CSEC 378/418 Extra Credit 4 4 Points of Available Extra Credit Acceptable Use Policy Purpose: To analyze a scenario and create an Acceptable Use Policy addressing the poor acceptable use practices...

1 answer below »
Instructions are attached



CSEC 378/418 Extra Credit 4 4 Points of Available Extra Credit Acceptable Use Policy Purpose: To analyze a scenario and create an Acceptable Use Policy addressing the poor acceptable use practices outlined in the scenario. Assignment: You will write an Acceptable Use Policy based on the scenario listed below. The purpose of this policy will be to specifically address the problems detailed in the scenario and to correct these problems and define consequences for violating the policy. This report submission is expected to be a minimum of 6 pages in length, double spaced, using a 12pt Times New Roman font, with 1” margins. You may look up examples online and follow a template, but everything must be in your own words. Copying large portions of a policy or copying the whole policy and adding the company name into the policy is considered plagiarism, and will result in you receiving a 0 for the assignment and disciplinary action. If you have questions about the assignment, please ask me during class or send me an email. *** Please follow the instructions on the assignment *** Write just 6 pages. Eliezer Andujar Class: Host Security CSEC 378-418 Professor: Kevin Naughton Scenario: You have been hired on as a Security Consultant by Real Good Bank. Real Good Bank states that they were recently audited and were told to create an Acceptable Use Policy that addressed the security issues in their network and followed current best practices based on NIST guidelines. The CTO has explained that company users are not set up on a Company Domain because users were annoyed by the User Access Control prompts that appeared on their screen every time they tried to access/install something as well as constantly being forced to change their password and having to come up with a complex password. In response to this the IT department at Real Good Bank decided to remove user computers from the domain, making user’s administrators on their computers, and setting their passwords to never expire. Users can install any software onto their systems now and enjoy the freedom of being able to try out cool new software that is sent to their emails. Users also decided to uninstall the Anti-Virus and Web Filtering software on their company workstations because they believed that it was causing their computers to run slowly and stopped them from installing all the games and other software that they wanted. There is currently only one ethernet network and one wireless network at Real Good Bank. The wireless network and wired network are able to communicate freely with each other because users were upset that they couldn’t use their personal smartphones and tablets to connect to company servers and access confidential data they needed to perform their jobs. Many users also prefer to bring in their own laptops and desktops to plug into the company ethernet network as they believe that their machine is better than the systems that the IT department is purchasing. Users are also currently purchasing 5-port hubs and plugging them into the 1 ethernet port at their desks because they enjoy being able to plug their own printer and other personal ethernet devices in at their desk. Employees like to save the confidential data they use at work locally on their personal devices so they can work on their projects at home. While a VPN is available, users complained that it was too slow when they were connected to it and that saving documents locally was a far better solution. If a user is ever fired from Real Good Bank, the first thing a user does is drop their company issued computer from the 34th floor of the Real Good Bank building into the dumpster. Users state this makes them feel comfortable that their data can’t be accessed once they leave. Users also will not let IT have access to their personal devices when they leave because they claim their device does not belong to IT. Users also promise that they don’t have any company data on their device or they promise that they will delete any company data that they see when they get home. CSEC 378/418 Extra Credit 3 3 Points of Available Extra Credit Research Paper Purpose: Research one of the topics listed below. Learn about the topic and write a paper detailing what you learned and what the technology is used for. Assignment: Write a 4 page (Double spaced, 1” margins, 12pt Times New Roman font) paper about one of the topics listed below. Your paper should go into detail about the function of the technology you chose and include information on common implementations. What does the technology do? How does it work and what are some requirements that must be met for it to function properly? Have there been multiple versions of the technology? If so, detail some changes that have been made in different versions. Include a works cited referencing any sources and resources you used in your research. Your submission will be graded based on how well the topic is researched and described. Your writing should be clear and concise, avoiding unnecessary repetition. It should be evident that you sufficiently researched and understand the topic. Failing to meet the length spacing or font size requirements will result in a loss of points. TOPICS · Ansible · Kubernetes · Vagrant · Jenkins · Docker · Git · DNSSEC · AWS · Palo Alto Firewalls · Cisco Firepower If you have questions about the assignment, please ask me during class or send me an email. *** TOPIC WILL BE WHAT EVER THE WRITER FINDS MORE EASIER TO DO, FROM THE TOPICS ABOVE. ***Make sure to follow the instructions on the assignment. Eliezer Andujar Class: Host Security CSEC 378-418 Professor: Kevin Naughton
Answered 6 days AfterMar 08, 2022

Answer To: CSEC 378/418 Extra Credit 4 4 Points of Available Extra Credit Acceptable Use Policy Purpose: To...

Dr. Vidhya answered on Mar 14 2022
105 Votes
HOST SECURITY CSEC 378-418
Table of Contents
Part A: Acceptable Use Policy    3
General Purpose    3
The Application    3
The Policy Statement: Acceptable Norms    3
The Policy Statement: Unacceptable Norms    4
Definitions and Procedures    5
Availability    5
Authentication Modes    5
Software Services    6
Responsibilities    6
Consequences of Violatio
n    6
Bibliography    8
Part A: Acceptable Use Policy
General Purpose
The development and objective of present service use policy is to ensure mutual agreement between the Real Good Bank board of administration and the users of the computer and internet provided on behalf of the bank. The common good of this policy is subjected to the overall wellbeing and clarity of functions in several terms such as data privacy, end user agreement, bank policy of applying common and specific terms and conditions of internet usage, differentiation of the public and private information shared on internet.
The motto of the policy is to expect from all users that they will not violate the terms and conditions/provisions or any other given rule, which is listed with a view to smooth accessibility and service based operations of the bank. The policy adheres to the core objectives of developing network etiquettes among the direct or indirect both kinds of employees. This is also to secure the integrity, privacy and the data network breaching possibilities/preventive measures taken against the unethical practices.
The Application
The service use policy of Real Good Bank applies to all, whomsoever it may be, employees and users, which are benefitted by the internet service provisions and equipment provided on behalf of the bank.
The Policy Statement: Acceptable Norms
This policy statement is designed in the following manner to cover the below mentioned criteria of functions:
· It must adhere to the code of conduct of the Real Good Bank in general, covering the consumption of internet resources and equipment.
· It must be effective consistently for assisting the functional operations, services provided by bank as well as securing the interests of the bank and the users who are directly involved in shaping the administration.
· The policy adheres to all existing laws about data management and privacy agreement that bank holds; it contains workplace management of the internet as well as user instructions to secure the information management at confidential level.
· The policy ensures that all resources used to develop the norms are aligned with the integration of data, privacy, and rules of confidential information as well as all applicable administrative laws in the context of the bank.
· The policy will be used in a manner, which is under authority of the bank because granting access to the internet as a viable resource is reckoned a privilege given to the users and they must value it, respect it and use it wisely, as per the terms and rules established on behalf of the bank.
· These rules, therefore, are expected to be dealt with personal and professional liability of the user, if any violation is found after investigation. The actions may include termination of services and other lawful penalties imposed on the user.
The Policy Statement: Unacceptable Norms
As per the above-mentioned acceptable norms, the following is the list of behavioral approach, which the policy document does not adhere to....
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here