In: Computer Science
INTERNET USE Security Policies / Enterprise Security Strategy Plan
Instructions: In NO LESS than 200 words, answer the following question.
Create an outline that could serve as a template for creating future security policies for an IT Network's Internet Use. Your template should reflect2–3 key parts of a security policy related to intranet operations.
For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from an actual security policy from a company; however,ORIGINAL WORK IS A MUST.
The following are suggestions of items to consider as key parts of a security policy:
Threat
Policy statement
Responsibilities
Guidelines and user procedure
Information technology procedures
Compliance and enforcement
Internet Usage:
As, we know that in the era of internet there is sudden requirement of technologies that are dependent on the internet. With the power of internet we become more vulnerable and there becomes the need of security. Maintainence of the internet and it's services becomes one of the most important things.
Threats:
Policy statement:
Responsibilities:
Hence, this is how the use of internet must be monitored and used according to the policies which must be maintained and used accordingly.