Describe the main elements of an acceptable use policy

Assignment Help Management Information Sys
Reference no: EM131977288

1."Acceptable Use Policy" Please respond to the following:

Describe the main elements of an acceptable use policy. Determine the factors that organizations need to consider when developing their acceptable use policy.

• Determine the special considerations that need to be taken into account when developing the acceptable use policy for different types of users (i.e., employees, system administrators, security personnel, contractors, guests, and auditors).

2. Best Practices for User Domain Policies" Please respond to the following:

Imagine that your supervisor has asked you to draft a brief statement about best practices for user domain policies that will be presented to the executive board. Create five best practices for user domain policies.

• Select the best practice that you would emphasize the most during this presentation to the executive board and explain why.

Please read and respond to the post from another student below.

Professor and classmates,

"Best Practices for User Domain Policies"

Although there are several best practices to consider, the five that I would consider presenting to the executive board are attachments (ensuring that employees understand the process of not opening e-mail attachments from an untrusted source). Encryption, (always assuring encryption for data at rest and in transit). Layered defense, (in-depth defense approach providing different layers of security).

Least privilege, (ensuring employees only have access to resources to perform their job function). Virus protection, (each desktop, laptop, or mobile device needs to have the latest virus, malware, and spyware installed and continuously updated).

Select the best practice that you would emphasize the most during this presentation to the executive board and explain why?

In my opinion, out of the five selected I would lean towards "Encryption." If the encryption process is in place and correctly implemented across the board to include laptops, backup tapes, e-mail, and so on if a mistake is made by an employee the data is protected from unauthorized personnel.

Reference no: EM131977288

Questions Cloud

How much overhead was assigned to each of given three jobs : The first three jobs that southern Rim worked on had actual direct labor cost. How much overhead was assigned to each of the three jobs, 301, 302, and 30?
What then will be the charge on each capacitor : The capacitors are later disconnected from the battery and connected directly to each other, positive plate to positive plate, and negative plate to negative.
What legal entity do you think would fit your company : Think about the status of your partnership and the potential of becoming one of the other forms of legal entity. What legal entity do you think would fit your.
How much overhead was assigned to each of the three jobs : How much overhead was assigned to each of the three jobs, 301, 302, and 30? What was the over- or underapplied manufacturing overhead for year 1?
Describe the main elements of an acceptable use policy : Determine the factors that organizations need to consider when developing their acceptable use policy.
Prepare the general journal entries to record the requisiton : Southwick company uses a job order costing system. On November 1st $15,000 of direct materials. Prepare the general journal entries to record the requisiton.
Describe diffusion and adoption of really new products : What are useful assessments of future markets for emerging technologies?Describe "Diffusion and Adoption of Really New Products.
What was the selling price of the house : Some friends tell you that they paid $32, 544 down on a new house and are to pay $632 per month for 30 years. If interest is 6.3% compounded monthly.
How much power must the motor supply : How much work does an elevator motor do to lift a 1100 kg elevator a height of 100?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Find as much as you can about it

Please select a computer hardware manufacturer. You may choose Dell, HP, Apple, or a Wireless device to investigate. Find as much as you can about it. Try and get images of the motherboard, front and back of the case so you can see the types of ..

  Define the current problem and set of business requirements

Define the current problem and the set of business requirements for the problem you need to solve from a local and global perspective.

  Conduct in-depth research on air carrier

provide a historical example that would be found going back several decades. Learning from the past is a great way to succeed in the future

  Develop a business case for migrating the infrastructure

Describe the steps that you would take to develop a business case for migrating the infrastructure and services to the cloud

  Steps involved in identifying the network device requirement

The local county health department has outgrown the current space and has recently purchased a new building that will house clinicians.

  Suggest a timeline for establishing an erm plan

Provide a list of essential personnel whom you believe should be involved in creating and maintaining an ERM plan for an organization. Describe the role of each person. Suggest a timeline for establishing an ERM plan, giving your opinion on how fr..

  How should pia mitigate the possible data security risks

Should Pia be worried about possible lock-in with either accountant or system provider?How should Pia mitigate the possible data security risks?

  What are the security implications of your choices

What are the alternatives available to this small, single-site business for creation of an effective DMZ?

  Describe how private payers play into your thinking

How do private payers play into your thinking about clinical and financial information systems strategies?

  Identify organizations and describe the purpose of each

Database Management: Identify organizations and describe the purpose of each.

  Describe the role of ethical hacking in a business setting

Describe the role of ethical hacking in a business setting. Explain early identification tools to alert the business about potential attacks.

  Discussion of the information used in the system

A full description of the new system, a description of its components, and the benefit it will provide to Riordan and A discussion of the business requirements driving the need for the system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd