Develop the section on prohibited use of your companys

Assignment Help Other Subject
Reference no: EM131587223

Security Operations

W3 Lab: "Prohibited Use"

Overview:

You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations.

In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.

Your Task

Step 3: Develop the Prohibited Use section of your ISP

In this week's Lab you will develop the section on Prohibited Use of your company's information system (IS) in the Information Security Plan to include:

Prohibition of illegal conduct

System and Network Activity restrictions

Copyright infringement

Proprietary information disclosure

Unauthorized use for personal business

Malicious programs

Account disclosure

Email and Communication Activity restrictions

Unsolicited emails

Harassment

Chain letters

Spam

Blogging and Social Media Activity restrictions

Representation of the company on blogs or social media

Separation of personal and professional comments

Reference no: EM131587223

Questions Cloud

Define the rain forests of central america : The green-and-black poison dart frog is rarely seen because they live in the rain forests of Central America.
Write a gui application that plays : Write a GUI application that plays "Guess the Number." It begins by choosing the number to be guessed by selecting an integer at random in the range 1-1000.
What is the face value of the note : A company acquired land with a Fair Market Value of $220,000 on 1/1/14, What is the face value of the note
Find the distance between two vertices x and y of a graph : Prove that if A ? B, then B¯ ? A¯. Do this once using Venn diagrams and once using element notation.
Develop the section on prohibited use of your companys : Develop the section on Prohibited Use of your company's information system (IS) in the Information Security Plan.
What is the stock expected value one year from now : What is the stock's expected value one year from now?
Testing the functionality and correctness of the methods : The main method is the controller which "runs the whole show", including testing the functionality and correctness of the various methods (in both classes)
What policies and practices does organization have in place : What policies, programs, and practices does the organization have in place to promote employee training and development?
Distributed-cloud computing : Consider two cloud service systems: Google File System and Amazon S3. Explain how they achieve their design goals to secure data integrity.

Reviews

Write a Review

Other Subject Questions & Answers

  Trade agreements and things like taxes and quotos

Give your thoughts on the world food supply, how resource will likely be managed to meet food needs worldwide, and how we may see differences in trade agreements and things like taxes and quotos.

  Describe the application and its benefits and risk

Find a use of biometrics in your city. describe the application and its benefits and risk. What does the license agreement say about the number of copies you can make?

  What consumer wants are met bythe

What consumer wants (or benefits) are met bythe following products or services?

  Assignment on retrospective analysis of personality

In this assignment, begin by taking a retrospective look at your life history, to discuss which aspects of your personality have remained consistent and which aspects of your personality have changed over time. Then, analyze the roles of nature an..

  What type of sampling method is used

What type of sampling method is used? Is it appropriate to the design?Does the sample reflect the population as identified in the problem or purpose statement?Is the sample size appropriate? Why or why not?

  What communication strategies did you use resolve conflict

Describe the situation briefly and consider which response to conflict was demonstrated by either you OR the other person in the conflict. (Examples would be avoidance or collaboration.)

  Identify and explain any evidence of plagiarizing

Identify and explain any evidence of plagiarizing and/or paraphrasing that is found in the student passages provided

  Write a senior project summary paper on health care ethics

Write a Senior Project Summary paaper on the Health Care Ethics.Provide a description of your selected topic (i.e., health care trend) and a thesis statement. Identify the organization that you have chosen to address, including why the issue of you..

  What trends do you see in the data sets

What trends do you see in the data sets - Support your assertions of the trends with statistical evidence.

  Explain the challenges the parents may face in daily life

Identify professional and parental interventions. Provide information for students with severe and profound ID. Identify the challenges the parents may face in daily life.

  Employment laws

Many laws have been created to protect both the employer and the employee. Compare and contrast two of these laws. Be sure to include a brief summary of the law and the protection that the law provides.

  What is the main point of the article

As you read the Cikara, Bruneau,  Saxe article and write your summary consider: What is the main point of the article? According to the authors, how does inAgroup versus outAgroup status affect empathy? How does it affect schadenfreude

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd