StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Acceptable Use and Behavior Policy - Essay Example

Comments (0) Cite this document
Summary
The audit policy item employed by Firion Corporation is primarily designed to guide the security team to audit the company’s infrastructure system and mitigate the potential vulnerabilities…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
Acceptable Use and Behavior Policy
Read TextPreview

Extract of sample "Acceptable Use and Behavior Policy"

Download file to see previous pages To protect confidential information and its financial interests, the company has adopted a number of acceptable use and behavior policies that not only enable it to mitigate the threats but also allow the employees to flexibly conduct their daily businesses without affecting the productivity. This paper discusses the physical security policy, vulnerabilities, audit policy, log management, system administrator policies as well as the various security incident handling procedures at Firion Company. Firion has implemented a number of physical security policies that are primarily aimed at improving the integrity and confidentiality of the information systems that are used in the company. One of the physical security policies that is the prohibition of the use of devices such as USB drive, FireWire and rewritable CDs/DVDs on company owned assets (Wijayanayake, 2009). Additionally all the company communication systems are only required to be configured by the IT department and no modifications are allowed to both the software and hardware without the approval of the IT security team. In this regard, Firion employees, business partners, contractors and vendors are not allowed to install any software applications or hardware into any machines used by the company. Generally some of the main security vulnerabilities that are currently facing Firion include potential leakage of corporate information through removable storage devices, introduction of malicious applications into the information systems of the company and misuse of computer resources. For example, employees participating surfing social network sites may unknowingly bring malicious content to the company systems. Audit Policy Item The audit policy item employed by Firion Corporation is primarily designed to guide the security team to audit the company’s infrastructure system and mitigate the potential vulnerabilities. It is the responsibility of the security team to ensure that all the information regarding the company which are posted over the internet are properly audited to ensure that they do not compromise the security of the company (Rudolph, 2009). For example the security team is required to constantly monitor and revaluate the system and makes the necessary patches to potential security breaches. Additionally the company also makes regular vulnerability and social engineering tests to detect potential threats to the company websites and online information.  Log Management Policy Item As part of its log management policies, Firion does not allow any employee to lock their workplace computers when not in use or write down their login passwords on paper. The responsibility of creating and maintaining a secure log management infrastructure at Firion is given to the security team. For example, the security team not only performs regular log reviews and access monitoring but they also ensure the privacy of sensitive and confidential information through the use of central authentication credentials such as user passwords. The company has also designed role based access control regulations which ensures that the access of any employee to facilities and company data is based on their roles and therefore only employees who need particular data will be able to login and access to the data. System Administrator Policy Item  According to Ferion’s system administrator policies, administrative rights are only reserved to the security t ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Acceptable Use and Behavior Policy Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1456079-human-aspect-of-cybersecurity-policy
(Acceptable Use and Behavior Policy Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1456079-human-aspect-of-cybersecurity-policy.
“Acceptable Use and Behavior Policy Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1456079-human-aspect-of-cybersecurity-policy.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Acceptable Use and Behavior Policy

The Widespread Use of Information Communication Technology

An increasing number of frauds is an example of an alarming situation. All these have a far-reaching impact on the employees, on businesses and on people. 

On the work front, the advantages of ICT cannot be overlooked in maintaining and implementing successful quality programs. Customer-driven standards, customer-supplier links, the prevention of error, quality at the source, and continuous improvement are some of the principles that are put into practice (Laudon & Laudon, 2000 cited by Iles & Healy, 2004). IC T facilitates the production process, helps meet benchmarking standards, make constant upgradation based on customer demands. The internet has revolutionized not just the selling of goods and services...
9 Pages(2250 words)Essay

Aircraft Maintenance Technology in Today Use

Aircraft Maintenance technology relates to the actions required to improve the airworthiness and the designed-in reliability of an aircraft and its systems, subsystems, and components throughout the life cycle of the aircraft. Aircraft Maintenance Technicians (AMTs) perform or supervise maintenance, preventive maintenance, and alteration of aircraft and aircraft systems in accordance with the provisions of Federal Aviation Regulations.

As the aviation technology made it progress, it was necessary to bring in the maintenance of all the aircraft for it’s prolonged and safety use. From the time it started, aircraft maintenance has gone through a series of changes. From basic to improvised and now the high-tech mainte...
7 Pages(1750 words)Report

Use of Batteries as Power Sources

Plus key issues exacting to a low-side Li-ion protector circuit are converse. The transients shaped when the Li-ion protector opens throughout a brief short or when the battery is unplugged even as beneath load may exceed the voltage rating of semiconductors in the battery set. This theme describes a number of plan issues and suggests solutions to make your mind up or get better them. The resolution of these subjects requires attention to together the circuit design and the printed circuit board (PCB) explains.

If we analyzed the Fig. 1 then we come to know that it is a block drawing of circuitry in a typical Li-ion battery set. It demonstrates an instance of a security protection circuit for the Li-ion cells and a gas...
10 Pages(2500 words)Report

United States Foreign Policy from 1945-1991

American Presidents presiding over some key events in history, such as the Cuban Missile Crisis, The Cold War, The Vietnam War, etc., were hindered from acting as public representatives due to pressure from the military-industrial complex. John Kennedy, Lyndon Johnson, Ronald Reagan, George Herbert Walker Bush, and George W. Bush – all of them were subject to these opposing interests. But eventually, the corporate-government nexus proved too powerful; and in this sense, American Presidents after the Second World War were largely restricted and powerless to uphold their higher personal values. Most of the strategic moves on part of the United States after the end of the Great War were directly in response to an anticipated th...
11 Pages(2750 words)Essay

Quality Use of Medicines - Pharmacy Comparison

The pharmacist is also the justice of the peace.

Comparing this pharmacy with the Campbell pharmacy, the Chandler pharmacy is located in a much busier area, hence there are more shops and more people in the vicinity. There are more medically related establishments in the Chandler pharmacy than in the Campbell pharmacy, hence there are more patients buying their medicines in the Chandler pharmacy. Both pharmacies have similar conveniences for their customers. They are located near a bus stop and taxi ranks, and a car park is available within the vicinity of both pharmacies.

The Chandler Kamart pharmacy is a very busy pharmacy with three full-time pharmacists and 8 pharmacy assistants working in one shift. With...
9 Pages(2250 words)Essay

Strategic Pay and Organizational Behavior

Both, Performance-related pay (PRP), as well as  Payment by Results (PBR), are based on the notion that if a worker can vary output by increasing his efforts, the hope of increased pay will lead him to perform his best. Both methods can be applied to an individual as well as a group level. Below is a critical comparison of the two:
Defined in simplest of terms, payment by results can be defined as the scheme of paying incentives in which, the bonus or the variable portion of the payment will be dependent on measurable values of outputs, within studied time limits.

Advantages: The primary advantage of this scheme is the inducement and motivation of workers for higher efficiency and great output. It is better th...
6 Pages(1500 words)Assignment

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

The Use of Rhetoric in the Electronic Age

The rubric of the rhetorical theory is an extremely contested discipline with classical rhetoric theory focusing on the concept of rhetoric as a form of persuasion or an ideological perspective that asserts “rhetoric’s role in upholding power and domination” over the “general public” as the underlying basis of societal communication (Stacks & Salwen, 2008, p.240). However, the boundaries of the classical rhetorical theory have been challenged by cultural change, context and the permeation of alternative perspectives. 

In particular, the impact of the digital revolution and the growth of numerous multimedia streams on cultural norms has challenged classical theory propounding the fu...
14 Pages(3500 words)Article

European Union Policy: Turkey

... up of EU and the functioning of EUs institutions and policies and the satisfactory continuation of the EUs growth. The enlargement is an ongoing process. EU is now handling the cases of prospective members. In this context, the situation and prospectus of the candidature of Turkey is entirely different. This is the most toughest one the EU has ever faced and it is still under consideration. It is the biggest country to apply for membership and some member states have serious reservations about its candidature being ever accepted. Cyprus question is the main cause of dispute and puts a mark on the candidature of Turkey. The accession negotiations began in 2005 and it still continues. Many members put forth the argument—granted Turkey...
9 Pages(2250 words)Case Study

The Increasing Use of Technology

Technology has no doubt had an incredible impact on our lives in many ways, such as through making information and other things more accessible, facilitating all kinds of tasks including communication, making life easier and more enjoyable, but these developments have come at the expense of reducing our involvement, making people unable to cope with situations when the technology breaks down, and so on. It is argued that situations of over-reliance and dependency do exist, so technology has indeed taken over and that people should, therefore, use technology effectively so they can derive its benefits but also cautiously so that it does not cause any detrimental effects in a situation where they are avoidable.

Technology...
10 Pages(2500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Acceptable Use and Behavior Policy for FREE!

Contact Us