StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Acceptable Use Policy & Security Audit - Essay Example

Cite this document
Summary
In the paper “Acceptable Use Policy & Security Audit” the author looks at the Acceptable Use Policy (AUP) policy, which usually applied to those persons intending to use IT resources owned by an entity. Computer resources herein apply to hardware and software, smartphones, PDAs, data network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Acceptable Use Policy & Security Audit
Read Text Preview

Extract of sample "Acceptable Use Policy & Security Audit"

The policy has numerous advantages including governing the traffic into the IT resources or data. Such traffic monitoring is often intended towards reducing network congestion and preventing chances of performance degradation. The owner of the policy is usually responsible for the users’ behaviors on the computers; therefore, anyone who is not authorized to the network cannot use the same. This notes that anyone accessing such computers without the full authority of the owner constitutes ill behavior to the policy.

For instance, using someone’s name to access the resources and changing the access code among others. In other words, private computers cannot be used in such a computer network system. Those who violate AUP are liable to numerous disciplinary actions where each action taken depends on the degree of the offense and the relationship between the offender and the policy owner (Wright, Freedman, and Liu 220). For instance, if the violation is reported in learning institutions, the culprit may lose the institution’s computer privileges as well as facing possible termination, suspension, or expulsion from the institution.

In some cases, such violation may lead to jail terms. Part II: Security Audit Audit ResultAction/reason Are there any OS updates not installed?Yes Is done to allow effective operation and function of the computer Are there any software application updates not installed? Java, or Other Browsers?browsers Is anti-virus software installed, enabled/active, and up to date?Yes To protect the computer from virus attacks; thus, leading to malfunction Does a full-system scan with your anti-virus software find any viruses?

Yes To check and delete any possible attackIs there a user account for each person using the computer?YesTo protect my personal data from other computer users and reduce interferences with the administrator Are user accounts password protected?The only administrator is password protected This is to allow another user to access the computer through a guest accountEvaluate the security level of all user accounts. Are those listed as an "administrator" acceptable to you?Yes They can do so since they have the password of the adminIs the firewall enabled?

Yes Is the screen saver configured? Does the screen saver require a password to clear it?The screen saver is configured but it does not require a password to clearAre all your passwords (computer systems and online) considered "strong?"Yes They are strong to discourage guess works that may lead to access to the computer Work CitedWright, Craig, Brian Freedman, and Dale Liu. The It Regulatory and Standards Compliance Handbook: [how to Survive an Information Systems Audit and Assessments]. Burlington, MA: Syngress Pub, 2008.

Internet resource.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 words, n.d.)
Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 words. https://studentshare.org/information-technology/1671002-acceptable-use-policy-security-audit
(Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words)
Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1671002-acceptable-use-policy-security-audit.
“Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/information-technology/1671002-acceptable-use-policy-security-audit.
  • Cited: 0 times

CHECK THESE SAMPLES OF Acceptable Use Policy & Security Audit

Acceptable Use and Behavior Policy

To protect confidential information and its financial interests, the company has adopted a number of acceptable use and behavior policies that not only enable it to mitigate the threats but also allow the employees to flexibly conduct their daily businesses without affecting the productivity.... The audit policy item employed by Firion Corporation is primarily designed to guide the security team to audit the company's infrastructure system and mitigate the potential vulnerabilities....
3 Pages (750 words) Essay

Best Practices for Network Security is the Topic

Along with the creation of usage policy statements, a company should create a partner acceptable use statement providing partners with an understanding of the information that they have, the conduct of the company's employees, and the expected disposition of the information available to them.... The final aspect in this regard is the establishment of an administrator acceptable use statement in explaining the rules and procedures for privilege review, policy enforcement, and user account administration....
11 Pages (2750 words) Essay

The Effective Manager

In order to evaluate the statement that how does the understanding of accounting and financial management contribute to effective security management, one has to learn the whole process and implications of effective security managements and its linkages to the accounting and financial knowledge.... hellip; security policies are the foundation of the effective security management.... Without them, one cannot protect the company from possible lawsuits, lost revenue, and bad publicity, not to mention basic security attacks....
9 Pages (2250 words) Assignment

Computer Glossary - Internal and External LAN

Without dedicated networks to clients, and because there would be unacceptable security risks in managing client VPN access to the office LAN, it has been proposed that all networked services outside the office LAN will be managed on a separate machine running a Linux (or Ix) OS.... Therefore, certain measures must be taken in order to ensure data security.... Firewall technology is one feature of database security.... use the Universal Group model....
13 Pages (3250 words) Essay

Issues in Information Assurance Policy

But the most important among its functions concern the treats to security which could come from many different areas including – but not limited to – intentional attacks and also from unintended acts that result from technical, organizational and individual mistakes.... It is natural and necessary for organizations to act in its best An Information Assurance (IA) policy is one of the mechanisms that an organization could use in order to achieve this.... This paper will examine the issues in formulating such policy, including an overview of what IA is, the threats it aims to address, the ethics of developing certain rules that concerns rights issues, among other related variables....
8 Pages (2000 words) Term Paper

Risk Management and Control Effectiveness

Management of information security is vital in every organization as it ensure security of information, systems infrastructure and data content being processed, accessed, managed and communicated to the public.... This paper answers seven questions in relation to effectiveness of… According to Oppliger (2003), management of information security in organizations is very vital as it ensures that the security of information is This paper answers seven questions in relation to effectiveness of security technologies and methodology, risks related to them, additional controls, and access of technology within organizations....
6 Pages (1500 words) Essay

Enterprise Security Policy Plan for MEMATECH Solutions Limited

The paper "Enterprise security Policy Plan for MEMATECH Solutions Limited " states that MemaTech is required to embrace the security requirements of the policy in addition to federal law, contractual obligations, and state law where the IT resources and Information assets are subject.... hellip; The company is required to install, configure, implement, and test the discovery software for security provisions to reduce the effect to processes or systems from the impact of major failures of Information Technology Resources through the continuation of operations plan and plan for disaster recovery....
5 Pages (1250 words) Case Study

Audit and Control Security Technology

This case study "audit and Control Security Technology" analyzes audit and control security technology used in banks as well as the aspects attributed to the technology.... The document below analyzes audit and control security technology used in banks as well as the aspects attributed to the technology.... The audit and control technology, however, has been initiated by experts with the latest technology.... With an effective security technology, the banks are capable of withstanding the threats, keeping its systems safe....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us