Question

In: Accounting

What principles should the information security analyst apply in order to develop appropriate acceptable use policies...

What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure to address confidentiality, integrity, and availability of information. Answer the following please;

  • What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable?
  • What should users generally be prohibited from doing with their computing and network resources? When and why would each example require prohibition?
  • When and why should users be aware of acceptable use policies and how can organizations keep track of these policies?

Solutions

Expert Solution


Related Solutions

Develop, assess, and document security policies, practices, and procedures?
A-2 Develop, assess, and document security policies, practices, and procedures?C-1 Identify and assess current and anticipated security risks and vulnerabilities?C-2 Evaluate current and emerging tools and technologies?
Develop a process to assess the security posture of the service provider. What security requirements should...
Develop a process to assess the security posture of the service provider. What security requirements should your organization have? Define security requirements in a cloud-based environment that should be part of your standard.
For Aira, discuss what the appropriate security and controls should be for the device
For Aira, discuss what the appropriate security and controls should be for the device, for a smart phone app that reads the device, and for a web site where device readings can be stored and shared with medical personal. Note: Your device may not currently support all three of these options. If not, assume that such enhancements have been made for the device/system.
For Apple watch, discuss what the appropriate security and controls should be for the device, for...
For Apple watch, discuss what the appropriate security and controls should be for the device, for a smart phone app that reads the device, and for a web site where device readings can be stored and shared with medical personal.   Note: Your device may not currently support all three of these options. If not, assume that such enhancements have been made for the device/system.
How often should IT security policies be reviewed within an organization? What is the impact if...
How often should IT security policies be reviewed within an organization? What is the impact if these policies are not reviewed on a regular basis?
IN 200 WORDS OR MORE Explain the ethical use of information technology in order to develop...
IN 200 WORDS OR MORE Explain the ethical use of information technology in order to develop competitive intelligence. Give an example
what are the more appropriate policies that the government might use to attract US companies to...
what are the more appropriate policies that the government might use to attract US companies to produce in the United States instead of overseas?
What is an organizational profile? What should the process be to develop the profile? What information...
What is an organizational profile? What should the process be to develop the profile? What information will you include, and where will you get your information? How will you utilize the information?
What kind of policies should central banks use to prevent crises?
What kind of policies should central banks use to prevent crises?
What is your understanding of what are policies What is your opinion of analyst skillsets ?
What is your understanding of what are policies What is your opinion of analyst skillsets ?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT