What would you do to enforce the policy

Assignment Help Computer Engineering
Reference no: EM133535940

Discussion Post: Security Policy

A security policy is developed by senior management to assign certain responsibilities and mandate certain requirements, which are usually aligned with the agency's mission.

A new policy was just created to prohibit peer-to-peer software downloads, as most are illegal and may bring malicious content to the workplace. You, the security officer, noticed that employees resisted the policy and chose to continue downloading peer-to-peer software. In an initial post, explain how you would handle this situation. What would you do to enforce the policy?

Reference no: EM133535940

Questions Cloud

How social psychological principles can be applied : how social psychological principles can be applied to everyday life - Identify and differentiate among the varied heuristics and cognitive biases.
Develop a software program for m-f analysis : Develop a software program for M-F analysis of two R.C. beams shown in the figure. Using the software programs provided in the class
Research topic with economic element : Research a topic with an economic element currently being considered by Congress - meaning something that will affect the economy
U.S constitution was meritocracy system : Could you provide an introduction as if the U.S constitution was a meritocracy system with the based on the country's purpose
What would you do to enforce the policy : A new policy was just created to prohibit peer-to-peer software downloads, as most are illegal and may bring malicious. What would you do to enforce the policy?
Discuss how businesses can aim for compliance with behaviors : Propose future training possibilities with three supplementary paragraphs. Discuss how businesses can aim for compliance with behaviors.
Rediscovering principles of public administration : Identify and assess at least two principles of public administration discussed in the reading Rediscovering Principles of Public Administration
Demonstrate understanding of the power of the situation : Demonstrate understanding of the power of the situation in determining behavior as well as the evolutionary assumption of the adaptive function of behavior.
Identify firewall choice and provide summary of the function : Assume role of a network security administrator. Identify your firewall choice and provide a summary of functions it will provide the network.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the throughput for a large file transfer

Assuming, that the only traffic in the network comes from the source, what is the throughput for a large file transfer?

  Write a function which gets a string

Write a program where you read in two words from the keyboard into two different strings. Write a function which gets a string and returns its length

  How do in-order, pre-order, and post-order differ

MSIT5214 University of the People How do in-order, pre-order, and post-order differ from each other when we traverse BST data

  Determining the spped of a computer

determining the spped of a computer

  Which files needs to be recompiled the interface file

Which of the following files, if any, needs to be recompiled: the interface file, the implementation file, and/or the application file?

  Define properties of modern software development processes

What is meant by these three basic properties of modern software development processes

  What is its commercial availability

INFA 670 University of Maryland, University College How widely is it used? How reliable is it in practice? What is its commercial availability?

  Analyze the key reasons why it is important to address

Analyze the key reasons why it is important to address these differences when preparing the initial project plan.

  Compute a customer''s charges and total bill

The assignment is an assignment in that you, a software developer has won a contract to develop a program that will calculate a customer's charges and total bill at the gasoline pump, taking into account.

  Discuss briefly why in some cases you may not want to fix

Discuss briefly why in some cases you may not want to fix a known vulnerability because of a trade off between risk and cost of fixing.

  Write the parallelization particle swarm optimization

Try and fully understand the two examples, one dimensional and two dimensional the Parallel PSO in Handout

  Define systems-thinking concepts in your own words

Define the following systems-thinking concepts in your own words: Systems thinking, Stock and flow diagram, Causal loop diagram.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd