Free

Acceptable Use Policy & Security Audit - Essay Example

Comments (0) Cite this document
Summary
Acceptable Use Policy (AUP) refers to rules which are set by a manager of a given network or service which restricts access in which the system is used. AUP form an integral part of information security policies (Harriett 37). New members are supposed to sign this policy before…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Acceptable Use Policy & Security Audit
Read TextPreview

Extract of sample "Acceptable Use Policy & Security Audit"

Acceptable Use Policy & Security Audit Acceptable Use Policy (AUP) refers to rules which are set by a manager of a given network or service which restricts access in which the system is used. AUP form an integral part of information security policies (Harriett 37). New members are supposed to sign this policy before giving them access to information systems. AUP are supposed to be clear and cover so many points in regard to users, what and not they are allowed to do in regard to the IT systems. In case it is not detailed, it should always refer to a comprehensive policy. By the use of the policy, it gives one the mandate to access what it is and to secure what is not in the policy (Harriett 97). In a sense, AUP provides a way to carry out things in an organization’s information systems. Any unacceptable behavior that is not outlined in the AUP is liable to lawful action.
Part II: Security Audit
In conducting a security audit in my computer, I am currently using Windows 7. I have not conducted any OS updates in the past 3 weeks. In addition, there are some software application updates, like You Tube downloaders, IDM, which I have not conducted an update to date. I use the Firefox browser version 3.2 in my computer, a version which is already outdated and would require update to a recent version (Harriett 63). I usually use a registered Kaspersky antivirus, though it is seems that is has not been updated for the past 1 month. I usually used the antivirus to conduct a full system scan on my computer, which it always eliminates most of the viruses.
My computer has the admin and user account. Admin is for me and is password protected while the user account does not have a password and any one can use it (Harriett 89). The security level of the user accounts does not exist. It is only in the administrator side that my security level on my crucial files is good. Firewall is always enabled to prevent entry of unknown viruses and trojans in to my computer (Harriett 67). Currently I have a screen saver, though it does not require a password to clear it.
Works Cited
Harriett Capron, J. A. Johnson. Computers: And Explore IT Lab with Internet Guide. New York: Prentice Hall PTR, 2014. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 words - 1. Retrieved from https://studentshare.org/information-technology/1670940-acceptable-use-policy-security-audit
(Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words - 1)
Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words - 1. https://studentshare.org/information-technology/1670940-acceptable-use-policy-security-audit.
“Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/information-technology/1670940-acceptable-use-policy-security-audit.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Acceptable Use Policy & Security Audit

Information Security Audit And Assurance

...). Fundamentals of error-correcting codes. Cambridge: Cambridge University Press. MSDN. (2012, March 20). Regulatory Compliance Demystified: An Introduction to Compliance for Developers. Retrieved November 23, 2012, from MSDN: http://msdn.microsoft.com/en-us/library/aa480484.aspx Rainer, R. K., & Casey, G. C. (2011). Introduction to information systems. New Jersey: Wiley and sons. Richard, A. G., & Lawless, M. W. (1994). Technology and strategy: conceptual models and diagnostics. . us: Oxford University Press. Richard, E. C. (2007). Auditor's Guide to Information Systems Auditing. New Jersey: Wiley. Ruskwig. (2012). Security Policy. Retrieved November 22,...
13 Pages(3250 words)Essay

Acceptable Use and Behavior Policy

...without affecting the productivity. This paper discusses the physical security policy, vulnerabilities, audit policy, log management, system administrator policies as well as the various security incident handling procedures at Firion Company. Physical security policy item Firion has implemented a number of physical security policies that are primarily aimed at improving the integrity and confidentiality of the information systems that are used in the company. One of the physical security policies that is the prohibition...
3 Pages(750 words)Essay

Corporate Acceptable Use Policy

The paper intends to discuss the purpose of the Acceptable Use Policy (AUP) developed by AT&T for its employees. The Purpose of an Acceptable Use Policy An Acceptable Use Policy is a collection of particular rules and policies which are implemented by the network and websites managers in order to enact certain restrictions regarding the utilization of available websites and networks. Most of the times, AT&T is found to be committed to obeying the government rules and regulations regarding the utilization of online sources, e-mail transmission and text messaging. The company always focuses on protecting the AT&T’s network and its online sources without getting interferences from the hands of the other users. In or...
5 Pages(1250 words)Case Study

Security Audit

...? Security Audit: Lafleur Trading Company Introduction Lafleur Trading Company is a multinational concern based in Canada, dealing in wholesale of food items. As part of overall task, a security audit was conducted in respect of information systems incorporated at this organization. Security audit refers to assessment of effectiveness of information systems and internal controls implemented by the company’s management. Several ethical issues are also faced during security audits such as role ambiguity existed between our team members during audit work causing conflicts and violation of hierarchy lines at times. Also, some team members violated integrity and confidentiality assertions by disclosing information to external parties... . This...
3 Pages(750 words)Essay

The Importance of Setting Course Goals and Learning Objectives

9 Pages(2250 words)Assignment

S6W4PAPER1

7 Pages(1750 words)Research Paper

Urban futures: Field trip design and conduct (Mobility)

2 Pages(500 words)Essay

Company Policy on Acceptable Use of Email and Text Messaging

... Company Policy on Acceptable Use of Email and Text Messaging Receive our warm greetings. This is a reminder about components of the company’s policy on acceptable use of email and text messaging. It emphasizes the components of security, privacy and company monitoring of messages. The memo shall also consider other policies that connect with the aforementioned policy. These policies regard appropriate message content, consequences for using company equipment to send harassing messages and use of company system for sending personal email messages. You are reminded that the policy discourages employees from intentionally causing any security breach to the company’s and any other networks. Always recall that the policy’s provision... that...
1 Pages(250 words)Assignment

Acceptable Use Policy & Security Audit

...Acceptable use policy and general objective For a fair, acceptable and responsible use of IT, there should be a lot of secrecy and individual privileges. All the daily users of computer and network, are expected to adhere and obey the use secrecy and others rights. This should not be violated in any circumstances. The files, data and programs of others should be used without their consent. People using the various networks and computer systems should not intimidate, insult, deform and threaten other users is not permitted. This might lead to disciplinary action through legal suits. Users have the right...
2 Pages(500 words)Essay

Acceptable Use Policy & Security Audit

...no. Acceptable Use Policy & Security Audit Part I: Acceptable Use Policy (AUP) The Acceptable Use Policy (AUP) policy usually applied to those persons intending to use IT resources owned by an entity. Computer resources herein applies to hardware and software, smart phones, PDAs, data network, and stored data among others. Notably, only the owner of internet resource data (so known by the federal law) can change the policies governing the accessibility of IT resources governed by the...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Acceptable Use Policy & Security Audit for FREE!

Contact Us