Question

In: Computer Science

INTERNET USE Security Policies / Enterprise SecurityStrategy PlanInstructions: In NO LESSthan 200 words,...

INTERNET USE Security Policies / Enterprise Security Strategy Plan

Instructions: In NO LESS than 200 words, answer the following question.

Create an outline that could serve as a template for creating future security policies for an IT Network's Internet Use. Your template should reflect2–3 key parts of a security policy related to intranet operations.

For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from an actual security policy from a company; however,ORIGINAL WORK IS A MUST.

The following are suggestions of items to consider as key parts of a security policy:

Threat

Policy statement

Responsibilities

Guidelines and user procedure

Information technology procedures

Compliance and enforcement

Solutions

Expert Solution

Internet Usage:

As, we know that in the era of internet there is sudden requirement of technologies that are dependent on the internet. With the power of internet we become more vulnerable and there becomes the need of security. Maintainence of the internet and it's services becomes one of the most important things.

Threats:

  • There are certain people in this world who are willing to perform malicious activities in order to make technical people lose faith over the technology so they try to attack and gain from people who don't have much knowledge.
  • The threats that gather the knowledge are as follows:
    • Malware
    • Computer Virus
    • Trojan Horse
    • Spywares
    • Worms
    • Botnets
    • Spam
    • Phishing
    • Rootkits

Policy statement:

  • One must not send or post harassing, threatening messages,images or videos on the internet or with any corporate services.
  • Using computers in order to fraud people is also prohibited.
  • Hacking into unauthorized websites is also unacceptable.
  • Sharing confidential materials or trade information which does not belong to you is also unacceptable.

Responsibilities:

  • The responsibility of an person using internet is to be safe and use it for good purposes and to benefit oneself and the world.
  • Securing the system with good connection and making the right selections while handling the internet is must so that no harm is done to anyone.

Hence, this is how the use of internet must be monitored and used according to the policies which must be maintained and used accordingly.


Related Solutions

E-MAIL Security Policies / Enterprise Security StrategyPlanInstructions: In NO LESSthan 200 words, answer...
E-MAIL Security Policies / Enterprise Security Strategy PlanInstructions: In NO LESS than 200 words, answer the following question.Create an outline that could serve as a template for creating future security policies for an IT Network's E-MAIL functionality. Your template should reflect 2–3 key parts of a security policy related to intranet operations.For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from...
APPLICATION Security Policies / Enterprise SecurityStrategy PlanInstructions: In NO LESSthan 200 words, answer...
APPLICATION Security Policies / Enterprise Security Strategy PlanInstructions: In NO LESS than 200 words, answer the following question.Create an outline that could serve as a template for creating future security policies for an IT Network's Applications. Your template should reflect2–3 key parts of a security policy related to intranet operations.For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from an actual...
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words,...
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words, answer the following question. Create an outline that could serve as a template for creating future security policies for an IT Network's Access Controls. Your template should reflect 2–3 key parts of a security policy related to intranet operations. For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want...
write an essay about J2EE Security? 200 words what is sql injection in 200 words?
write an essay about J2EE Security? 200 words what is sql injection in 200 words?
Describe essential items in a.NET security guidelines in 150-200 words. Use Microsoft .NET security page, OWASP...
Describe essential items in a.NET security guidelines in 150-200 words. Use Microsoft .NET security page, OWASP GitHub page, and any other authoritative resources you find.
Audits and Compliance / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer...
Audits and Compliance / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer the following question. Compare and contrast audits and assessments. •Pick at least 3 things that are the same and 3 things that are different. •Compare the goals, the timing, and the roles that are involved.
Implementation, Operations, and Monitoring / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words,...
Implementation, Operations, and Monitoring / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer the following question. Regarding the implementation of a security plan, this can be anything from the organizational change management aspects (users) or the technical implementation (information technology staff),Select 2 key areas to either engage in the normal, everyday operations of a security team, or 2 key areas to monitor, and why. Describe and evaluate each key area. 200 words requirement for each.
in 200 words !! Discuss how you distinguish nutrition information from misinformation--on the Internet and in...
in 200 words !! Discuss how you distinguish nutrition information from misinformation--on the Internet and in the news.
Discuss the fiscal and monetary policies implemented by Malaysia since the Covid-19 outbreak. 200 words
Discuss the fiscal and monetary policies implemented by Malaysia since the Covid-19 outbreak. 200 words
Describe the relationship between annual objectives and policies. Your response should be at least 200 words...
Describe the relationship between annual objectives and policies. Your response should be at least 200 words in length.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT