Question

In: Computer Science

An ISSP (issue-specific security policy) is "an organizational policy that provides detailed, targeted guidance to instruct...

An ISSP (issue-specific security policy) is "an organizational policy that provides detailed, targeted guidance to instruct all members of the organization in the use of a resource, such as one of its processes or technologies." Assignment is: Develop an ISSP policy that addresses the following: Use of Internet. All writing must include proper grammar, spelling, punctuation and citations.

Please use proper grammar, spelling and punctuation. Cite references.
write in your own words.

Solutions

Expert Solution

Solution:-

Issue-SpecificSecurity Policy (ISSP) addressing the use of the Internet:

* The Internet usage by a company's employees, their family members, or others on company-owned or issued computers, laptops, devices, mobile devices such as mobile phones, smartphones, tablets, etc., for accessing, streaming, listening to, watching, downloading, web-based files, applications, audios, videos, images, photos, games, etc., which would clearly violate the ISSP.
* More specifically, what business email service should and should not be used for when using the company provided Internet connection or the employee's own Internet connection but, on the company provided-computer, or both, the Internet and the computer provided by the company, where email is part of the Internet service.
* How employees may or may not use company-issued Internet.
* What employees can and cannot do with personal equipments, devices, computers, etc., accessing company Wi-Fi or the LAN.
* If employees may or may not connect their personal devices to the company's network or company providing Internet services.
* Who has access to the Internet.
* Prohibitions against hacking on the Internet.
* Overall, it is about company-owned and issued networks and the Internet connection or services usages.
* It should address the issue of fair and responsible use of the Internet.
* Many different problems and potential unethical practices that must be taken into consideration when using the Internet.
* It defines the manner or the way in which the Internet is used.
* What effects do Internet-based business services or the work have on employees or the users in that particular field, business, sector, and industry.
* How one assures the Internet services provided are appropriately used.
* How confident one can be negative effects are not experienced by the Internet services recipients or users.
* How abled are the users to effectively and ethically use the Internet in the field or industry they are using it.
* It includes information and guidelines about records of electronic communications.
* Guidelines about safety and confidentiality.
* Alerts and guidelines about saved information.
* Electronic transfer of customer, consumer, or client information.
* Guidelines about the security of websites.
* Disclosure of one's professional identification.
* Guidelines on verification and disclosure of client, customer, or consumer identification through video conferencing, code words, numbers, or graphics.
* Guidelines on the agreements made related to client waiver.
* Guidelines on the privacy of information.
* Guidelines on secured sites.
* Guidelines on non-secure websites..

Thank you Sir....!


Related Solutions

17. What is an issue-specific security policy?
17. What is an issue-specific security policy? 18. List the critical areas covered in an issue-specific security policy. 19. What is a systems-specific security policy? 20. When is a systems-specific security policy used?
Using the framework presented in this chapter, draft a sample issue-specific security policy for an organization.
Using the framework presented in this chapter, draft a sample issue-specific security policy for an organization. At the beginning of your document, describe the organization for which you are creating the policy and then complete the policy using the framework.
Ricky obtains an insurance policy from Security Insurance, Inc. The policy provides that on Ricky’s death...
Ricky obtains an insurance policy from Security Insurance, Inc. The policy provides that on Ricky’s death Security will pay $500,000 to Tori, Ricky’s spouse and beneficiary. This is a. ?disability insurance. b. ?life insurance. c. ?health insurance. d. ?key-person insurance.
WEEK 1: GOOD COMPONENTS OF A SECURITY POLICY What are good components of an organizational information...
WEEK 1: GOOD COMPONENTS OF A SECURITY POLICY What are good components of an organizational information security policy? What are some areas that you think should be addressed? What are some obstacles that keep organizations from having a well thought-out security policy? How can they be overcome?
choose a specific issue or policy that has direct or indirect impact on the environment. The...
choose a specific issue or policy that has direct or indirect impact on the environment. The nature of the impact on the environment can be either positive or negative. You can also comparing two different policies or suggest a new policy to address environmental problems and analyze pros and cons of that particular policy. write a brief research paper (4-5 pages) You need to provide trustworthy references to support the data or information used in the paper.
Search the Web for examples of issue-specific security policies. What types of policies can you find?...
Search the Web for examples of issue-specific security policies. What types of policies can you find? Using the format provided in this chapter, draft a simple issue-specific policy that outlines fair and responsible use of computers at your college, based on the rules and regulations of your institution.      Consider the following Policies at university of Sharjah: Policy Statement User Responsibility General Computer Usage Internet Use Electronic Mail Authorized Access and Usage of Equipment Systems Management Violations of Policy Limitations...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT