What are the rules regarding password strength

Assignment Help Software Engineering
Reference no: EM13336225

Project: Making IT Policy Decisions

An important skill when working in IT is the ability to establish clear and workable IT policies. Policies must be well thought-out, to avoid potential problems, and also clearly explained to workers so there is no misunderstanding of the policies.

Your assignment is to create a manual of IT policies for a small business. For each section of the manual, use your critical thinking skills to determine the best policy, and then explain the policy clearly and concisely. The audience is company employees who use computers as part of their jobs, including warehouse workers, office workers, and salespeople.

The details of the business for which you will be proposing policies is as follows: The company's name is ACME Commercial Kitchen Supply. The company's business is to sell and support commercial kitchen equipment. The company has about 400 users, 50 of which travel at least half of the time. The IT staff consists of 4 full-time employees. All employees work out of a single building. The IT department maintains a client/server LAN that runs on Windows Server, which includes an Exchange mail server, and a Sharepoint server for internal data sharing, plus several file servers for individual departments. The Accounting, Sales, and Shipping departments share a proprietary, custom-built application that tracks and bills customer orders. If you need any additional information about this company to complete the assignment, please e-mail me and I will provide it.

The manual should have the following sections:

User Authentication: What are the rules regarding password strength and password changes? (For example, how often must users change their passwords?)

3rd party software: What are the rules for employees loading their own private software on their work PCs, such as games, personal finance software, and so on?

Computer use during business hours: What are the rules for employees checking personal email and social networking sites during the workday?

Use of company email accounts: What are the rules for the types of messages, and the recipients, that users can and can't use their company email accounts for?

Prohibited software or activities: What types of web sites should be permanently blocked for all employees? What types of software should no employees have on their PCs at any time?

UI Modifications: What changes are users allowed to make to their Windows settings, and what changes are prohibited? If personal photos are allowed as desktop images, what are the guidelines for appropriate photos to use?

Resource tracking: What is the procedure for requesting a computer, or turning one back in again?

Training: What computer training is offered to new employees? (What topics and how long?)

Requesting Service or support: What is the procedure for requesting hardware repair or Windows troubleshooting? What is the procedure for requesting help in using or understanding Windows or an application?

Two additional sections: Think about what the audience might have questions about, or might need to know, and create two additional sections of your own choosing.

Reference no: EM13336225

Questions Cloud

Explain the average rate of appearance of water vapor : What is the average rate of appearance (in mol/L.s) of water vapor over the same period of time? A) 8.16 B) 9.52 C) 12.92 D) 17.53
Discuss waves sound and light. : Discuss Waves, Sound, and Light. What is a Wave?
Find the location of the center of mass of earth-moon system : Calculate the location of the center of mass of the earth-moon system (that is, find the distance of the center of mass from the earth's center)
Define nonelectrolyte compound having a molar mass equals : A nonvolatile nonelectrolyte compound having a molar mass equals to 18000 g/mol is dissolved to give 100 mL aqueous solution that has an osmotic pressure equals to 26 mmHg at 27oC. The mass (in g) of this compound dissolved in this solution is: A)..
What are the rules regarding password strength : UI Modifications: What changes are users allowed to make to their Windows settings, and what changes are prohibited? If personal photos are allowed as desktop images, what are the guidelines for appropriate photos to use?
Discuss at least three physical properties of water : Discuss at least three physical properties of water that impact life on Earth.
What is the oscillation frequency of the wing tips : A small bird's wings can undergo a maximum displacement amplitude of 5.9 cm. what is the oscillation frequency of the wing tips
Explain the mole fraction of toluene in an ideal solution : At 25oC, the vapor pressure of the cyclohexane liquid "C6H12" is 70.0 mmHg and that of the toluene liquid "C7H5CH3" is 22.0 mmHg. The mole fraction of toluene in an ideal solution of cyclohexane and toluene that has a vapor pressure equals to 53.2..
How high does the bullet go : A Hooke's-law spring of spring constant 4900 N/m is compressed by 0.02 m. How high does the bullet go

Reviews

Write a Review

Software Engineering Questions & Answers

  Create object relationship diagram gives overview of system

Create an object relationship diagram that provides an overview of the system, including how textbooks are selected by instructors, approved by a department head, and sold to students by the bookstore.

  List the tasks on the critical path

Furthermore, initial indications from suppliers was that there would be an additional two week delay on shipping Production hardware as it would have to be specially ordered from Singapore.

  Explain different levels in a software organization

Give at least three examples of where decision making process could be used at different levels in a software organization.

  Describe the data environment of the current system

Identify additional and existing specifications and requirements for the new Information Systems.

  Explain deployment of a product are the first steps

The design, development, and deployment of a product are the first steps toward a finished product ready for distribution in the marketplace. The next step is the evaluation of the user experience in order to gather data on the usability of the pr..

  Improving job performance

Learning is characterized as any relatively permanent change in behavior that happens as a result of experience. Also means that it also happens outside of schools, at workplaces.

  Discuss web application linked with iis

Discuss Web application linked with IIS, Web forms in the solution explorer, Information about date entry and validation, Data entry prototype

  Difference between private, public and protected variables

Difference between private, public and protected variables

  Deisgn risk assessment policy that identifies risks

Deisgn Risk Assessment Policy, that identifies risks associated with an organization's infrastructure. A risk assessment template may be downloaded from Sans: http://www.sans.org/resources/policies/#template

  Develop a persistence mechanism using data access objects

Map the information required by the relevant domain object classes onto a set of relational database tables in third normal form. Specify the table design.

  Explain the basic architechture of a knowledge based system

Describe a design of your chosen system and explain the basic architechture of a knowledge based system.

  Identification of a software development process

Imagine you are a team leader in a large software development organization and you want to improve a software development process (of your choosing) through the use of a CASE tool.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd