INTERNAL MANAGEMENT POLICY AND PROCEDURE



Similar documents
APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3

CHAPTER 2: Staffing ROLES OF STAFF. Roles Required to Provide Tech Support

Lab Developing ACLs to Implement Firewall Rule Sets

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

INFORMATION TECHNOLOGY ENGINEER V

Service. Strategic Technology Solutions for DNA Technology Solutions and Services That Help You Optimize System Performance, Security and Availability

NOS for Network Support (903)

FEDERAL BUSINESS SYSTEMS CORP. (FBSCGov) RIDING PLAZA #200 CHANTILLY VA Ph: Fax:

SENIOR SYSTEMS ANALYST

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Local-Area Network -LAN

IT LABOR CATEGORY REQUIREMENTS AND DESCRIPTIONS

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

MANAGEMENT INFORMATION SYSTEMS 8/E

Lawrence Police Department Administrative Policy. August A. Access to CJIS sensitive data is only available to authorized users.

ADM:49 DPS POLICY MANUAL Page 1 of 5

Cisco Application Networking for IBM WebSphere

Application Description

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE Computer Network Analysis and Design Slide 1

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Kaspersky DDoS Prevention

FUNCTIONAL AREA 12. Network Administration (NET)

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Figure 41-1 IP Filter Rules

SENIOR INFORMATION SYSTEMS MANAGER

Networking Systems (10102)

BCIS BUSINESS DATA COMMUNICATIONS and NETWORKING Mr. Cengiz Capan -- Spring 2016

Information Technology Cluster

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Cisco Application Networking for BEA WebLogic

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

Business Continuity / Disaster Recovery in an IT infrastructure scenario

Telecommunications, Networks, and Wireless Computing

Technical Document for Connectivity Migration to the new platform of the e-mid Market over BT Radianz

Dell Advanced Network Monitoring Services Service Description

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

Bandwidth Primer The basic conditions and terms used to describe information exchange over networks.

N e t w o r k E n g i n e e r Position Description

Firewall Design Principles Firewall Characteristics Types of Firewalls

Selecting a Firewall Gilbert Held

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)

White Paper Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Information Security Network Connectivity Process

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Networks. The two main network types are: Peer networks

Top-Down Network Design

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Security Design.

Application Performance Analysis and Troubleshooting

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

NETWORK ADMINISTRATOR

ICANWK613A Develop plans to manage structured troubleshooting process of enterprise networks

IP Telephony Management

Network Security Guidelines. e-governance

Load Balancing ContentKeeper With RadWare

ABSTRACT CHAPTER I. Preliminary Background


Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

ICAB5238B Build a highly secure firewall

Sample Career Ladder/Lattice for Information Technology

IP Filter/Firewall Setup

LinkProof And VPN Load Balancing

VPN. Date: 4/15/2004 By: Heena Patel

Network System Design Lesson Objectives

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

Internet Security Firewalls

Networking Basics for Automation Engineers

Storage Area Networks (SANs) and iscsi Protocol An Introduction to New Storage Technologies

Fundamentals of a Windows Server Infrastructure MOC 10967

How Network Transparency Affects Application Acceleration Deployment

Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL:

Chapter A computer is a collection of computers that communicate with one another over transmission lines.

Configuration Example

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

How To Understand The History Of The Network And Network (Networking) In A Network (Network) (Netnet) (Network And Network) (Dns) (Wired) (Lannet) And (Network Network)

Dell NetReady Mobile Broadband Service User's Guide

CTS2134 Introduction to Networking. Module Network Security

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

Overview of Routing between Virtual LANs

How To Extend Security Policies To Public Clouds

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Designing a Windows Server 2008 Network Infrastructure

Transcription:

KANSAS DEPARTMENT OF CORRECTIONS INTERNAL MANAGEMENT POLICY AND PROCEDURE SECTION NUMBER 05-125 SUBJECT: PAGE NUMBER INFORMATION TECHNOLOGY AND RECORDS: Data Network Management The IMPP has been placed on RESERVE status, reason being is that the viable content of this IMPP has been subsumed within the parameters of IMPP (05-121) being issued at this time. Secretary of Corrections 06-02-04 Date

! " " # $ %& " ' " ( ) '!! " # $ % & ' (! ) * +! (!, - * * ' +, - *. /. % 0 # 1$ %*,, 2 " ' / " %3 4 *,, " ) ' $ 1" ' ' / " % 0 #, * " 5 6 " -. ' 1%$ ' $ 1* % 1 % ' -. ' " ) " ' / ", 4........................................................................ / 0 + % % (! ' ' )........................................... 1 # ( 2 34 ' %

INTERNAL MANAGEMENT POLICY & PROCEDURES STATEMENT OF ANNUAL REVIEW IMPP # 05-125 Title: INFORMATION TECHNOLOGY AND RECORDS: Data Network Management The above referenced Internal Management Policy and Procedure (IMPP), issued effective 09-21-02, was reviewed during January 2003 by the KDOC Policy Review Panel, per IMPP 01-101. At the time of this annual review, the Policy Review Panel determined that: no substantive changes and/or modifications to this IMPP are necessary at this time, and the IMPP shall remain in effect as issued on the above stated date. The next scheduled review for this IMPP is January 2004. This statement of annual review shall be placed in front of the referenced IMPP in all manuals. Carlos Usera, Information Resource Manager Policy Review Committee Chairperson Date 01-31-03 Roger Werholtz, Secretary of Corrections Date

KANSAS DEPARTMENT OF CORRECTIONS Approved By: INTERNAL MANAGEMENT POLICY AND PROCEDURE SECTION NUMBER 05-125 SUBJECT: PAGE NUMBER 1 of 4 INFORMATION TECHNOLOGY AND RECORDS: Data Network Management %( ' " ",, /. 7 / %% ' ) '. ) ' 11-0 8 POLICY Secretary of Corrections 6 " -, ) '. ) ',, /. 7 The Department of Corrections will provide secure, reliable and adequate telecommunications services to its subordinate units. These services will be managed to a high level of performance. The department uses DISC managed services in compliance with KSA 75-4709 to achieve economies of scale, cost reductions and consistent access and reliability. Local network management must consider the topology, protocols, physical management of the assets, network operating systems and administration of the workgroups. Network management will be achieved by the following: Service level commitments by a central source. Mean time between failures will be less than 60 business hours provided to 99% of workplaces. Networks will be designed with no single point of failure. Recovery from any service failure should be no more than two hours during normal office hours and no more than twelve hours for non-office hours. Wide area networks will be centrally managed with local control of local area networks up to the router. Central network management will be the principal design of the network. The network will be manageable at designated locations at any time. A consistent set of standards will be established and enforced for network firewalls, virtual private networks, and general network security.

# 5 5 6 DEFINITIONS Firewall: A method for keeping a network secure from intruders. It can be a single router that filters out unwanted packets or may comprise a combination of routers and servers each performing some type of firewall processing. Firewalls are widely used to give users secure access to the Internet as well as to separate a company's public Web server from its internal network. Firewalls are also used to keep internal network segments secure. Local Area Network (LAN): A communications network that serves users within a confined geographical area. It is made up of servers, workstations, a network operating system and a communications link. Mean Time Between Failure (MTBF): The average time a component works without failure. It is the number of failures divided by the hours under observation. Router: A device that forwards data packets from one local area network (LAN) or wide area network (WAN) to another. Based on routing tables and routing protocols, routers read the network address in each transmitted frame and make a decision on how to send it based on the most expedient route (traffic load, line costs, speed, bad lines, etc.). Wide Area Network: A communications network that covers a wide geographic area, such as state or country. A LAN (local area network) is contained within a building or complex, and a MAN (metropolitan area network) generally covers a city or suburb. PROCEDURES I. Designated Staff Responsibilities A. DISC: Responsible for the security and monitoring of the state network B. Information Technology Managers: 1. Maintain network diagrams of all sites and facilities under his/her responsibility 2. Identify information / data production procedures to ensure reliability of the network. 3. Implement network monitoring techniques in coordination with DISC. C. Network Administrators: 1. Maintain current listing of network resources 2. Assist the call center in identifying network issues and resolutions 3. Compile monthly status and projects report

1 # 5 5 6 D. Database Server Administrators: 1. Implement techniques to provide redundancy and load balancing. II. Trouble Elimination Assistance Management (TEAM) A. In the event of an issue, an ad hoc team will be convened to provide assistance to other Information Technology staff. B. After all local resources have been exhausted attempting to correct a network problem, the affected facility/office IT staff shall call the Central Office Telecommunication Manager. C. The Central Office Telecommunication Manager shall establish an ad hoc team consisting of the following: 1. Technical Support Branch Manager 2. Field Services Support Team Leader 3. Department Network Services Supervisor 4. Eastern Region Team Leader 5. Western Region Team Leader 6. Southern Region Team Leader 7. The affected facility/office IT Staff 8. An at large IT person with specific expertise in the area of the issue. D. The team will meet by conference call and will meet as many times as necessary to correct the issue. E. If the Central Office Telecommunication Manager cannot be reached, the affected facility/office shall contact the next person in line from the ad hoc team. F. If the team cannot determine a correction, the decision shall be made for the affected areas team leader to contact a selected vendor (i.e., Microsoft, etc.). III. Use of Vendor Support A. The Kansas Department of Corrections maintains contracts with several vendors who will provide telephonic and on-call support. All requests for vendor-supplied services must be coordinated with the appropriate Central Office support coordinator.

# # 5 5 6 NOTE: The policy and procedures set forth herein are intended to establish directives and guidelines for staff and offenders and those entities who are contractually bound to adhere to them. They are not intended to establish State created liberty interests for employees or offenders, or an independent duty owed by the Department of Corrections to employees, offenders, or third parties. This policy and procedure is not intended to establish or create new constitutional rights or to enlarge or expand upon existing constitutional rights or duties. REPORTS REQUIRED Monthly Status Reports REFERENCES KSA 75-4709 Kansas State Technical Architecture, Chapter 5 ATTACHMENTS None.