StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Acceptable Use Policy & Security Audit - Essay Example

Cite this document
Summary
Acceptable Use Policy (AUP) refers to rules which are set by a manager of a given network or service which restricts access in which the system is used. AUP form an integral part of information security policies (Harriett 37). New members are supposed to sign this policy before…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Acceptable Use Policy & Security Audit
Read Text Preview

Extract of sample "Acceptable Use Policy & Security Audit"

Acceptable Use Policy & Security Audit Acceptable Use Policy (AUP) refers to rules which are set by a manager of a given network or service which restricts access in which the system is used. AUP form an integral part of information security policies (Harriett 37). New members are supposed to sign this policy before giving them access to information systems. AUP are supposed to be clear and cover so many points in regard to users, what and not they are allowed to do in regard to the IT systems.

In case it is not detailed, it should always refer to a comprehensive policy. By the use of the policy, it gives one the mandate to access what it is and to secure what is not in the policy (Harriett 97). In a sense, AUP provides a way to carry out things in an organization’s information systems. Any unacceptable behavior that is not outlined in the AUP is liable to lawful action. Part II: Security AuditIn conducting a security audit in my computer, I am currently using Windows 7. I have not conducted any OS updates in the past 3 weeks.

In addition, there are some software application updates, like You Tube downloaders, IDM, which I have not conducted an update to date. I use the Firefox browser version 3.2 in my computer, a version which is already outdated and would require update to a recent version (Harriett 63). I usually use a registered Kaspersky antivirus, though it is seems that is has not been updated for the past 1 month. I usually used the antivirus to conduct a full system scan on my computer, which it always eliminates most of the viruses.

My computer has the admin and user account. Admin is for me and is password protected while the user account does not have a password and any one can use it (Harriett 89). The security level of the user accounts does not exist. It is only in the administrator side that my security level on my crucial files is good. Firewall is always enabled to prevent entry of unknown viruses and trojans in to my computer (Harriett 67). Currently I have a screen saver, though it does not require a password to clear it.

Works CitedHarriett Capron, J. A. Johnson. Computers: And Explore IT Lab with Internet Guide. New York: Prentice Hall PTR, 2014.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 words - 1. Retrieved from https://studentshare.org/information-technology/1670940-acceptable-use-policy-security-audit
(Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words - 1)
Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words - 1. https://studentshare.org/information-technology/1670940-acceptable-use-policy-security-audit.
“Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/information-technology/1670940-acceptable-use-policy-security-audit.
  • Cited: 0 times

CHECK THESE SAMPLES OF Acceptable Use Policy & Security Audit

Acceptable Use and Behavior Policy

To protect confidential information and its financial interests, the company has adopted a number of acceptable use and behavior policies that not only enable it to mitigate the threats but also allow the employees to flexibly conduct their daily businesses without affecting the productivity.... The audit policy item employed by Firion Corporation is primarily designed to guide the security team to audit the company's infrastructure system and mitigate the potential vulnerabilities....
3 Pages (750 words) Essay

Best Practices for Network Security is the Topic

Along with the creation of usage policy statements, a company should create a partner acceptable use statement providing partners with an understanding of the information that they have, the conduct of the company's employees, and the expected disposition of the information available to them.... The final aspect in this regard is the establishment of an administrator acceptable use statement in explaining the rules and procedures for privilege review, policy enforcement, and user account administration....
11 Pages (2750 words) Essay

The Effective Manager

In order to evaluate the statement that how does the understanding of accounting and financial management contribute to effective security management, one has to learn the whole process and implications of effective security managements and its linkages to the accounting and financial knowledge.... hellip; security policies are the foundation of the effective security management.... Without them, one cannot protect the company from possible lawsuits, lost revenue, and bad publicity, not to mention basic security attacks....
9 Pages (2250 words) Assignment

Computer Glossary - Internal and External LAN

Without dedicated networks to clients, and because there would be unacceptable security risks in managing client VPN access to the office LAN, it has been proposed that all networked services outside the office LAN will be managed on a separate machine running a Linux (or Ix) OS.... Therefore, certain measures must be taken in order to ensure data security.... Firewall technology is one feature of database security.... use the Universal Group model....
13 Pages (3250 words) Essay

Issues in Information Assurance Policy

But the most important among its functions concern the treats to security which could come from many different areas including – but not limited to – intentional attacks and also from unintended acts that result from technical, organizational and individual mistakes.... It is natural and necessary for organizations to act in its best An Information Assurance (IA) policy is one of the mechanisms that an organization could use in order to achieve this.... This paper will examine the issues in formulating such policy, including an overview of what IA is, the threats it aims to address, the ethics of developing certain rules that concerns rights issues, among other related variables....
8 Pages (2000 words) Term Paper

Risk Management and Control Effectiveness

Management of information security is vital in every organization as it ensure security of information, systems infrastructure and data content being processed, accessed, managed and communicated to the public.... This paper answers seven questions in relation to effectiveness of… According to Oppliger (2003), management of information security in organizations is very vital as it ensures that the security of information is This paper answers seven questions in relation to effectiveness of security technologies and methodology, risks related to them, additional controls, and access of technology within organizations....
6 Pages (1500 words) Essay

Enterprise Security Policy Plan for MEMATECH Solutions Limited

The paper "Enterprise security Policy Plan for MEMATECH Solutions Limited " states that MemaTech is required to embrace the security requirements of the policy in addition to federal law, contractual obligations, and state law where the IT resources and Information assets are subject.... hellip; The company is required to install, configure, implement, and test the discovery software for security provisions to reduce the effect to processes or systems from the impact of major failures of Information Technology Resources through the continuation of operations plan and plan for disaster recovery....
5 Pages (1250 words) Case Study

Audit and Control Security Technology

This case study "audit and Control Security Technology" analyzes audit and control security technology used in banks as well as the aspects attributed to the technology.... The document below analyzes audit and control security technology used in banks as well as the aspects attributed to the technology.... The audit and control technology, however, has been initiated by experts with the latest technology.... With an effective security technology, the banks are capable of withstanding the threats, keeping its systems safe....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us