Premium Essay

Cis 462 Wk 2 Case Study 1 Acceptable Use Policy

In: Business and Management

Submitted By activitymode
Words 688
Pages 3
CIS 462 WK 2 CASE STUDY 1 ACCEPTABLE USE POLICY
To purchase this visit here: http://www.activitymode.com/product/cis-462-wk-2-case-study-1-acceptable-use-policy/ Contact us at:
SUPPORT@ACTIVITYMODE.COM
CIS 462 WK 2 CASE STUDY 1 ACCEPTABLE USE POLICY
CIS 462 WK 2 Case Study 1 - Acceptable Use Policy
An Acceptable Use Policy (AUP) is a very important policy within organizations to define acceptable employee behavior when accessing company resources. Additionally, there are also legal implications within AUPs. Use an existing AUP that you are familiar with, such as from a current or previous workplace, or search on the Internet for an example AUP to complete this case study.
Write a three to five (3-5) page paper in which you:
1. Describe the purpose of an Acceptable Use Policy you have selected and explain how the AUP helps provide confidentiality, integrity, and availability within the organization.
2. Critique the AUP you selected and provide recommendations for improving the AUP.
3. Explain methods that organizations can implement to help ensure compliance with the AUP, mitigate their risk exposure, and minimize liability. Describe how your selected AUP accomplishes these goals.
More Details hidden...
Activity mode aims to provide quality study notes and tutorials to the students of CIS 462 WK 2 Case Study 1 Acceptable Use Policy in order to ace their studies.
CIS 462 WK 2 CASE STUDY 1 ACCEPTABLE USE POLICY
To purchase this visit here: http://www.activitymode.com/product/cis-462-wk-2-case-study-1-acceptable-use-policy/ Contact us at:
SUPPORT@ACTIVITYMODE.COM
CIS 462 WK 2 CASE STUDY 1 ACCEPTABLE USE POLICY
CIS 462 WK 2 Case Study 1 - Acceptable Use Policy
An Acceptable Use Policy (AUP) is a very important policy within organizations to define acceptable employee behavior when accessing company resources. Additionally, there are…...

Similar Documents

Free Essay

Acceptable Use Policy

...Acceptable Use Policy (AUP) You must sign or digitally sign this form prior to issuance of a network userid and password. Initial Awareness Training must be completed prior to signing this agreement. IA Awareness training is found at http://ia.gordon.army.mil/dodiaa/default.asp. The IA Awareness test located on the Fort Gordon website must be completed to fulfill the Awareness training requirement. [pic] By signing this document, you acknowledge and consent that when you access Department of Defense (DoD) information systems: 1. You are accessing a U.S. Government (USG) information system (IS) (which includes any device attached to this information system) that is provided for U.S. Government authorized use only. 2. You consent to the following conditions: a. The U.S. Government routinely intercepts and monitors communications on this information system for purposes including, but not limited to, penetration testing, communications security (COMSEC) monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. b. At any time, the U.S. Government may inspect and seize data stored on this information system. c. Communications using, or data stored on, this information system are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any U.S. Government-authorized purpose. d. This information......

Words: 2024 - Pages: 9

Free Essay

Acceptable Use Policy

...union: Acceptable Use Policy 1. Purpose The purpose of this policy details the acceptable and unacceptable use of ABC Credit Union devices and services for the purposes of employee protection from viruses as well as company protection from compromised data and other legal allocations. 2. Scope This policy applies to all employees, partnered businesses, and any other persons or organizations that utilize equipment and services owned or leased by ABC Credit Union. 3. Policy 3.1 General Use and Ownership Users must be aware that any data created or stored on ABC Credit Union systems and because of this Administration cannot be held responsible for data confidentiality found on any device belonging to ABC Credit Union. All ABC Credit Union employees are responsible for exercising what constitutes “Acceptable Use” of workstations and their applications as well as any attached network devices i.e. Printers, Telephony, ect. Guidelines for this policy will be created by individual departments, however any questions regarding policy adherence must be brought to the respective departmental managers. All internal data will adhere to an encryption policy per ABC Credit Union IT. For guidelines on this policy, please consult our Information Sensitivity Policy. Internal network traffic will be monitored by ABC Credit Union IT per Audit Policy ABC Credit Union reserves the right to audit their enterprise on a periodic basis to ensure compliance with this......

Words: 748 - Pages: 3

Premium Essay

Acceptable Use Policy

...Richman Investments ACCEPTABLE USE POLICY Information Security Policy Number 12345 Effective 10/15/2013` I. Introduction An Acceptable Use Policy (AUP) is an organization-wide policy that defines what is allowed and what is not allowed regarding use of Information Technology (IT) assets by employees. The following policy is to be followed by all employees of Richman Investments, authorized individuals, vendors, and contractors who use any information technology (IT), electronic, or communication devices owned and/or provided by Richman Investments for the purpose of assisting them with their job-related duties. Access to the Internet is a privilege and all employees must adhere to the policies regarding computer, email, and Internet usage. Violation of these policies will result in disciplinary and/or legal action that may include counseling, revocation of company devices, termination of the employee, and legal action. II. Roles and Responsibilities Every employee must acknowledge that they have received a copy of the AUP and confirm that they have a complete understanding and agree to abide by the rules set forth in the AUP. Receipt and signing of the AUP will occur at Employee Orientation, and in the event of changes to the policy, a revised AUP must be signed. III. Policy Directives A. Acceptable Use Management Requirements A Standard Operating Procedure (SOP) will be established to support the development and maintenance of this AUP. ...

Words: 747 - Pages: 3

Premium Essay

Acceptable Internet Use Policies

...Necessity of an Acceptable Internet Use Policy for Business William E. Boyle Point Park University Abstract This paper will argue that an Acceptable Internet Use Policy, combined with effective network monitoring and policy enforcement is an essential requirement for businesses to protect business assets and resources. It discusses the potential loss to business from employee misuse of internet access and the danger from external sources. Necessity of an Acceptable Internet Use Policy for Business The internet is an integral part of today’s business resources. Organizations, large and small use the internet to improve organizational efficiencies. Businesses use the internet for everything from worldwide sales using websites, workforce collaboration using email and network data access, and for business research. In most business organizations, all types of devices, from desktop computers to cell phones and PDA’s, allow workers to access the internet and send and receive email on demand. A 2008 study by the Pew Internet & American Life Project found that 53% of Americans are employed, and 96% of these workers have some access to these tools. (Madden, M. & Jones, S., 2008). This allows workers instant access to websites, email and instant messages, but uncontrolled access exposes a business organization to a great risk of financial loss. All businesses must manage this risk through the implementation of an Internet Use Policy combined with employee......

Words: 2537 - Pages: 11

Premium Essay

Define an Acceptable Use Policy

...1.0 Introduction Richman Investments at all times is to establish acceptable and unacceptable use of electronic devices and network resources. All employees of Richman Investments must comply with the rules and regulations for use of the Internet, sending e-mail, entering to social media sites, and downloading attachments from internet. The Richman Investments AUP will help achieve these goals. 2.0 Scope Every supervisor, employee and temporary employee that works for Richman Investments must follow this policy as it is written. This policy also applies to all equipment affiliated with Richman Investments. 3.0 Policy 3.1 General As an employee of Richman Investments, you are responsible for the internet access. In ordnance with the policies set forth by Richman Investments resources may not be used for any unlawful or prohibited purpose. For extra security Richman Investments will monitor all systems, equipment, and network using the Audit Policy. Any devices that might interfere with the Richman Investments network will be immediately disconnected. Firewalls must be turn on at all times. Antivirus programs must be updated regularly. 3.2 Security 1. Every device connected to the Richman Investments network must comply with the Access Control Policy. All hard drives must be encrypted. 2. All employees of Richman Investments must keep their passwords secure and do not share accounts. Authorized users are responsible for the security of their...

Words: 620 - Pages: 3

Premium Essay

Cis 524 Week 2 Case Study 1

...A++PAPER;http://www.homeworkproviders.com/shop/cis-524-week-2-case-study-1/ CIS 524 WEEK 2 CASE STUDY 1 CIS 524 Week 2 Case Study 1, Case Study 1: User Interfaces Due Week 2 and worth 90 points Early user interfaces were designed with little or no consideration for the end user. This was largely due to technical and hardware limitations. The poor interface design required a specific skill set for users and limited the mass appeal of computers. Modern interfaces are much more user friendly. Theo Mandel wrote about the five (5) golden rules of interface design. Read Mandel’s article located at http://www.theomandel.com/docs/Mandel-GoldenRules.pdf. Write a four to five (4-5) page paper in which you: 1. Describe three (3) interfaces you interact with on a daily basis. 2. Analyze each interface you identified in Question one (1) and assess how it adheres to Mandel’s five (5) golden rules. 3. Suggest two (2) changes for each interface to achieve a more user-friendly design and justify your suggestion. 4. Provide three (3) screen shots for each interface. Note: These screen shots should be labeled and appear in the appendix of the case study. These pages are not included in the page requirement for the assignment. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using......

Words: 362 - Pages: 2

Free Essay

Cis 333 Wk 3 Case Study 1 Mobile Devices

...CIS 333 WK 3 CASE STUDY 1 MOBILE DEVICES To purchase this visit here: http://www.activitymode.com/product/cis-333-wk-3-case-study-1-mobile-devices/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 333 WK 3 CASE STUDY 1 MOBILE DEVICES CIS 333 WK 3 Case Study 1 - Mobile Devices You are an Information Security consultant for a small doctor’s office consisting of three doctors and two nurses. The office is physically located among several other professional office spaces. The doctors have decided they would like to replace the current method of using paper based medical records with automated medical records. The doctors would like to use mobile devices over a wireless network to move from one examining room to the next to document patient visits. Given the extremely sensitive information captured by the mobile devices and the wireless network, the doctors require you to provide a detailed plan identifying inherent risks associated with this network environment and establish mobile device and wireless security methods that will mitigate the risks. Research findings will be submitted with a minimum of three (3) scholarly level APA references. Write a two to three (2-3) page paper in which you: 1. Identify risks inherent in the use of wireless and mobile technologies. 2. Analyze the identified risks and develop factors to mitigate the risks. 3. Provide a sound recommendation to be employed in the doctor’s office. Activity mode aims to provide quality study notes......

Words: 793 - Pages: 4

Premium Essay

Cis 462 Wk 4 Assignment 1 It Security Policy Framework

...CIS 462 WK 4 ASSIGNMENT 1 IT SECURITY POLICY FRAMEWORK To purchase this visit here: http://www.activitymode.com/product/cis-462-wk-4-assignment-1-it-security-policy-framework/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 462 WK 4 ASSIGNMENT 1 IT SECURITY POLICY FRAMEWORK CIS 462 WK 4 Assignment 1 - IT Security Policy Framework Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework. You may create and / or assume all necessary assumptions needed for the completion of this assignment. Write a three to five (3-5) page paper in which you: 1. Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization. 2. Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations. 3. Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy......

Words: 793 - Pages: 4

Premium Essay

Cis 462 Wk 8 Assignment 2 Business Impact Analysis

...CIS 462 WK 8 ASSIGNMENT 2 BUSINESS IMPACT ANALYSIS To purchase this visit here: http://www.activitymode.com/product/cis-462-wk-8-assignment-2-business-impact-analysis/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 462 WK 8 ASSIGNMENT 2 BUSINESS IMPACT ANALYSIS CIS 462 WK 8 Assignment 2 - Business Impact Analysis In order for an organization to develop an effective business continuity plan or disaster recovery plan, it must know what information assets it has, their impact on business operations, and the criticality and priorities associated with the information systems and assets. The primary objective of a business impact analysis (BIA) is to identify the assets that are required for continued business operations in the event of an incident or disaster. Thus, a critical step in the development of an effective BIA includes establishing component priorities and determining component reliance and dependencies. Additionally, organizational personnel must know their responsibilities during recovery efforts. Write a three to five (3-5) page paper in which you: 1. Describe the methods for establishing component priorities, including: a. Business functions and processes b. BIA scenarios and components c. Financial and service impact of components not being available d. Recovery time frameworks 2. Describe the methods for determining component reliance and dependencies, including: a. Component dependencies b. Resources required to recover component in the......

Words: 784 - Pages: 4

Premium Essay

Cis 510 Wk 3 Case Study 1 Establishing a Formal Systems

...CIS 510 WK 3 CASE STUDY 1 ESTABLISHING A FORMAL SYSTEMS To purchase this visit here: http://www.activitymode.com/product/cis-510-wk-3-case-study-1-establishing-a-formal-systems/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 510 WK 3 CASE STUDY 1 ESTABLISHING A FORMAL SYSTEMS CIS 510 WK 3 Case Study 1 - Establishing a Formal Systems Development Process Brian and Carrie are systems analysts with many years of systems development experience at a large firm. Jane has recently been hired as the company’s first-ever process manager. She has been reviewing the company’s past practices of systems development with the intent of trying to establish a formal systems development process for the company. Brian has been a long-time proponent of the waterfall approach to systems development. Carrie has been a big proponent of the iterative/incremental development approach. Both are known to be very opinionated on the tools and techniques that should be used for systems development projects and both are lobbying Jane very hard to adopt their preferred techniques. Write a two to three (2-3) page paper in which you: 1. Describe how Jane should deal with the two (2) system analysts from a technical and human resource perspective. 2. Explain the factors that Jane should consider in establishing a process management solution. 3. Assuming you have two (2) promising tools and techniques, suggest three (3) or more ways you can foster a team environment when one analyst does not get......

Words: 567 - Pages: 3

Premium Essay

Cis 517 Wk 2 Assignment 1 It Project

...CIS 517 WK 2 ASSIGNMENT 1 IT PROJECT To purchase this visit here: http://www.activitymode.com/product/cis-517-wk-2-assignment-1-it-project/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 517 WK 2 ASSIGNMENT 1 IT PROJECT CIS 517 WK 2 Assignment 1 - IT Project Management Assessment Research and read an article on recent recipients of the Project Management Institute’s Project of the Year Award. Write a two to three (2-3) page paper in which you: 1. Summarize how the project manager or team exhibited exceptional and ethical project management practices. 2. Discuss the role of the project manager or team, the organizational setting, the recipient’s approach to project integration management, and obstacles that had the potential of adversely impacting the triple constraints. More Details hidden... Activity mode aims to provide quality study notes and tutorials to the students of CIS 517 WK 2 Assignment 1 IT Project in order to ace their studies. CIS 517 WK 2 ASSIGNMENT 1 IT PROJECT To purchase this visit here: http://www.activitymode.com/product/cis-517-wk-2-assignment-1-it-project/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 517 WK 2 ASSIGNMENT 1 IT PROJECT CIS 517 WK 2 Assignment 1 - IT Project Management Assessment Research and read an article on recent recipients of the Project Management Institute’s Project of the Year Award. Write a two to three (2-3) page paper in which you: 1. Summarize how the project manager or team exhibited exceptional and......

Words: 633 - Pages: 3

Premium Essay

Cis 512 Wk 2 Case Study 1 Revolutionizing the Retail Sector

...CIS 512 WK 2 CASE STUDY 1 REVOLUTIONIZING THE RETAIL SECTOR To purchase this visit here: http://www.activitymode.com/product/cis-512-wk-2-case-study-1-revolutionizing-the-retail-sector/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 512 WK 2 CASE STUDY 1 REVOLUTIONIZING THE RETAIL SECTOR CIS 512 WK 2 Case Study 1 - Revolutionizing the Retail Sector The Digipos (http://bit.ly/MOWvG1) Website states, “We design, develop and manufacture our own range of systems that are engineered to meet the challenging and constantly changing demands of a retail environment. Using the latest technologies, we deliver positive, cost-effective solutions in compact, high performance, reliable, and energy saving technologies. Our systems are used by leading retailers around the world.” In 2004, DigiPos launched the DigiPos Retail Blade system, which was the first electronic point of sale (EpoS) system to use blade technology. Go to Intel’s Website and read “Revolutionizing the Retail Sector”, located athttp://intel.ly/NAfWDs. Write a four to five (4-5) page paper in which you: 1. Examine and assess the main computing problems Digipos faced with regard to system upgrades. 2. Evaluate the solutions that Digipos used to resolve the problem. Propose an alternative solution that you believe could resolve the problem. Compare and contrast the Quantum Blade to the Retail Blade system in terms of computer architecture and system performance. Activity mode aims to provide quality study......

Words: 778 - Pages: 4

Free Essay

Cis 517 Wk 6 Case Study 2

...CIS 517 WK 6 CASE STUDY 2 To purchase this visit here: http://www.activitymode.com/product/cis-517-wk-6-case-study-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 517 WK 6 CASE STUDY 2 CIS 517 WK 6 Case Study 2 - Green Computing Research Project – Part 2 Read the Green Computing Research Project, Part 2 in Appendix C. Document the requirements and develop a scope statement. Write a two to three (2-3) page paper in which you: 1. Document the requirements based on the information provided and assumptions that you have made, including a requirements traceability matrix. 2. Include a list of questions to ask the sponsor about the project scope. Include at least six (6) questions for full credit. 3. Develop a scope statement for the project. More Details Included... Activity mode aims to provide quality study notes and tutorials to the students of CIS 517 WK 6 Case Study 2 in order to ace their studies. CIS 517 WK 6 CASE STUDY 2 To purchase this visit here: http://www.activitymode.com/product/cis-517-wk-6-case-study-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 517 WK 6 CASE STUDY 2 CIS 517 WK 6 Case Study 2 - Green Computing Research Project – Part 2 Read the Green Computing Research Project, Part 2 in Appendix C. Document the requirements and develop a scope statement. Write a two to three (2-3) page paper in which you: 1. Document the requirements based on the information provided and assumptions that you have made, including a requirements......

Words: 649 - Pages: 3

Premium Essay

Cis 462 Case Study 2: Scada Worm

...CIS 462 Case Study 2: SCADA Worm Follow Below Link to Download Tutorial http://homeworklance.com/downloads/cis-462-case-study-2-scada-worm/ For More Information Visit Our Website ( http://homeworklance.com/ ) Email us At: Support@homeworklance.com or lancehomework@gmail.com Case Study 2: SCADA Worm Due Week 6 and worth 100 points Protecting the nation’s critical infrastructure is a major security challenge within the U.S. Likewise, the responsibility for protecting the nation’s critical infrastructure encompasses all sectors of government, including private sector cooperation. Search on the Internet for information on the SCADA Worm, such as the article located at http://www.theregister.co.uk/2010/09/22/stuxnet_worm_weapon/. Write a three to five (3-5) page paper in which you: 1. Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States. 2. Describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains. 3. Assess the levels of responsibility between government agencies and the private sector for mitigating threats and vulnerabilities to our critical infrastructure. 4. Assess the elements of an effective IT Security Policy Framework, and how these elements, if properly implemented, could prevent or mitigate and attack similar to the SCADA / Stuxnet Worm. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites......

Words: 425 - Pages: 2

Premium Essay

Acceptable Use Policy

...Acceptable Use Policy or AUP is a written policy and an agreement that defines what is allowed and not allowed to be used by employees regarding the use of internet. Here at Richman Investment are giving you, the employees the details and what the policy entails. The use of the Internet is a privilege, not a right, and inappropriate use will result in a cancellation of those privileges. The purpose of the internet resources is to help employees in the performance of their job related functions and not for personal usage. Each employee that is given privileges will have to comply with the company’s policy. Internet usage should be conducted for the company business only. Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information. The use of personal internet must be limited and only to be used for web based emails only with the approval of your Supervisor or Manager. Under no circumstances may Company network to be used on Social networking such as Facebook, or video viewing such as you tube, pornographic, or any unethical use. These websites will be restricted and prohibited for viewing. Doing so can lead to disciplinary action up to and including termination of employment. Like the internet, email should also be for Company purposes only. Any employees are not allowed to send personal emails using Company......

Words: 576 - Pages: 3