Reference no: EM131327838
Objective:
Apply the standards for fair, responsible and acceptable use of information technology (e.g., computer systems, network, etc.) to your environment
Perform a security audit of your own computer.
Part I: Acceptable Use Policy (AUP)
Brief narrative covering the following topics (at a minimum) as it applies to your technology environment (e.g., digital device, network, data, etc.):
Scope (to whom the AUP applies)
The "owner" of the AUP (who is authorized to make changes to the policy)
Why have a policy / Intent of the policy / Purpose of the policy
Required conduct (behavior)
Unacceptable conduct (behavior)
Consequences / Sanctions for violations of the AUP
Sample AUP:
https://nces.ed.gov/pubs2005/tech_suite/app_a.asp (a Google search for "acceptable use policy template"
or "acceptable use policy samples" will link to may more examples). ISU's AUP:
https://www2.isu.edu/policy/2000/2400-IT-Acceptable-Use.pdf
Part II: Security Audit
Perform a security audit of your computer.
Are critical OS updates available?
Are critical application updates for one or two of your core applications available?
Note: MS Office is updated with Windows update
Is anti-virus software installed and up to date?
Are there user accounts for each person using the computer?
Are user accounts password protected?
Evaluate the security level of all user accounts. Are those listed as an "administrator" acceptable to you?
Is the firewall enabled?
Is the screen saver configured? Does the screen saver require a password to clear it?
Are all your passwords (computer system and online) considered "strong?"
Create a table in MS Word (three columns). List the items above in the first column (each major bullet point is a row/cell). Use the 2nd column to answer the question in the 1st column. Use the third column to describe any action items to be taken after the semester ends (I'm not expecting you take actions now but this will serve as a reminder to do so as soon as possible after the semester ends). However, I recommend you consider addressing any critical security updates as soon as possible.
Note: Be sure you have a good external backup of important files before performing the security audit!
Submit one MS Word Document via MoodleISU that contains your answers to Part I and Part II.
Please remember to:
Insert a page break between part I and part II
Run spell and grammar checker
Use complete sentences
Points will be deducted for spelling and grammar errors.
Only place your full name in the top left corner of each page (no need to put the date, time, my name, the name of the class, etc. - just your name)
Should the bank go long or short on futures contract
: Dudley Savings Bank wishes to take a position in Treasury bond futures contracs, which currently have a quote of 113-100. Dudly Savings thinks interest rates will go down over the period of the investment. The face value of the bond underlyting the f..
|
What is the maximum value of the rate of change
: The voltage, V , in volts, in an electrical outlet is given as a function of time, t, in seconds, by the function V = 156 cos(120πt).
|
Explain the purposes of single-subject designs
: Explain the purposes of single-subject designs. Define level, trend, and variability and explain how these approaches to understanding data can be used to analyze the effectiveness of the BIP
|
Maintain constant debt-equity ratio
: Appleton Corp. wishes to maintain a growth rate of 13.4 percent and a dividend payout ratio of 38 percent. The ratio of total assets to sales is constant at .80 and profit margin is at 8.1 percent. If Appleton Corp also wished to maintain a constant ..
|
Perform a security audit of your computer
: Perform a security audit of your computer.Are critical OS updates available? Are critical application updates for one or two of your core applications available? Is anti-virus software installed and up to date?Are there user accounts for each person ..
|
What are the particular beliefs about human nature
: Based on your readings, what are the particular beliefs about human nature that differentiate the ethical theories of Thomas Hobbes, David Hume, and Immanuel Kant? How might you illustrate each perspective
|
What rate of return did you earn over two years
: What would you pay for an asset that had cash flows of $2,000 at the end of year, $2,5000 at the end of year 2 and $3,000 at the end of the year three if the appropriate discount rate is 5% each year? How much money would you have if you banked your ..
|
What is the beta of a security with an expected return
: What is the beta of a security with an expected return of 12% if Treasury bills yield 6% and the market risk premium is 8%? Security XYZ has a beta of 1.1. The expected market rate of return is stable at 8% and the risk-free rate is 4%. If the realiz..
|
Company pledges to increase its dividend
: Caan Corporation will pay a $2.54 per share dividend next year. The company pledges to increase its dividend by 3.5 percent per year indefinitely. If you require a return of 11 percent on your investment, how much will you pay for the company’s stock..
|