Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Drexel antivirus software

20/04/2021 Client: muhammad11 Deadline: 2 Day

I need help with edit my paper based on my professor's recommendation. The instruction said must be based on facts you discovered in analyzing the policy against respective framework. I need to add a two page analysis section on my paper compare to the sample one. I've attached the example and please write a similar analysis part on my paper. The first attachment is the example and the second one is my paper.Villanova University’s Employee Acceptable Use Policy Team E: Matthew J. Dampf, Felice Walden, Natalie Dorely, Xinyi Mao Executive Summary The policy being audited is Villanova University’s Employee Acceptable Use Policy for their computing environment. We will evaluate the policy based on a risk assessment where we will identify risk to the university, find vulnerabilities that can be exploited, explore root causes and determine some corrective actions that can be taken to mitigate these risks wherever possible. The acceptable use policy governs employee use of technology and does a good job addressing certain high risk areas. It prevents employee sharing of passwords, addresses behavior such as bullying and hate speech and forbids the use of university resources for personal financial gain. Some risk areas are addressed, though inadequately. The policy requires the use and updating of antivirus software, but leaves the updating to the end user. In addition, the policy requires that non-OS software is patched to secure versions, but it leaves the installation and updating to end users. Such policy put into action would require end users to have full administrator access to their PCs. This creates several high risk scenarios that we’ll explore deeper in this report along with controls that can be put into place to mitigate the risk. Other risk areas are not addressed at all. It is common for other universities to include language in their acceptable use policies addressing the ability of one user to cause network performance issues or to sniff traffic, which could cause a loss of confidentiality of data. Villanova’s policy does not address either of these scenarios. It also does not include language forbidding employees to attempt to bypass other controls that are in place. These should be included in future revisions to this policy. The policy was approved by the VP & CIO in November of 2015 along with the University Council for Information Technology. It is currently at version 1.0. It’s not clear what the update and reapproval schedule is, but it is clear that Villanova is already falling behind in this area. Background Villanova University is an institute of higher learning just outside Philadelphia with roughly 11,000 students, 600 faculty and about 2000 administrative staff. Those 2,000 administrative staff are the people who are subject to the policy. This is an important policy to audit because these employees have access to highly confidential personal data, some of which is subjected to FERPA compliance laws. Analysis The policy consists of 11 main points. Most of those points are written in a way that sufficiently addresses the risk described in the policy. However, we did find some gaps in the policy that point to wider control gaps in their computing environment. Point 5 in the policy, says that antivirus must be installed and kept up to date, which is a standard control, but may be implemented in an ineffective way here. And point 6, specifies that while the university will update a user’s operating system, the user is responsible for updating all of their other applications. Above: partial screenshot of policy The second bullet point specifies that IT is responsible for OS patches, which is good, but it doesn’t specify this for the antivirus/anti-malware portion of the policy. This strongly implies that users are responsible for their own antivirus updates. The policy explicitly mentions that users are responsible for their own application updates. This leaves us with two major issues: 1. Having users responsible for their own updates is a control gap because many users will not perform these updates, leading to security vulnerabilities. 2. The installation and updating of applications will require users to have administrative privileges on their PCs. Users having full administrative access creates many risks. Discussion Risk Assessment Risk Rating Impact Introduction of malware onto the network High High Use of illegal/unlicensed software High High Network Insecurity High High Other controls are bypassed High High Network Performance degradation Low Low Policy becomes outdated/irrelevant Low Moderate The first one you see on the chart here is the introduction of malware onto the network. Although the policy says that antivirus must be installed and kept up to date, by leaving this responsibility up to the users this leaves the university open to the possibility that some users don’t update. With 2000 users,

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Ideas & Innovations
Essay Writing Help
Finance Homework Help
Best Coursework Help
Premium Solutions
Quality Assignments
Writer Writer Name Offer Chat
Ideas & Innovations

ONLINE

Ideas & Innovations

Give me a chance, i will do this with my best efforts

$47 Chat With Writer
Essay Writing Help

ONLINE

Essay Writing Help

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$23 Chat With Writer
Finance Homework Help

ONLINE

Finance Homework Help

I have read your project details. I can do this within your deadline.

$21 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$43 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have read your project details. I can do this within your deadline.

$22 Chat With Writer
Quality Assignments

ONLINE

Quality Assignments

I have read your project details. I can do this within your deadline.

$49 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Describe a room in your house - International brand management los angeles - Bsb51107 diploma of management - Why couldn t the two elephants go swimming together answers - Prg 420 java programming i - Answer discussion question in 175 words or less - Maximum normal stress equation - Healthcare Management - Marketing Analysis - Advanced Industrial Hygiene - Giving toddlers choices is considered to be developmentally inappropriate - Measurable organizational value example - Which acid is found in sour milk - The zaf radiator company uses a normal - Majumder v attorney general of sarawak - Cisco metro ethernet design and implementation guide - Who makes koretrak watches - Hrc fuse characteristics curve - Anti lock braking system abs system diagram - Introduction to limits worksheet - Gyprock ceiling batten spacing - Calvary pandan bible presbyterian - Information technology for managers reynolds - Organisational power and politics - Which of the following statements about conflict is true - The owl by robert penn warren analysis - Periodic table trends chart - Deb curtis early childhood education - Leading change carlos ghosn at renault and nissan - Medallion club of marvel stadium - Resource based view apple - Segmentation of apple - Managing operations - Mgh pata case analysis - Six times the sum of three consecutive odd integers is - What is little's law in operations management - Frontline management training package - Arches 88 silk screen paper - Balancing equations worksheet answers - Unit 4 Assessment - Environmental Literacy Plan – Phase IV - Conversion cost formula in cost accounting - Health Promotion in Minority Populations - Organization and leadership - Human resource - Don juan tirso de molina pdf - Child psychology - Possible conflict management and negotiation techniques - Assignment ethics in accounting linbarger company - Chi-x asia pacific holdings limited - Rcbs case trimmer collet chart - Short informative speech about smoking - Observing mitosis in plant cells - Website redesign project plan - Alien rpg chariot of the gods pdf download - Nfpa natl fire protect - The norton introduction to literature 12th edition online - A-B-C Analysis of Target Behaviors due in 24hours - Hans gives bread to jew - A limited resource farmer __________ - Microbial report - Early literacy skills checklist - Fuse cross reference littelfuse - Production cost analysis and estimation applied problems - Big brother is watching you - Tina jones musculoskeletal transcript - Anandam manufacturing company analysis of financial statements solution - Education support class level 1 range 4 - Calvinist undercurrent - 3.1 Discussion: Devotional Reflection-Children of Light-Transparency - Bloomberg exchange rates usd to gel - Utilization of a constranied resoure - EDU - Monash law student society - Decision making under certainty uncertainty and risk pdf - Bristlenose pleco water hardness - Chapter 18 volcanic activity study guide answer key - DQ 8 - How to prepare a bank reconciliation and record adjustments - Discussion On AG Lafley Strategy Theories Options Menu: Forum - Need 600+ words with no plagiarism - The company's facility for assembling cameras is located in - Hne intranet home page - I hear america singing rewrite - Difference between bcp and drp pdf - Apply a ½ point black, text 1 outline to the chart area - Human resource planning reference books - Brasso metal polish msds australia - Assumptions of capital structure theories - Six seasons cookbook pdf - The hallmark of the eclectic therapeutic approach is - Mass media ethics case studies - Week 4 Discussion - Burger king strengths and weaknesses 2018 - The processes of photosynthesis and cellular respiration are complementary - Help - Unipolar stepper driver ic - Capsim rounds - Bile acid test normal range dog - Psychology/discussion - Chapter 11 lesson 3 lifelong nutrition answers