Aim:
The goal of this assignment is to explore Security Policies in an IT environment. As a basis for this assignment the company can be a University or college and the policy should be designed with an educational role in mind that fits with the company role.
I will need to develop Security Policies that define acceptable usage of IT infrastructure under the following heading:
Topics:
A).Computer Desktop Security Policy.
1-what is user allowed to do?
2-what is user not allowed?
3-what is the consequences in both situations above?
4-what is the best practice?
B).Email Security Policy.
1-what is user allowed to do?
2-what is user not allowed?
3-what is the consequences in both situations above?
4-what is the best practice?
C).Remote Access Policy.
1-what is user allowed to do?
2-what is user not allowed?
3-what is the consequences in both situations above?
4-what is the best practice?
Each policy should define what is permitted usage, what is not permitted and the consequence of unauthorised use of the IT equipment.
Notice:
1.It is important to be sources from the Internet and Books.
2.Make sure each full page has a subtitle (existing above.. A,B,C).
3.Make sure it is not copied.
Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.
[order_calculator]