Define the level of protection each policy

Assignment Help Computer Engineering
Reference no: EM132153178

Question: Scenario

Imagine that you work for an organization that has no Internet use policy; employees use the Internet in whatever way they want using company-owned personal computers (PCs). Could this cause a problem for the organization?

The answer to this question is obvious. Security policies are essential in today's world. However, the flip side to this is that at times these policies also cause problems.

Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scenario:

• Internet use policy

• External device use policy

• Employee identity (ID) policy

• Computer use policy

How would each policy help the situation described in your assigned scenario? How might each policy hinder the situation described in your assigned scenario?

Respond to your peers, at least 2, and comment on the rationale provided by them for their opinions. Briefly describe each policy in the form of a bulleted list. Include your rationale for whether each policy helps or hinders the situation in your assigned scenario.

Required Resources

• N/A

Submission Requirements

• Format: Microsoft Word (post your assignment and attach the word document)

• Font: Arial, 12-Point, Double-Space

• Citation Style: APA

• Length: 1-2 pages

Reference no: EM132153178

Questions Cloud

Design an algorithm that outputs the length of the longest : Given two strings of length n, m, design an algorithm that outputs the length of the longest common subsequence (LCS) of the two strings.
Safety is linked to other human resource functions : Describe how occupational health and safety is linked to other human resource functions and how the company can save costs within occupational health and safety
What are the challenges of commercialization : What are the challenges of commercialization? What are the hurdles that emerging technology must overcome?
What type of argumentation does appellate court hear : Describe the typical composition and procedural process of an appellate court. what type of argumentation does an appellate court hear?
Define the level of protection each policy : Discus the following IT security policies and the level of protection each policy provides in the context of your assigned scenario.
Can whole grains force you to accept and pay for delivery : Do you have an enforceable contract? Why/why not? Can Whole Grains force you to accept and pay for the delivery?
Is anything still unclear that could be clarified : What was the most and least interesting thing or things that you learned in this course and how does this help (or not) in your working life?
How structure and culture need to work in a healthy company : It is the end of the day, and you are meeting in Jared's office to talk about his conference with the vice presidents.
What are the common elements found in a project charter : Discuss what are the common elements found in a project charter. Also list the best practices of what should be conveyed to the project team during the kick off

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd