch េ αž€αž»αž„ Labs

(Secured Labs) αž„αž€αž»αž„αž‚αžΊαž˜αž·αž“ αž“αž•αž›αž”αŸ‰αŸ‡ αž›αŸ‹αŸαž‘αŸ”  Router & Switch េ αž€αž»αž„αžαŸ†αž”αž“αŸ‹DMZ

αž€αŸ‹αž˜αž€αŸ េ ម  The Internet DMZ Equipment PolicyαŸ”

៣.េ αž›αž“αŸ αž™(Policy) :

Router αž“αž·αž˜αž™αž½αŸ— αžαžœαž”αŸ†αŸαž–αž‰αŸ αž”αž‘ αž“αŸƒαž“ រ Configuration αžŠαžΌαž…αžαŸ  : + αž“αž‚αžŽαž“αžΈαž’αž€αŸ αž”αžΈ αžŸαŸ‹  Local αŸ‚αžŠαž›αŸαž‚ Configure េ αŸαž› ីRouter αŸαž‘ αŸ”

Router តវេ αž”αžΈ TACACS for All User authentication αŸ” + Enable Password េ αŸαž›αžΈ Router αžαžœαŸ‚αžαžšαž€ αž‘αž»αž€αŸ αž€αž»αž„αž‘αŸ†αžšαž„αŸ‹ Secured encrypted

form. Router តវ αž“  enable password αž€αŸ†αž“αžαŸ‹αž…αŸ†αŸ αŸ‡ the current production router

password  αž–αžΈαž’αž„ αžšαŸ‚αžŠαž› Support Router αŸ” + Disallow the following : a. IP directed broad cast : αžšαž• αž™αŸαž…αž‰αŸ IP េ αž™ αž›αŸ‹

b. Packet αŸ‚αžŠαž›αž…αžΌαž›αžŠαŸ†αž”αžΌαž„αŸ αŸαž›αžΈ Router αŸ‚αžŠαž› αž“ invalid AddressαžŠαžΌαž…     RFC1918  Address  αŸ”

c. TCP Small Services d. UDP Small Services e. All Source Routing f. All web Services running on router + αŸαž‚ αžαžœαž”αŸ‚αž“αž˜ Access Rules េ αŸαž–αž›αžαŸ†αžšαžΌαžœ αžšαž‡αŸ†αž“αž‰αž½αŸαž€αžΈαž“αŸαž‘αž„αžΈ

+ Router αžαžœαž” ូ αž“αŸ αž€αž»αž„ αž”αž–αž“αŸ αž‚αž”αŸ‹ αž‚αž„αŸƒαž“αžŸαž  សរមួ

+ Router αž“αž·αž˜αž™αž½αŸ— តវ αž“  αŸαžŸαž…αž€αžΈαŸ‚αžαž„ αžšαžŽαŸαŸ‚αžŠαž› αž€αŸ‹αž€αž»αž„ Clear View : UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED  αŸ”  αž’αž€ តវ αž“ αžšαž’αž“αž» ត αŸ‰ αž„αž… αžŸαŸ‹αŸαžŠαžΈαŸαž˜ ីAccess រ ឺ Configure Device

αŸαž“αŸ‡αŸ”

+ Telnet αŸαž‚αž˜αž·αž“αŸ‚αžŠαž›αŸ αž”αžΈ αžŸαŸ‹Network αž˜αž™αž½αŸαž‘αŸαžŠαžΈαž˜ ី αž‚αž”αŸ‹ αž‚αž„ Router

αž”αžŸαž·αž“αŸαž”αžΈ αž“  Secure Tunnel αŸ‚αžŠαž› រ αžšαž•αžΌαžœαž‘αŸ† αž€αŸ‹αž‘αŸ†αž“αž„ αž„αŸ†αž’αžŸαŸ‹αŸαž‘αŸ”  SSH αž‚αžΊ Protocol

αž‚αž”αŸ‹ αž‚αž„αŸ‚αžŠαž›αŸαž‚αŸαž–αž‰αž“αž·αž™αž˜ αž„αŸαž‚ αŸ”

ៀ. αžšαž’αž“αžœαž»αžαž… αž”(αŸ‹Enforcement):

Page 19: 2013 y4-s2-414-group01

αž”αž»αž‚αž›αž·αž€αž˜αž½αž™αž…αŸ†αž“αž½αž“αŸ‚αžŠαž›αŸαž‚αž™αž›αŸ‹αŸαžƒαž‰αžΈ αž“αžšαŸαŸ† αž—αž”αŸ† αž“αŸαž›αžΈαŸ αž›αž“αŸ αž™αŸαž“αŸ‡ αž“αžΉαž„ αžαžœαž‘αž‘αž›αž½αžšαž„αŸ αž’αŸ†αŸαž–αžΈ αž€αŸ‹αžœαž“αŸαž·αž™  αž“αž·αž„  αŸ‚αžαž˜ αž„αŸ†αž”αŸαžŽαž‰αŸαž…αž‰αž–αžΈ រ αžšαŸαž‘ αžαž•αž„αŸ”

αŸ₯.  αž“αž·αž™αž˜αž“αŸαž™ (Definitions):

Production Network αž‚αžΊ Network αŸ‚αžŠαž› តវ αž“αŸαž‚αŸ αž”αžΈαŸ αž€αž»αž„αž˜αž»αžαž‡αŸ†αž“αž½αž‰αžšαž”αžŸαŸ‹

αž€αž˜αž αž»αŸŠαž“ αž” αŸƒαŸ†αž  αŸ”

Lab Network Network αŸ‚αžŠαž› តវ αž“αŸαž‚αŸ αž”αžΈ αžŸαŸ‹αžŸαŸ† αž”αŸ‹αŸ αž›αž”αŸ†αžŽαž„Testing,

demonstration, training.αž›.αŸ”

V. េ αž›αž“αŸ αž™αžŸαž“αžŸαžαž»αŸαžŸαŸ (Server Security Policy):

៑.េ αž›αž”αŸ†αž“αž„(Purpose):

េ αž›αž”αŸ†αž“αž„αŸƒαž“αŸ αž›αž“αŸ αž™αŸαž“αŸ‡αž‚αžΊ តវ αž“αž”αŸαž„αžΈαžαžŸαž„αŸ‹ αžŸαŸ† αž”αŸ‹ រConfiguration

αž‚αžΉαŸ‡αŸ αŸαž›αžΈαŸ αž‚ αž„αž”αžš ិ Server េ αž„αž€αž»αž„  αž¬ αž”αžαž·αž”αžαž·αŸ αž™ αž€αž˜αž αž»αŸŠαž“ αŸ”

αžšαž’αž“αž»αžœαžαŸ αž›αž“αŸ αž™αŸ αž™ αž“ αž”αžŸαž·αž‘ αž–  αž“αžΉαž„αŸαž’αžΈαŸ αž™ αž“ Unauthorized Access

αžαž·αž…αžαž½αž…αŸ αž“αŸ‹αž”αŸαž…αž€αžœαž‘αž· αž“αž·αž„αž–αžαŸ αž“αŸƒαž“αž€αž˜αžŸαž·αž‘ αž€αž˜αž αž»αŸŠαž“ αŸ”

្. αž‘αŸ†αž αŸ†(Scope): េ αž›αž“αŸ αž™αŸαž“αŸ‡αž’αž“αž»αžœαžαž…αŸ†αŸ αŸ‡αŸ αž‚ αž„αž”αžš ិ រ  Server  αŸ‚αžŠαž› αž‚αž”αŸ‹ αž‚αž„  αžš ឺ αž“αŸ‹ αž”αŸ‹

េ αž™ αž€αž˜αž αž»αŸŠαž“αž“αž·αž„αž…αŸ†αŸ αŸ‡  Server αŸ‚αžŠαž› αž“  Registered េ េ ម  Domain  αŸƒαž“  Network

αž„αž€αž»αž„αŸ‚αžŠαž› αž‚αž”αŸ‹ αž‚αž„αŸ αž™ αž€αž˜αž αž»αŸŠαž“αŸ”

េ αž›αž“αŸ αž™αŸαž“αŸ‡αž‚αžΊαžŸαŸ† αž”αŸ‹αŸ αž‚ αž„αž”αžš ិ េ αŸαž›αžΈ    Network αž„αž€αž»αž„αžšαž”αžŸαŸ‹ αž€αž˜

αž αž»αŸŠαž“ αŸ‰ αž„ αž€αŸ‹ αž€αŸ‹αžŸαŸ† αž”αŸ‹ រConfigurationេ αŸαž›αžΈαŸ αž‚ αž„αž”αžš ិ αžšαž–αžΈ αž„αŸ េ αž€αž˜αž αž»αŸŠαž“αŸαŸαž› ី DMZ αŸ‚αžŠαž›αžŸαŸ†αŸ េ αŸαž›αžΈ  Internet DMZ Equipment Policy  αŸ”

៣.េ αž›αž“αŸ αž™(Policy):

៣.៑ Ownership and Responsibilities αž‚αž”αŸ‹ Server េ αž„αž€αž»αž„ αž„αŸ†αž’αžŸαŸ‹αŸ‚αžŠαž› αž“ αž€αŸ‹αž– αž™αŸ αž€αž˜αž αž»αŸŠαž“ αžαžœαŸ‚αž αž‚αž”αŸ‹

αž‚αž„αŸ αž™ αž€αž˜ αž”αžαž·αž”αžαž·αŸ‚αžŠαž›αž‘αž‘αž›αž½αžαž»αžŸ αžαžœαžŸαŸ† αž”αŸ‹ រ αž‚αž”αŸ‹ αž‚αž„ αž”αž–αŸαž“ (System

Administration) αŸ” αž€αž˜ αž”αžαž·αž”αžαž· αž“αžΈαž˜αž½αž™αŸ—αŸ‚αžŠαž› តវ αž“αž”αŸαž„αžΈαžαŸαž‘αž„αžΈαŸ αžšαŸ‚αžŽ αžŸαŸ† αž”αŸ‹

រ Configuration Server αž“αž·αž„ αžšαŸ‚αž αŸ† αžŸαŸαž™αŸ αŸαž›αžΈαžαŸ†αžšαžΌαžœ αžšαž‡αŸ†αž“αž‰αž½αŸ”   αž€αž˜ αž”αžαž·αž”αžαž·αž‚αžšαž½αŸ‚αž        αžαžαž–αž·αž“αž·αž αŸαž›αžΈ រ Configuration Compliance αž“αž·αž„αž’αž“αž»αžœαžαŸαž’αžΈαŸ αž›αž“αŸ αž™αŸαž›αžΈαž€αŸ‚αž›αž„              αŸ‚αžŠαž› αž“αŸαžš αž”αž…αŸ†αž‚αŸ αž„αŸαž’αžΈαž…αŸ†αŸ αŸ‡αž”αžš ិ αž“αžšαž”αžŸαŸ‹αž–αž½αž€αŸαž‚αŸ”   αž€αž˜ αž”αžαž·αž”αžαž·αž“αžΈαž˜αž½αž™αŸ— αžαžœαž”αŸαž„αžΈαžαžŠαŸ†                

Page 20: 2013 y4-s2-414-group01

េណីរ αžšαžŸαŸ† αž”αŸ‹ រ αžŸαŸ‹αž”αžΌαžš Configuration guide αŸ‚αžŠαž›αžšαž˜αž½αž” ូ αž› αžšαŸαžŸαžΈαŸαžšαž“αž·αžΈαž„ αžšαž’αž“αž»αž˜αŸαžαŸ αž™ αž€αž˜αžŸαž“αž·αžŸαž»αžαž–αžαŸ αž“αŸ”

+ Server តវ αž“αž…αž»αŸ‡αŸ αŸ‡αž€αž»αž„ αž”αž–αŸαž“ αž‚αž”αŸ‹ αž‚αž„αžŸαž  សរមួ (Corporate

enterprise management system) αŸ‰ αž„αŸ αž… αžŸαŸ‹αž€αŸαž–αžαŸ αž“ តវ ម រេ αž™αž” αž‰

αž”αŸ‹αž–αžΈαž…αŸ†αž“αž»αž… αž€αŸ‹αž‘αž„ αž›αž€αžŽαŸ‡αžœαž‡αž· αž“ αž”αž“αž” αž”αŸ‹αžŠαžΌαž… αŸ– - Server Control (s) and Location, and a backup contact - Hardware and operating system/version - Main Function and application, if applicable. + αž–αžαŸ αž“αŸ αž€αž»αž„ Corporate enterprise management system αžαžœαŸ‚αžαžšαž€

េ αž™ up-to-date  αŸ” + រ αžŸαŸ‹αž”αžΌαžš រ Configuration for production server αžαžœαž’αž“αž»αžœαž αž˜αž“αžΈαžαž·αžœαž’αžΈαž·

αž‚αž”αŸ‹ αž‚αž„ រ αžŸαŸ‹αž”αžΌαžšαžŠαŸ តឹម αžαžœαŸ”

៣.្ αžšαŸ‚αžŽ αŸ†αž– រ  configure αž‘αŸαžΌ (General Configuration guidelines): Operating system configuration តវ αž“αŸ αž„αŸ ម guidelines  αŸ‚αžŠαž› αž“αž―αž€ αž–αž–αžΈ  Infuses :

- Service & application αŸ‚αžŠαž›αŸαž‚αž˜αž·αž“αŸ αž”αžΈ តវ Disabled េ αž›

-   រ Access αž…αžΌαž›αŸ αž“αŸ‹  Service αž˜αž™αž½αž…αŸ†αž“αž“αž½αž‚αžšαž½αŸ‚αž  log αž“αž·αž„ រ រ  access-

control methods αžŠαžΌαž…  TCP wrapper αŸ” -  αŸ αž”αžΈ αžŸαŸ‹αŸ αž› αžšαžŽαŸαžŸαž“αž·αžŸαž»αžαž”αž‘ αž“αž’αŸ†αž–αžΈ រ Access αž…αžΌαž›αŸαžŠαžΈαž˜ αž’αžΈαž“αž»αžœαž

តួ αž‘αžΈ

-  αž€αŸ†αž»αŸ αž”αžΈ Root េ αŸαž–αž›αž‚αžŽαž“αžΈαž˜αž·αž“ αž“αžŸαž·αž‘αž·

-   αž”αžŸαž·αž“αŸαž”αžΈαžœαž’αžΈαž· សស αž”αŸ‹αŸαž”αžΈαž€ រត αž”αŸ‹αž”αž»αŸ‰αžŸαž² αžšαž„αžΉ αž„αŸ† αž…αŸαž’αžΈ αž“αžŸαž·αž‘αž·

Access  αž…αžΌαž›   αžαžœαž’αž“αž»αžœαžαŸ αŸαž› ីSecure channel េ αŸ‡ (eg: encrypted network connection suing SSH or IP Sec) - Server αž‚αžšαž½αŸ‚αžαžŸαž·αžαŸ αž€αž»αž„ access-control environment

៣.៣ រ αžαžαž–αž“αž (Monitoring) + αž‚αž”αŸ‹αŸαž αžαž» αžšαžŽαŸαŸ‚αžŠαž› αž€αŸ‹αž‘αž„αž“αžΉαž„αžŸαž“αž·αžŸαž»αž αž„αŸ†αž’αžŸαŸ‹αŸ αŸαž›αžΈ αž”αž–αŸαž“ តវ αž“αŸαž‚ log

& αž–αž·αž“αž·αž αž” αž€αŸ‹αž•αžΌαžœ តវ αž“αŸαž‚αžšαž€ αž‘αž»αž€αžŠαžΌαž…αžαŸ αŸ– - αž‚αž”αŸ‹ រ  log(αžŸαžšαŸαžŸαžšαž…αž»αŸ‡ αž–αžΉαžαž· រណ៏)αŸ‚αžŠαž› αž€αŸ‹αž‘αž„αž“αžΉαž„  Security αž„αŸ†αž’αžŸαŸ‹

αž“αžΉαž„ តវ αž“αŸαž‚αžšαž€ αž‘αž»αž€ ម online αžšαž™αŸ‡αŸαž–αž›αžαž·αž…αž”αŸ†αž•αž»αžαž˜αž™αž½ αž‘αž·αž

- រ  backup αž‘αž»αž€αž€αž»αž„ tape αž”αŸαž—αž‘ Incremental αž” αž“αž·αŸ†αž„ តវ αž“αŸαž‚αžšαž€

Page 21: 2013 y4-s2-414-group01

αŸ‰ αž„αŸ αž… αžŸαŸ‹αž˜αž½αž™αŸ‚αž

- រ backup αž’αŸ†αž–αžΈ រ log αž€αŸ‹αž€αž»αž„ tape αž”αŸαž—αž‘ full αž” αžŸαŸ† αž αŸαž“αžΉαž„αžšαž€                                                   αž‘αž»αž€ αŸ‰ αž„αŸ αž… αžŸαŸ‹αž˜αž™αž½αŸ‚αž

- រ backup αž”αŸαž—αž‘ full αž” αŸ‚αŸ†αžαž“αžΉαž„ តវ αž“αžšαž€ αž‘αž»αž€ αž’αž” αž”αžš αž–αžΈαžš αŸ†

- េហតុ αžšαžŽαŸαŸ‚αžŠαž› αž€αŸ‹αž‘αž„αž“αžΉαž„ Security αž“αž·αž„ αž™ រណ៍េ Infuses αŸ‚αžŠαž› αž“αžΉαž„ αžαžαž–αž·αž“αž·αž αŸαž‘αž„αžΈαžœαž‰αž·αŸ រ logs αž“αž·αž„ αž™ αžšαžŽαŸαž§αž”αž‘αžœαŸαž αžαž»αž˜αž™αž½αž…αŸ†αž“αž“αž½   េ αž“αŸ‹ IT Management αŸ”

៣.ៀ. αžšαž’αž“αŸαž» មេ ម(Compliance): + αžšαž–αž·αž“αž·αž αž” αž€αŸ‹αŸ αž™αžŠαžΉαž„αžαž»αžŸ αžαžœαž“αžΉαž„ αžαžœαž’αž“αž»αžœαžαŸαž›αžΈαž˜αžΌαž› αž“ αž‚αžΉαŸ‡ αž” αŸαŸ† αž™

αž’αž„ αžšαŸ‚αžŠαž› αž“αžŸαž·αž‘αž·αž€αž»αž„ αž€αž˜αž αž»αŸŠαž“

+ αžšαž–αž·αž“αž·αž αž” αž€αŸ‹αŸ αž™αžŠαžΉαž„αžαž»αžŸ តវ (audit) αž“αžΉαž„ តវ αž‚αž”αŸ‹ αž‚αž„αŸ αž™ αž€αž˜ audit  αž„αž€αž»αž„αžš ឺInfuses αžŸαŸαž™αŸαž› ីaudit policy  αŸ”  Infuses αž“αžΉαž„αŸ αŸ‡ αžšαŸ‚αžŸαž„αžšαž€αŸ‚αžŠαž›αž’αžαŸ‹ αž€αŸ‹  

αž‘αž„αž“αž·αž„ αž€αž˜ αž”αžαž·αž”αž αž€αŸ‹ αž€αŸ‹αŸαž‘αŸαž αž™αžΈαž” αž”αŸ‹αž˜αž€αž” αž‰ αžšαžšαž€αŸαžƒαž‰αžΈαŸ Support staff αžŸαŸ†  αž”αŸ‹αžŠαŸ†αŸ αŸ‡ αž™

+ αž‚αž”αŸ‹αž€αž·αž… αž”αžΉαž„αŸ‚ αž”αž„ αž„αŸ†αž’αžŸαŸ‹  αž“αžΉαž„ αžαžœαŸαž’αžΈαŸαž‘αž„αžΈαŸαžŠαžΈαž˜ ី αž„αŸ†αž˜αž·αž“αŸ αž™ αž“ ររ αŸ† αž“αž¬

αž” αž‡αŸαž™αŸαž€αžΈαžαŸαž‘αž„αžΈ

ៀ. αžšαž’αž“αžœαž»αžαž… αž”(αŸ‹Enforcement): αž”αž»αž‚αž›αž·αž€αž˜αž™αž½αž…αŸ†αž“αž“αž½αŸ‚αžŠαž›αŸαž‚αž™αž›αŸ‹αŸαžƒαž‰αžΈ αž“αžšαŸαŸ† αž—αž”αŸ† αž“αŸ αž›αž“αŸ αž“αŸαž“αŸ‡αž“αžΉαž„  αž‘αž‘αž›αž½αžšαž„αž’αŸ†αž–αžΈ រ αž€αŸ‹αž–αž·αž“αŸαž™αŸαž‘αŸαžΈ αž“αžΉαž„αž”αžΌαž€αžšαž˜αž½ αžšαž”αŸαžŽαž‰αŸαž…αž‰αž–αžΈ រ αžšαŸαž‘ αžαž•αž„αŸ”

VI. េ αž›αž“αŸ αž™αž‘αŸ† αž€αž‘αŸ‹αž“αŸ†αž„αŸ αž™αž˜αž“αŸ αŸ‚αž (Wireless Communication Policy) ៑. Overview: េ αž›αž”αŸ†αžŽαž„αŸƒαž“αŸ αž›αž“αŸ αž™αŸαž“αŸ‡αž‚αžΊ តវ រ αžšαž“αž·αž„αŸαž’αžΈαŸ αž™ αž‘αž– សម αžαž·αž–αžαŸ αž“  αž“αžŸαž»αžœαžαž· αž–αŸ‚αžŠαž› αž“αŸ‹ αž”αŸ‹αŸ αž™ αž€αž˜αž αž»αŸŠαž“  αŸ”   αž€αž˜αž αž»αŸŠαž“αž•αž›αŸ‹αŸ  Computer devices,

Networks and αž”αž–αŸαž“αž–αžαŸ αž“ electronic αŸαž• αž„αŸαž‘ αžαž…αžΌαž›αŸ αž“αŸ‹αž’αž“ αž“ αž„αŸ†αŸαž“αŸ‡αž‚αžΊ αžŸαž·αž‘αž·  αŸαž αž™αžΈ តវេរ αž”αž…αŸ†  αž¬   αž‚αž”αŸ‹ αž‚αž„αž’αž“ αž“ αž„αŸ†αŸαž“αŸ‡αŸ αž™ αžšαž‘αž‘αž›αž½αžαž»αžŸ តវេដីម αŸ‚αžΈαžαžšαž€

Confidentiality, integrity αž“αž·αž„ availability αŸƒαž“ αž‘αž– សម αžαž·αž–αžαŸ αž“ αž„αŸ†αž’αžŸαŸ‹αŸ”

- Confidentiality αŸƒαž“αž–αžαŸ αž“:  αž–αžαŸ αž“ αž€αž˜αž αž»αŸŠαž“αž‚αžšαž½αŸ‚αžαž˜αž·αž“ តវ αž“αŸαž”αžΈαž€ αž“αŸαž‘αž™αžΈ  αŸαž”αžΈαžŸαž·αž“ αž“αžŸαž·αž‘αž·αž’αž“αž» ត

- Integrity αŸƒαž“αž–αžαŸ αž“:   αž– តឹម តវ  αž“αž·αž„αŸαž–αž‰αŸαž›αž‰αŸƒαž“αž–αžαŸ αž“ តវ αž“αŸαž‚ រ αžšαŸ”

Page 22: 2013 y4-s2-414-group01

- Availability: αŸƒαž“ αž”αž–αž“αŸαž–αžαŸ αž“ αžαžœαŸ‚αž αž… αž‰αž™αž€αž² αž“αŸ αž™αž’αž€αŸ αž”αžΈ αžŸαŸ‹

αŸ‚αžŠαž› αž“αžŸαž·αž‘αž·αŸ αŸαž–αž›αŸ‚αžŠαž› តវ αžšαŸ”

េ αž›αž“αŸ αž™αŸαž“αŸ‡αž” αž€αŸ‹αž›αž·αžαž›αž“αŸ‹αž–αžΈαž›αž€αžαžŽ    αŸ‚αžŠαž›αž§αž”αž€αžšαžŽαŸ    αŸƒαž“αŸαž  αžšαž…

αžŸαž˜αŸαž“ Wireless infrastructure devices αž„αŸ†αž’αžŸαŸ‹αŸ αŸ‡αŸαž‘  αŸ‚αžŠαž›αž”αŸ†αŸαž–αž‰αž”αž‘ αž“  αž“αž·αž„αž” αž€αŸ‹  αŸ αž€αž»αž„αŸ αž›αž“αŸ αž™αŸαž“αŸ‡αŸ”   αŸαž αž™αžΈ Information Security Department αž€αŸαž’αž“αž» ត  αŸ αž™ αž“ រ αž”αŸ‹αž‘αŸ† αž“αŸ‹αž‘αŸ†αž‘αž„αŸ αž“αŸ‹ Network αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αŸ”

្.  αž‘αŸ†αž αŸ†(Scope): αž‚αž”αŸ‹αž”αž»αž‚αž›αž·αž€  αž’αž€αž…αž»αŸ‡αž€αž»αž„  αž’αž€αž–αž·αŸ αŸ‡αŸ αž”αž›αŸ‹  αž“αž·αž„  αž”αž»αž‚αž›αž·αž€αž”αŸ αŸ‡ αžŸαž“αžŠαŸƒαž‘  αŸαž‘ តេ αž€αž˜αž αž»αŸŠαž“αŸ αž™αžšαž˜αž½αž” ូ αž› αž„αŸ†αž”αž»αž‚αž›αž·αž€ αž„αŸ†αž’αžŸαŸ‹  αŸ‚αžŠαž›αž…αžΌαž› ស αž‡αž·αž€ αž€αž˜αž‘αžΈαž”αžΈαŸ‚αžŠαž›  αŸ‚αž αŸ†Wireless infrastructure devices  αž€αž»αž„ αž˜αžαŸ† αž„αŸ αž™ αž€αž˜αž αž»αŸŠαž“ αžαžœαŸ‚αž αž” αž“αŸ‹ αž”αŸ‹αŸ េ αž›αž“αŸ αž™αŸαž“αŸ‡αŸ”  αŸ αž›αž“αŸ αž™αž’αž“αž»αžœαžαž…αŸ†αŸ αŸ‡ αž‚αž”αŸ‹ Wireless infrastructure

devices αž„αŸ†αž’αžŸαŸ‹αŸ‚αžŠαž› αž”αŸ‹αŸ αž“αŸ‹  Network αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αž¬αž‹αž“αž·αŸ αŸαž›αžΈαž€αŸ‚αž“αž„ αž€αž˜αž αž»αŸŠαž“  αŸ‚αžŠαž›αž•αž›αŸ‹ រ αž”αŸ‹  Wireless េ endpoint device αž”αž»αŸ‰αŸ‚αž“αž˜αž·αž“αž€αŸ†αžŽαžαŸ‹αž…αŸ†αŸ αŸ‡  Laptops,

desktops, Cellular phone αž“αž·αž„ personal digital assistants (PDA),  αŸ αž›αž“αŸ αž™αŸαž“αŸ‡αž€αŸ  αžšαž˜αž½αž” ូ αž› Wireless Communication device αŸ‚αžŠαž› αž“αžŸαž˜αž αž–αž” ូ αž“ data packet

αž•αž„αŸ‚αžŠαžš  αŸ”

៣.  αŸαžŸαž… αŸ‚αžαž„ αžšαžŽαŸƒαŸαž“αŸ αž›αž“αŸ αž™

(Policy Statement)αŸ–

៣.៑ General Network Access Requirements   (αžαŸ†αžœαžΌ រ Access αž…αžΌαž›  Network αž‘αžΌαŸ ): αž‚αž”αŸ‹ Wireless infrastructure devices αž„αŸ†αž’αžŸαŸ‹αŸ‚αžŠαž›αž‹αžαž·αŸ αŸαž›αžΈαž€αŸ‚αž“αž„ αž€αž˜αž αž»αŸŠαž“  αž“αž·αž„  αž”αŸ‹αŸ αž“αŸ‹Network αž€αž˜αž αž»αŸŠαž“αžšαž•αžΊαž›αŸ‹ αžšαž…αžΌαž›αŸ αž“αŸ‹αž–αžαŸ αž“αžŸαŸ† αžαŸ‹αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αžš ឺ រ αž€αŸ‹  

αž€αŸ†αž αžαž·αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“ តវៈ +  αŸ αžšαž– αž˜αžŸαž„αŸ‹ αŸ‚αžŠαž› αž“αž” αž€αŸ‹αŸ αž€αž»αž„  Wireless Communication standard +  αŸ αž™αŸαž‚αžαŸ†αŸαž‘αž„αžΈ αž‘ αž‘αž„αŸ‹αž“αž·αž„αŸ‚αž αŸαŸ† αž™ αž€αž˜ αž‘ αž‘αž„αŸ‹αŸ‚αžŠαž›αž’αž“αž»αž˜αŸαž(Appoved Support team) + រេ αž”αžΈ αžŸαŸ‹αŸαž  αžšαž… αžŸαž˜αŸαž“αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“  αž“αž·αž„  authentication αžšαž”αžŸαŸ‹

αž€αž˜αž αž»αŸŠαž“

+ េ αž”αžΈ αžŸαŸ‹  encryption protocol αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“

+ αŸ‚αžαžšαž€ hardware address (MAC Address)αŸ‚αžŠαž›αŸαž‚ αž…αž…αž»αŸ‡αŸ αŸ‡ αž“

Page 23: 2013 y4-s2-414-group01

+ αž˜αž·αž“αŸ αž‡ αžαŸ‚ αž‡αž€αž“αžΉαž„ រ αž€αŸ‹αž– αž™  Wireless Access αŸ‚αžŠαž›αŸ‚αž αŸαŸ† αž™   αž’αž„ រ αž‘ αž‘αž„αŸ‹αžŠαŸƒαž‘αŸαž‘ αžαŸαž‘  αŸ” ៣.្. αžαŸ†αžšαžœαžΌ αžšαž§αž”αž€αžšαžŽαž₯αŸαžαŸ‚αž αž˜αž•αŸ‡ (Home Wireless Device Requirements): Wireless infrastructure device αŸ‚αžŠαž›αž•αž›αŸ‹ រ  Access αž…αžΌαž›αŸ αž“αŸ‹  Network  αžšαž˜αž½  αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αŸ αž™ αž›αŸ‹ តវ αž”αžαž·αž”αžαŸ ម  The Home Wireless Device Requirement

េ αž€αž»αž„  The Wireless Communication Standard  αŸ”

Wireless infrastructure device αŸ‚αžŠαž›αžαž€ αž“ αž”αžαž·αž”αž ម  The Home Wireless

Device Requirements តវេ αž™αŸαž‚αžαŸ†αŸαž‘αž„αžΈαž€αž»αž„αž›αž€αžŽαŸˆαž˜αž™αž½αŸ‚αžŠαž› αž˜αž˜αž·αž“αŸ αž™ αž“ រ Access αž…αžΌαž› Network   αžšαž˜αž½αžšαž”αžŸαŸ‹ αž€αž˜αž αž»αŸŠαž“αŸ αž™ αž›αŸ‹αŸαž‘   រ  Access αž…αžΌαž›  Network αžšαž˜αž½αžšαž”αžŸαŸ‹  αž€αž˜αž αž»αŸŠαž“ αž˜αž§αž”αž€αžšαžŽαŸαŸαž“αŸ‡αž‚αžΊ តវេ αž”αžΈ Standard Remote Access  Authentication  αŸ”

ៀ. αž’αž“αžœαž»αžαž… αž” αŸ‹(Enforcement): αž”αž»αž‚αž›αž·αž€αŸ‚αžŠαž›αŸαž‚αž™αž›αŸ‹αŸαžƒαž‰αžΈ αž“αžšαŸαŸ† αž—αŸαž›αžΈαŸ αž›αž“αŸ αž™αŸαž“αŸ‡ αžαžœαž‘αž‘αž›αž½αžšαž„αž’αŸ†αŸαž–αžΈ  αž€αŸ‹αžœαž“αŸαž·αž™αž“αž·αž„ αžšαž”αŸαžŽαž‰αŸαž…αž‰αž–αžΈ រ រ  αŸ”   αžšαžšαŸαŸ† αž—αŸαž›αžΈαŸ αž›αž“αŸ αž™αŸαž“αŸ‡αž”αž»αž‚αž›αž·αž€  

αž”αŸ αŸ‡ αžŸαž“  αž’αž€αž…αž»αŸ‡αž€αž»αž„  αž’αž€αž›αž€αŸ‹  αžš ឺ αžˆαž½αž‰   αž… αž›αž‘αž•αž› αŸαŸ† αž™ αž“ αžšαž›αž»αž”αž”αŸ†  αžαŸ‹αž€αž»αž„  αžš ឺ រ αžšαžšαž”αžŸαŸ‹αž–αž½αž€αŸαž‚ αž˜αž½αž™αž“αžΉαž„ αž€αž˜αž αž»αŸŠαž“αŸ”

Page 24: 2013 y4-s2-414-group01

αž€αž› αž‘ αž›αž™αŸαŸαž” αž› αž™ BUILD BRIGHT UNIVERSITY

Information  Security  and  Legal  Framework

Skill : Information Technology ( Network)

Lecture: Mr. OU  Phannarith

Submitted by:

1. αž“ αŸ‹ αž”αŸŠαž»αž“αŸαž’ αž“   2. αž‚αž»αž‡     αžŸαž»αž˜αž“αžΈαžšαž„ ី 3. េរ αž“     αž“αžαŸ‹αž“ 4. αžšαžŸαŸ‹   αžšαžαž“αŸˆ 5. αž›αžΉαž˜   αžŸαž»αžαŸαž› αž„

Academic Year: 2012-2013

Page 25: 2013 y4-s2-414-group01

I. Introduction to information Security Policy II. Internet and Usage Policy

1. αž•αž›αžœ ិ αž€αŸƒαž“ αžšαž”αŸ† αž“  (Consequence of violation)

2. αžšαž‚αŸ† αž˜αž‚αŸ†αŸ‚αž αž„ រេ αž” αžŸαŸ‹ (Usage threats)

3. េស  Internet (Internet Service)

4. េ αž›αž“αŸ αž™ រេ αž” αžŸαŸ‹  (Usage Policy)

III. េ αž›αž“αŸ αž™  Access αž…αžΌαž›αž–αžΈαž…αŸ† αž™  (Remote Access Policy)

1. េ αž›αž“αŸ αž™ (Policy)

1.1 General

1.2 Requirements

IV. េ αž›αž“αŸ αž™αžŸαž“αž·αžŸαž»αžαžŸ αž” αŸ‹ Router (Router Security Policy)

V. េ αž›αž“αŸ αž™αžŸαž“αž·αžŸαž»αž  Server (Server Security Policy)

VI. េ αž›αž“αŸ αž™αž‘αŸ† αž€αŸ‹αž‘αŸ†αž“αž„αŸ αž™αž˜αž“αž·αŸ αž”αŸ‚αž (Wireless Communication Policy)

1. αžαŸ† មវ រ Access  αž…αžΌαž› Network αž‘αžΌαŸ  (General Network Access)

2. ត មវ αžšαž§αž”αž€αžšαžŽαŸ  wireless αž˜αž•αŸ‡  (Home wireless device Requirement)

1. េ αž›αž”αŸ†αžŽαž„ (Purpose)

2. αž‘αŸ†αž αŸ† (Scoop)

3. េ αž›αž“αŸ αž™ (Policy)

Page 26: 2013 y4-s2-414-group01

I. Introduction to information Security Policy

Page 27: 2013 y4-s2-414-group01
Page 28: 2013 y4-s2-414-group01

II. Internet and Usage Policy

Page 29: 2013 y4-s2-414-group01
Page 30: 2013 y4-s2-414-group01
Page 31: 2013 y4-s2-414-group01
Page 32: 2013 y4-s2-414-group01
Page 33: 2013 y4-s2-414-group01
Page 34: 2013 y4-s2-414-group01

III. េ αž›αž“αŸ αž™  Access αž…αžΌαž›αž–αžΈαž…αŸ† αž™  (Remote Access Policy)

Page 35: 2013 y4-s2-414-group01
Page 36: 2013 y4-s2-414-group01

IV. េ αž›αž“αŸ αž™αžŸαž“αž·αžŸαž»αžαžŸ αž” αŸ‹ Router (Router Security Policy)

Page 37: 2013 y4-s2-414-group01
Page 38: 2013 y4-s2-414-group01

V. េ αž›αž“αŸ αž™αžŸαž“αž·αžŸαž»αž  Server (Server Security Policy)

Page 39: 2013 y4-s2-414-group01

VI. េ αž›αž“αŸ αž™αž‘αŸ† αž€αŸ‹αž‘αŸ†αž“αž„αŸ αž™αž˜αž“αž·αŸ αž”αŸ‚αž (Wireless Communication Policy)

Page 40: 2013 y4-s2-414-group01
Page 41: 2013 y4-s2-414-group01

αžŸαž˜αžΌαŸ‚αžαž„

αž’αŸ†αžŽαžšαž‚αžŽαž» αŸ‰ αž„ αž›αŸ

αžŸαŸ† αž”αŸ‹ រ ម αž”αžšαŸ‹αž”αžŸαŸαŸ‹ αž€αž’αž€ !