Determine the factors that organizations need to consider


1."Acceptable Use Policy" Please respond to the following:

Describe the main elements of an acceptable use policy. Determine the factors that organizations need to consider when developing their acceptable use policy.

• Determine the special considerations that need to be taken into account when developing the acceptable use policy for different types of users (i.e., employees, system administrators, security personnel, contractors, guests, and auditors).

2. Best Practices for User Domain Policies" Please respond to the following:

Imagine that your supervisor has asked you to draft a brief statement about best practices for user domain policies that will be presented to the executive board. Create five best practices for user domain policies.

• Select the best practice that you would emphasize the most during this presentation to the executive board and explain why.

Please read and respond to the post from another student below.

Professor and classmates,

"Best Practices for User Domain Policies"

Although there are several best practices to consider, the five that I would consider presenting to the executive board are attachments (ensuring that employees understand the process of not opening e-mail attachments from an untrusted source). Encryption, (always assuring encryption for data at rest and in transit). Layered defense, (in-depth defense approach providing different layers of security).

Least privilege, (ensuring employees only have access to resources to perform their job function). Virus protection, (each desktop, laptop, or mobile device needs to have the latest virus, malware, and spyware installed and continuously updated).

Select the best practice that you would emphasize the most during this presentation to the executive board and explain why?

In my opinion, out of the five selected I would lean towards "Encryption." If the encryption process is in place and correctly implemented across the board to include laptops, backup tapes, e-mail, and so on if a mistake is made by an employee the data is protected from unauthorized personnel.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Determine the factors that organizations need to consider
Reference No:- TGS02771757

Now Priced at $10 (50% Discount)

Recommended (95%)

Rated (4.7/5)