In: Accounting
What principles should the information security analyst apply in
order to develop appropriate acceptable use policies...
What principles should the information security analyst apply in
order to develop appropriate acceptable use policies for the
client? Make sure to address confidentiality, integrity, and
availability of information. Answer the following please;
- What should users generally be allowed to do with their
computing and network resources? When and why would each example be
allowable?
- What should users generally be prohibited from doing with
their computing and network resources? When and why would each
example require prohibition?
- When and why should users be aware of acceptable use
policies and how can organizations keep track of these
policies?