StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Acceptable Use and Behavior Policy - Essay Example

Cite this document
Summary
The audit policy item employed by Firion Corporation is primarily designed to guide the security team to audit the company’s infrastructure system and mitigate the potential vulnerabilities…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Acceptable Use and Behavior Policy
Read Text Preview

Extract of sample "Acceptable Use and Behavior Policy"

Download file to see previous pages

To protect confidential information and its financial interests, the company has adopted a number of acceptable use and behavior policies that not only enable it to mitigate the threats but also allow the employees to flexibly conduct their daily businesses without affecting the productivity. This paper discusses the physical security policy, vulnerabilities, audit policy, log management, system administrator policies as well as the various security incident handling procedures at Firion Company.

Firion has implemented a number of physical security policies that are primarily aimed at improving the integrity and confidentiality of the information systems that are used in the company. One of the physical security policies that is the prohibition of the use of devices such as USB drive, FireWire and rewritable CDs/DVDs on company owned assets (Wijayanayake, 2009). Additionally all the company communication systems are only required to be configured by the IT department and no modifications are allowed to both the software and hardware without the approval of the IT security team.

In this regard, Firion employees, business partners, contractors and vendors are not allowed to install any software applications or hardware into any machines used by the company. Generally some of the main security vulnerabilities that are currently facing Firion include potential leakage of corporate information through removable storage devices, introduction of malicious applications into the information systems of the company and misuse of computer resources. For example, employees participating surfing social network sites may unknowingly bring malicious content to the company systems.

Audit Policy Item The audit policy item employed by Firion Corporation is primarily designed to guide the security team to audit the company’s infrastructure system and mitigate the potential vulnerabilities. It is the responsibility of the security team to ensure that all the information regarding the company which are posted over the internet are properly audited to ensure that they do not compromise the security of the company (Rudolph, 2009). For example the security team is required to constantly monitor and revaluate the system and makes the necessary patches to potential security breaches.

Additionally the company also makes regular vulnerability and social engineering tests to detect potential threats to the company websites and online information.  Log Management Policy Item As part of its log management policies, Firion does not allow any employee to lock their workplace computers when not in use or write down their login passwords on paper. The responsibility of creating and maintaining a secure log management infrastructure at Firion is given to the security team. For example, the security team not only performs regular log reviews and access monitoring but they also ensure the privacy of sensitive and confidential information through the use of central authentication credentials such as user passwords.

The company has also designed role based access control regulations which ensures that the access of any employee to facilities and company data is based on their roles and therefore only employees who need particular data will be able to login and access to the data. System Administrator Policy Item  According to Ferion’s system administrator policies, administrative rights are only reserved to the security t

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Acceptable Use and Behavior Policy Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1456079-human-aspect-of-cybersecurity-policy
(Acceptable Use and Behavior Policy Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1456079-human-aspect-of-cybersecurity-policy.
“Acceptable Use and Behavior Policy Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1456079-human-aspect-of-cybersecurity-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Acceptable Use and Behavior Policy

Individual Behavior

Individuals struggle to gain mastery in proactivity and behavior choice (Akhtar et al 2011).... “Whilst individuals may believe they choose their behavior, they do so within the limits set by their place and time” Individuals are self-reflecting self-organizing and self-regulating organisms with a capability to respond to different environments at different times.... hellip; Individual behavior Place and time are seemingly inseparable from individual behavior choices....
8 Pages (2000 words) Essay

Promotion in Schools and University

Preventing risky behavior in schools should also be a major priority in schools.... Schools should ensure that there are set rules that work towards ensuring that each and every student is protected from any risky behavior.... Most students usually start their drug addiction in the university and it is due to this that most universities have come up with strict measures to ensure that university students are protected from this behavior....
9 Pages (2250 words) Dissertation

Ethics Review Procedue Assignment 1

Ethics has been an important part of organizations in the contemporary environment where differences in culture significantly determine individuals' conduct and behavior.... This paper addresses health insurance policy fraud in the novel, “Rainmaker” in order to find avenues for developing ethical review decisions.... Health insurance policy is a contract between insurers and the insured that in the event insured falls sick all medical bills are paid by the insurer....
4 Pages (1000 words) Essay

How Code of Ethics Shape Behaviour within an Organisation

Many firm use ethics code and code of conduct interchangeably to influence how employees behave within the organisation and how they perform various tasks on behalf of the firm.... Code of ethics may be referred to as formal documentation of acceptable and ethical behaviour or conduct within an organisation.... It shows workers about acceptable behaviour standards in the organisation and how to meet such expectations....
4 Pages (1000 words) Coursework

Acceptable Use Policy & Security Audit

acceptable use Policy (AUP) refers to rules which are set by a manager of a given network or service which restricts access in which the system is used.... By the use of the acceptable use Policy & Security Audit acceptable use Policy (AUP) refers to rules which are set by a manager of a given network or service which restricts access in which the system is used.... New members are supposed to sign this policy before… AUP are supposed to be clear and cover so many points in regard to users, what and not they are allowed to do in regard to the IT systems....
2 Pages (500 words) Essay

Acceptable Use Policy & Security Audit

In the paper “acceptable use Policy & Security Audit” the author looks at the acceptable use Policy (AUP) policy, which usually applied to those persons intending to use IT resources owned by an entity.... hellip; The author states that notably, only the owner of internet resource data (so known by the federal law) can change the policies governing the accessibility of IT resources governed by the policy.... For instance, in the case where the college is the IT resources and internet owner, the college's authorized personnel is at liberty to change the policy....
2 Pages (500 words) Essay

Anti Social Behavior

This paper "Anti Social behavior" discusses anti-social behavior that means different things to different people; however, it is generally viewed as behavior that is a forerunner to criminal acts.... One of the steps taken by the Government is the introduction of the Anti-Social behavior Act of 2003.... hellip; Taking a stand against anti-social behavior” (www.... k), Home Secretary David Plunkett emphasized that there was a need for a tough approach to anti-social behavior so that when people break the rules, there are consequences which are “swift, proportionate” and which will “change the pattern of their behavior....
8 Pages (2000 words) Case Study

The House I Live In War on Drug

It also gives a glimpse of how people's behavior can change from being conformists to deviants over time.... The inmate noted that the trade is associated with deviance social behavior as it involves a violation of noble human values and shared social norms that lead to unforgiving lifestyle....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us