Security Policies in an IT environment

Aim:

The goal of this assignment is to explore Security Policies in an IT environment. As a basis for this assignment the company can be a University or college and the policy should be designed with an educational role in mind that fits with the company role.

I will need to develop Security Policies that define acceptable usage of IT infrastructure under the following heading:

Topics:

A).Computer Desktop Security Policy.
1-what is user allowed to do?
2-what is user not allowed?
3-what is the consequences in both situations above?
4-what is the best practice?

B).Email Security Policy.
1-what is user allowed to do?
2-what is user not allowed?
3-what is the consequences in both situations above?
4-what is the best practice?

C).Remote Access Policy.
1-what is user allowed to do?
2-what is user not allowed?
3-what is the consequences in both situations above?
4-what is the best practice?

Each policy should define what is permitted usage, what is not permitted and the consequence of unauthorised use of the IT equipment.

Notice:
1.It is important to be sources from the Internet and Books.
2.Make sure each full page has a subtitle (existing above.. A,B,C).
3.Make sure it is not copied.

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]