Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Drexel antivirus software

20/04/2021 Client: muhammad11 Deadline: 2 Day

I need help with edit my paper based on my professor's recommendation. The instruction said must be based on facts you discovered in analyzing the policy against respective framework. I need to add a two page analysis section on my paper compare to the sample one. I've attached the example and please write a similar analysis part on my paper. The first attachment is the example and the second one is my paper.Villanova University’s Employee Acceptable Use Policy Team E: Matthew J. Dampf, Felice Walden, Natalie Dorely, Xinyi Mao Executive Summary The policy being audited is Villanova University’s Employee Acceptable Use Policy for their computing environment. We will evaluate the policy based on a risk assessment where we will identify risk to the university, find vulnerabilities that can be exploited, explore root causes and determine some corrective actions that can be taken to mitigate these risks wherever possible. The acceptable use policy governs employee use of technology and does a good job addressing certain high risk areas. It prevents employee sharing of passwords, addresses behavior such as bullying and hate speech and forbids the use of university resources for personal financial gain. Some risk areas are addressed, though inadequately. The policy requires the use and updating of antivirus software, but leaves the updating to the end user. In addition, the policy requires that non-OS software is patched to secure versions, but it leaves the installation and updating to end users. Such policy put into action would require end users to have full administrator access to their PCs. This creates several high risk scenarios that we’ll explore deeper in this report along with controls that can be put into place to mitigate the risk. Other risk areas are not addressed at all. It is common for other universities to include language in their acceptable use policies addressing the ability of one user to cause network performance issues or to sniff traffic, which could cause a loss of confidentiality of data. Villanova’s policy does not address either of these scenarios. It also does not include language forbidding employees to attempt to bypass other controls that are in place. These should be included in future revisions to this policy. The policy was approved by the VP & CIO in November of 2015 along with the University Council for Information Technology. It is currently at version 1.0. It’s not clear what the update and reapproval schedule is, but it is clear that Villanova is already falling behind in this area. Background Villanova University is an institute of higher learning just outside Philadelphia with roughly 11,000 students, 600 faculty and about 2000 administrative staff. Those 2,000 administrative staff are the people who are subject to the policy. This is an important policy to audit because these employees have access to highly confidential personal data, some of which is subjected to FERPA compliance laws. Analysis The policy consists of 11 main points. Most of those points are written in a way that sufficiently addresses the risk described in the policy. However, we did find some gaps in the policy that point to wider control gaps in their computing environment. Point 5 in the policy, says that antivirus must be installed and kept up to date, which is a standard control, but may be implemented in an ineffective way here. And point 6, specifies that while the university will update a user’s operating system, the user is responsible for updating all of their other applications. Above: partial screenshot of policy The second bullet point specifies that IT is responsible for OS patches, which is good, but it doesn’t specify this for the antivirus/anti-malware portion of the policy. This strongly implies that users are responsible for their own antivirus updates. The policy explicitly mentions that users are responsible for their own application updates. This leaves us with two major issues: 1. Having users responsible for their own updates is a control gap because many users will not perform these updates, leading to security vulnerabilities. 2. The installation and updating of applications will require users to have administrative privileges on their PCs. Users having full administrative access creates many risks. Discussion Risk Assessment Risk Rating Impact Introduction of malware onto the network High High Use of illegal/unlicensed software High High Network Insecurity High High Other controls are bypassed High High Network Performance degradation Low Low Policy becomes outdated/irrelevant Low Moderate The first one you see on the chart here is the introduction of malware onto the network. Although the policy says that antivirus must be installed and kept up to date, by leaving this responsibility up to the users this leaves the university open to the possibility that some users don’t update. With 2000 users,

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Ideas & Innovations
Essay Writing Help
Finance Homework Help
Best Coursework Help
Premium Solutions
Quality Assignments
Writer Writer Name Offer Chat
Ideas & Innovations

ONLINE

Ideas & Innovations

Give me a chance, i will do this with my best efforts

$47 Chat With Writer
Essay Writing Help

ONLINE

Essay Writing Help

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$23 Chat With Writer
Finance Homework Help

ONLINE

Finance Homework Help

I have read your project details. I can do this within your deadline.

$21 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$43 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have read your project details. I can do this within your deadline.

$22 Chat With Writer
Quality Assignments

ONLINE

Quality Assignments

I have read your project details. I can do this within your deadline.

$49 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Rachel mcdowall street dance - Positive effects of globalization on religion - Rank sum test excel - Contar (1) contamos (2) (3) juegas (4) juegan mostrar (5) mostramos (6) (7) empiezas (8) empiezan - Caught in between hazards powerpoint - Loveless cafe sawdust pie recipe - Patient Malnutrition - MAN 111 CLASS 4 - French review and practice - Certificate 4 in telecommunications - Middle range nursing theories and evidence based practice - Midsummer night's dream synopsis - What outlanders have diamond llama - Sample church treasurer report - Expected constant growth rate formula - Parts of bunsen burner - The biggest advantage to a virtual network approach is - Deception quotes in othello - Cordon investments pty ltd v lesdor properties pty ltd summary - Counseling professional identity paper - Thermal expansion coefficient symbol - Focused exam abdominal pain shadow health - Faith without works illustration - Literary Theory Fairy Tale Assignment - Savi melody pool light problems - Are notes payable a debit or credit - Virus - CCIS - Princ of Mngmnt - DROPBOX 2 - (twice) - If 1200 cm2 of material is available - My life in you arnold zamora pdf - RESEARCH IN THE DIGITAL AGE - Intensive supervision probation, work release, and boot camps are all examples of what? - Matlab state space simulation - Can you grow vanilla beans in australia - Assumptions in qualitative research examples - Consulting - How would the accounting equation of boston company - Somerset furniture company's global supply chain - Www northampton ac uk - Is Calorie a calorie? - Classzone virtual blood typing lab answer key - Myitlab answers excel chapter 2 - 4.3 to 4.0 gpa - Social media marketing principles and strategies stephen bart pdf - Netflix company vision - Dope zebra piano sheet music - Origin of life worksheet - Describe different types of distribution channels for business documents - Infants and children prenatal through middle childhood edition - Dc shunt motor equivalent circuit - Official form 410 instructions - Conflict Managment Paper 1 - Life cycle - Advanced Operating System - Discussion on dev. productivity - 6 awg current rating - Aristotle concept of tragedy in poetics - 10a julius avenue north ryde - Full penetration on netflix 2017 - Three vectors are shown in figure - Find an initial solution to the following transportation problem - Similarities between ancient india and greece sculptures - Science practical report template - Who is forever 21 target market - London ambulance service project failure - Macbeth in act 2 - Men's men and women's women steve craig - Difference between fixed displacement pump and variable displacement pump - Chapter 17 preventative maintenance and service procedures - Alcohol - When does peak hour end perth - Week 7 - E waste moonee valley - Seismic load calculation excel as per is 1893 - What is the diameter of an nba basketball - The crucible movie characters - Sweatt v painter definition - Finance Paper - Sunnyboys icy pole for sale - Physics Essay - Organization development and change cummings and worley - American Politics - Reena mistry nail creations - 80 96 in simplest form - Construction contract management ppt - I need help!!!!! - Elementary differential equations and boundary value problems 11e pdf - Policies - Gillows of lancaster museum - What are the principles of the texas constitution - 2 short essay questions - What is science very short answer - Medibank private dividend history - Process map for making coffee - What hazard class is diesel fuel - New spirits americans in the gilded age sparknotes - The induction coil works on the principle of - Https illuminations nctm org adjustablespinner - Business cont & Disaster recovery - Fair work information statement 2021