Creating Company E-mail/WIFI/Internet Use Policies
You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.
There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.
Project Plan
You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.
Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).
1. Overview
2. Purpose
3. Scope
4. Policy
5. Policy Compliance
6. Related Standards, Policies and Processes
7. Definitions and Terms
Some useful links and resources for your research:
Provide a reflection of at least 500 words (2 pages double spaced excluding Title and Reference pages) that summarizes what you feel are the most important or interesting concepts you have learned so far in this Cloud Computing course. Would be good to include an insight as to whether the learning was new to you or reinforced knowledge that you already had.
Requirements: Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper. The paper should include a title page, body pages, and reference page. An abstract and introduction is not required for this assignment. Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.
Complete a three to four-page report with APA cited references to support your work.
Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure. Define an auditing plan which includes:
scope
benchmarks
data-collection
post-audit activities
log management
testing of security systems
Select three of the following end-user breaches for your assignment:
Open network drive shares allow storage privileges to outside users.
Sensitive laptop data is unencrypted and susceptible to physical theft.
Remote users do not have recent patches or current updates.
Removable storage drives introduce malware filtered only when crossing the network.
Predictable passwords meet minimum length requirements but remain easily guessable.
Your Chief Executive Officer, Your Chief Operations Officer, and your Chief Information Officer were killed when a tornado hit your organizational headquarters. All these employees were considered 3 of the top experts in industry and represented a combined total of 60 years of experience.
You need to develop a business continuity plan to address the void in leadership as a result of this tragedy.
You need to develop a formal succession plan.
You need to develop a strategic knowledge management plan.
The final paper will be 10 – 15 pages (not including your cover page and reference page) double spaced 12 point Times Roman New in APA format. You must use a minimum 20 different references, which could include your course textbook. Wikipedia is not an acceptable source of reference
Find a recent article that relates to this week’s topic and post a summary of that article and how it relates to this week’s lesson.
related to this topic
What is an inadvertent leak of information? How has it affected the adoption of technology?
Post your reply by Wednesday at midnight. Your response should be at least 300 words and appropriately cite your resources.
Respond to two of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.
You will not be able to see other posts until you make your first post.
Not more than 350 words total. Respond to at least two other students (150 words each peer)!!
2. Two (2) paragraphs (350 Words total) discussion response to main DQ questions. In addition, respond with two (2) students/Peers to Peer (identify peers) or two classmates. The responses should 150 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response may not be to a peer already responded to more than twice.
Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade.