Describe the main elements of an acceptable use policy

Assignment Help Management Information Sys
Reference no: EM131977288

1."Acceptable Use Policy" Please respond to the following:

Describe the main elements of an acceptable use policy. Determine the factors that organizations need to consider when developing their acceptable use policy.

• Determine the special considerations that need to be taken into account when developing the acceptable use policy for different types of users (i.e., employees, system administrators, security personnel, contractors, guests, and auditors).

2. Best Practices for User Domain Policies" Please respond to the following:

Imagine that your supervisor has asked you to draft a brief statement about best practices for user domain policies that will be presented to the executive board. Create five best practices for user domain policies.

• Select the best practice that you would emphasize the most during this presentation to the executive board and explain why.

Please read and respond to the post from another student below.

Professor and classmates,

"Best Practices for User Domain Policies"

Although there are several best practices to consider, the five that I would consider presenting to the executive board are attachments (ensuring that employees understand the process of not opening e-mail attachments from an untrusted source). Encryption, (always assuring encryption for data at rest and in transit). Layered defense, (in-depth defense approach providing different layers of security).

Least privilege, (ensuring employees only have access to resources to perform their job function). Virus protection, (each desktop, laptop, or mobile device needs to have the latest virus, malware, and spyware installed and continuously updated).

Select the best practice that you would emphasize the most during this presentation to the executive board and explain why?

In my opinion, out of the five selected I would lean towards "Encryption." If the encryption process is in place and correctly implemented across the board to include laptops, backup tapes, e-mail, and so on if a mistake is made by an employee the data is protected from unauthorized personnel.

Reference no: EM131977288

Questions Cloud

How much overhead was assigned to each of given three jobs : The first three jobs that southern Rim worked on had actual direct labor cost. How much overhead was assigned to each of the three jobs, 301, 302, and 30?
What then will be the charge on each capacitor : The capacitors are later disconnected from the battery and connected directly to each other, positive plate to positive plate, and negative plate to negative.
What legal entity do you think would fit your company : Think about the status of your partnership and the potential of becoming one of the other forms of legal entity. What legal entity do you think would fit your.
How much overhead was assigned to each of the three jobs : How much overhead was assigned to each of the three jobs, 301, 302, and 30? What was the over- or underapplied manufacturing overhead for year 1?
Describe the main elements of an acceptable use policy : Determine the factors that organizations need to consider when developing their acceptable use policy.
Prepare the general journal entries to record the requisiton : Southwick company uses a job order costing system. On November 1st $15,000 of direct materials. Prepare the general journal entries to record the requisiton.
Describe diffusion and adoption of really new products : What are useful assessments of future markets for emerging technologies?Describe "Diffusion and Adoption of Really New Products.
What was the selling price of the house : Some friends tell you that they paid $32, 544 down on a new house and are to pay $632 per month for 30 years. If interest is 6.3% compounded monthly.
How much power must the motor supply : How much work does an elevator motor do to lift a 1100 kg elevator a height of 100?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd