Assignment Content Many information security policies cross the entire spectrum of an organization. Module 04, “Network Security Policy Design and Implementation,” of EC Council CND Courseware...

1 answer below »

Assignment Content




  1. Many information security policies cross the entire spectrum of an organization.






    Module 04, “Network Security Policy Design and Implementation,” of EC Council CND Courseware provides an extensive list of information security policies.






    Choose 5 information security policies.






    Find an example of each policy on the Internet. Academic institutions and federal government agencies tend to publish their information security policies that are open to public view.






    Write a 2- to 3-page summary of the policies and examples you found in a Microsoft® Word document. Include the following for each of the policies:



    • Purpose of the policy

    • Owner of the policy

    • The audience of the policy

    • Co-dependencies with other policies

    • A link to the policy example






    Cite references to support your summary.



    Format yourcitations according to APA guidelines.






    Submit your assignment.






    Resources



Answered Same DayJun 01, 2021

Answer To: Assignment Content Many information security policies cross the entire spectrum of an organization....

Neha answered on Jun 01 2021
146 Votes
Acceptable use policy
The Acceptable use policy is used to provide respect for the rights of the other users who are working for the computer. Back sceptical news means we are resp
ecting the rights of other users, integrity of the physical facilities and all the contractual agreements and the license. If the individual is found to be in the violation of the acceptable use policy in any manner, then the organization is liable to take the disciplinary action which also includes the restriction or the loss of the network privileges (Siau, K., Nah, F. F. H., & Teng, L).
If someone is violating the policy in serious manner, then it can also result in some serious consequences and it can include to the suspension or termination of the person from the organization. The individuals are also subject to the local, state and federal laws governing different interactions which take place over the Internet. These policies and laws are subject to change as per the development and changes in state and federal laws.
The owner for this law will be the organization or the firm which is creating it. Each of the organization will have their own different acceptable use policy and their rules. For this policy all the people who are working over the network or connected with it will be the audience. This policy in life is liable for all the people who are working in the organization and who have signed this agreement with them. The organization creates policy for their network and the people who are connected with will behave like the audience and will be liable for the punishment if they violate any rule. This policy is also dependable for the email policy or the communication policy.
https://it.brown.edu/computing-policies/acceptable-use-policy/acceptable-use-examples
Access control policy
The...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here