Perform a security audit of your computer

Assignment Help Management Information Sys
Reference no: EM131327838

Objective:

Apply the standards for fair, responsible and acceptable use of information technology (e.g., computer systems, network, etc.) to your environment

Perform a security audit of your own computer.

Part I: Acceptable Use Policy (AUP)

Brief narrative covering the following topics (at a minimum) as it applies to your technology environment (e.g., digital device, network, data, etc.):

Scope (to whom the AUP applies)

The "owner" of the AUP (who is authorized to make changes to the policy)

Why have a policy / Intent of the policy / Purpose of the policy

Required conduct (behavior)

Unacceptable conduct (behavior)

Consequences / Sanctions for violations of the AUP

Sample AUP:

https://nces.ed.gov/pubs2005/tech_suite/app_a.asp (a Google search for "acceptable use policy template"

or "acceptable use policy samples" will link to may more examples). ISU's AUP:

https://www2.isu.edu/policy/2000/2400-IT-Acceptable-Use.pdf

Part II: Security Audit

Perform a security audit of your computer.

Are critical OS updates available?

Are critical application updates for one or two of your core applications available?

Note: MS Office is updated with Windows update

Is anti-virus software installed and up to date?

Are there user accounts for each person using the computer?

Are user accounts password protected?

Evaluate the security level of all user accounts. Are those listed as an "administrator" acceptable to you?

Is the firewall enabled?

Is the screen saver configured? Does the screen saver require a password to clear it?

Are all your passwords (computer system and online) considered "strong?"

Create a table in MS Word (three columns). List the items above in the first column (each major bullet point is a row/cell). Use the 2nd column to answer the question in the 1st column. Use the third column to describe any action items to be taken after the semester ends (I'm not expecting you take actions now but this will serve as a reminder to do so as soon as possible after the semester ends). However, I recommend you consider addressing any critical security updates as soon as possible.

Note: Be sure you have a good external backup of important files before performing the security audit!

Submit one MS Word Document via MoodleISU that contains your answers to Part I and Part II.

Please remember to:

Insert a page break between part I and part II

Run spell and grammar checker

Use complete sentences

Points will be deducted for spelling and grammar errors.

Only place your full name in the top left corner of each page (no need to put the date, time, my name, the name of the class, etc. - just your name)

Reference no: EM131327838

Questions Cloud

Should the bank go long or short on futures contract : Dudley Savings Bank wishes to take a position in Treasury bond futures contracs, which currently have a quote of 113-100. Dudly Savings thinks interest rates will go down over the period of the investment. The face value of the bond underlyting the f..
What is the maximum value of the rate of change : The voltage, V , in volts, in an electrical outlet is given as a function of time, t, in seconds, by the function V = 156 cos(120πt).
Explain the purposes of single-subject designs : Explain the purposes of single-subject designs. Define level, trend, and variability and explain how these approaches to understanding data can be used to analyze the effectiveness of the BIP
Maintain constant debt-equity ratio : Appleton Corp. wishes to maintain a growth rate of 13.4 percent and a dividend payout ratio of 38 percent. The ratio of total assets to sales is constant at .80 and profit margin is at 8.1 percent. If Appleton Corp also wished to maintain a constant ..
Perform a security audit of your computer : Perform a security audit of your computer.Are critical OS updates available? Are critical application updates for one or two of your core applications available? Is anti-virus software installed and up to date?Are there user accounts for each person ..
What are the particular beliefs about human nature : Based on your readings, what are the particular beliefs about human nature that differentiate the ethical theories of Thomas Hobbes, David Hume, and Immanuel Kant? How might you illustrate each perspective
What rate of return did you earn over two years : What would you pay for an asset that had cash flows of $2,000 at the end of year, $2,5000 at the end of year 2 and $3,000 at the end of the year three if the appropriate discount rate is 5% each year? How much money would you have if you banked your ..
What is the beta of a security with an expected return : What is the beta of a security with an expected return of 12% if Treasury bills yield 6% and the market risk premium is 8%? Security XYZ has a beta of 1.1. The expected market rate of return is stable at 8% and the risk-free rate is 4%. If the realiz..
Company pledges to increase its dividend : Caan Corporation will pay a $2.54 per share dividend next year. The company pledges to increase its dividend by 3.5 percent per year indefinitely. If you require a return of 11 percent on your investment, how much will you pay for the company’s stock..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd