Discuss policies related to acceptable of computer systems


Assignment:

Description

Primary Task Response: Within the Discussion Board area, write 400 to 600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas. This week, you will research the importance of cybersecurity policies for various user groups. You and your classmates will identify key user groups and identify requirements applicable to them.

The insider threat is still considered by the FBI and Department of Homeland Security to be the number one threat to an organization. This is most often attributed to employees exhibiting poor behavior or disregarding information and cybersecurity policies and procedures. Eighty percent of all breaches are caused by individuals clicking on links that lead to the installation of malware on computer systems or opening attachments that allow attackers to gain access to the organization's computer systems and networks (Yasin, 2016). If undetected, these breaches can cause significant harm to an organization's reputation and cost millions of dollars in damages. Some of these risky behaviors include the following:

• Writing down passwords and placing them under keyboards or posting them in the work area

• Browsing to nonwork-related Web sites, which can contain malware

• Tailgating into areas where accountability is required to be maintained

• Sharing username and other log-in credentials between employees

• Walking away from computers without locking the workstation

Include the following in your primary Discussion Board post:

• Explain why it is necessary for an organization to consider developing policies related to acceptable use of computer systems.

• Briefly describe at least 3 policies that would be considered best practices for any organization to adopt to reduce the risk of the accidental insider threat. You should include at least 2 from the following list and 1 of your own:

o Acceptable Use Policy

o Privileged Use Policy

o E-Mail Policy

• Finally, explain how you would communicate the importance of each policy to the user group that the policy is applicable to. When describing the communication, include the channel you will use to communicate.

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

• What did you learn from your classmate's posting?

• What additional questions do you have after reading the posting?

• What clarification do you need regarding the posting?

• What differences or similarities do you see between your posting and other classmates' postings?

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reference

Yasin, R. (2016, May 24). Employee negligence the cause of many data breaches. DARK Reading.

Reading Assignment

CTU Library Guide

Appendix: The Channels of Communicating the Message in Communicating Strategy

Assignment Objectives

• Interpret the impact of the Digital Age on professional communications

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Discuss policies related to acceptable of computer systems
Reference No:- TGS03033675

Now Priced at $30 (50% Discount)

Recommended (93%)

Rated (4.5/5)