Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Drexel antivirus software

20/04/2021 Client: muhammad11 Deadline: 2 Day

I need help with edit my paper based on my professor's recommendation. The instruction said must be based on facts you discovered in analyzing the policy against respective framework. I need to add a two page analysis section on my paper compare to the sample one. I've attached the example and please write a similar analysis part on my paper. The first attachment is the example and the second one is my paper.Villanova University’s Employee Acceptable Use Policy Team E: Matthew J. Dampf, Felice Walden, Natalie Dorely, Xinyi Mao Executive Summary The policy being audited is Villanova University’s Employee Acceptable Use Policy for their computing environment. We will evaluate the policy based on a risk assessment where we will identify risk to the university, find vulnerabilities that can be exploited, explore root causes and determine some corrective actions that can be taken to mitigate these risks wherever possible. The acceptable use policy governs employee use of technology and does a good job addressing certain high risk areas. It prevents employee sharing of passwords, addresses behavior such as bullying and hate speech and forbids the use of university resources for personal financial gain. Some risk areas are addressed, though inadequately. The policy requires the use and updating of antivirus software, but leaves the updating to the end user. In addition, the policy requires that non-OS software is patched to secure versions, but it leaves the installation and updating to end users. Such policy put into action would require end users to have full administrator access to their PCs. This creates several high risk scenarios that we’ll explore deeper in this report along with controls that can be put into place to mitigate the risk. Other risk areas are not addressed at all. It is common for other universities to include language in their acceptable use policies addressing the ability of one user to cause network performance issues or to sniff traffic, which could cause a loss of confidentiality of data. Villanova’s policy does not address either of these scenarios. It also does not include language forbidding employees to attempt to bypass other controls that are in place. These should be included in future revisions to this policy. The policy was approved by the VP & CIO in November of 2015 along with the University Council for Information Technology. It is currently at version 1.0. It’s not clear what the update and reapproval schedule is, but it is clear that Villanova is already falling behind in this area. Background Villanova University is an institute of higher learning just outside Philadelphia with roughly 11,000 students, 600 faculty and about 2000 administrative staff. Those 2,000 administrative staff are the people who are subject to the policy. This is an important policy to audit because these employees have access to highly confidential personal data, some of which is subjected to FERPA compliance laws. Analysis The policy consists of 11 main points. Most of those points are written in a way that sufficiently addresses the risk described in the policy. However, we did find some gaps in the policy that point to wider control gaps in their computing environment. Point 5 in the policy, says that antivirus must be installed and kept up to date, which is a standard control, but may be implemented in an ineffective way here. And point 6, specifies that while the university will update a user’s operating system, the user is responsible for updating all of their other applications. Above: partial screenshot of policy The second bullet point specifies that IT is responsible for OS patches, which is good, but it doesn’t specify this for the antivirus/anti-malware portion of the policy. This strongly implies that users are responsible for their own antivirus updates. The policy explicitly mentions that users are responsible for their own application updates. This leaves us with two major issues: 1. Having users responsible for their own updates is a control gap because many users will not perform these updates, leading to security vulnerabilities. 2. The installation and updating of applications will require users to have administrative privileges on their PCs. Users having full administrative access creates many risks. Discussion Risk Assessment Risk Rating Impact Introduction of malware onto the network High High Use of illegal/unlicensed software High High Network Insecurity High High Other controls are bypassed High High Network Performance degradation Low Low Policy becomes outdated/irrelevant Low Moderate The first one you see on the chart here is the introduction of malware onto the network. Although the policy says that antivirus must be installed and kept up to date, by leaving this responsibility up to the users this leaves the university open to the possibility that some users don’t update. With 2000 users,

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Ideas & Innovations
Essay Writing Help
Finance Homework Help
Best Coursework Help
Premium Solutions
Quality Assignments
Writer Writer Name Offer Chat
Ideas & Innovations

ONLINE

Ideas & Innovations

Give me a chance, i will do this with my best efforts

$47 Chat With Writer
Essay Writing Help

ONLINE

Essay Writing Help

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$23 Chat With Writer
Finance Homework Help

ONLINE

Finance Homework Help

I have read your project details. I can do this within your deadline.

$21 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$43 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have read your project details. I can do this within your deadline.

$22 Chat With Writer
Quality Assignments

ONLINE

Quality Assignments

I have read your project details. I can do this within your deadline.

$49 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Binary search visualization - Balance sheet accounts are listed in order of - Jack wills swot - Walt disney company case study - Operations management - The baltimore waltz play pdf - All of the following are ways to help a grieving friend except - Pte centre near me - Physics education v35 2 march 2000 130 131 - Automate informate transform - Friedland d107 facet wall mounted chime 80db - Care certificate standard 5 answers - Vampires in lemon grove summary - Sqa higher music concepts - Compsis at a crossroads case study - York st john university moodle - Bricklaying method statement free download - What are the four causes of the great depression - Database management system - Pcli spokane wa - Oasis academy lords hill - Experiment 1 classification of bones - 5 wire stator diagram - Cask of amontillado project ideas - Relationship based theory child development - Health informatics an interprofessional approach 2e - John donne no man is an island poem analysis - Operations management - Queen mary 2 fremantle - Bennett model of cultural competence - Music and Movement - Leadership multiple choice questions answers - Approved abbreviations for nursing documentation australia - Business Plan - Systems engineering plan sep outline - Teaching children to read 7th edition - Indradrive m error codes - 1800 mm to cm - Bcg women's cheer layout shoes - Size constancy in psychology - Literature review of 5G amplification - If the ad shortfall is $600 billion and the mpc is 0.8, - Lan wan man network pdf - Barbie doll poem analysis essay - Heard, seen, respected - Brisbane city council master plan - Discovering wes moore quotes - Looking for Nursing Dissertation Writing Services - Any Recommendations? - What is an action verb answers com - Coca cola company management structure - The pitcher by robert francis - Eq 5d 3l questionnaire pdf - John peter russell australian impressionist - Wk6 DQ1 Discussion Question 1 – CLO 3 - Democrats discussion cjt101 - It infrastructure security best practices - Find the radius of curvature of a parabola y2 4ax - Dr pepper snapple group case analysis - #15 - Debates - Graduate self service cambridge - 112/73 blood pressure female - Tokenization - Disc.2 Case Ques. Nurse Practitioner Master Program - Bbc bitesize balancing equations - Electrolyte ppt presentation - Annual fire safety statement cost - Comprehensive health history nursing example - Psychclassics yorku ca maslow motivation htm - Jane mixer crime scene photos - Swot analysis of plastic recycling company - Motorola case study analysis - Introduction learners must develop and introduction essay with the expectation of the course using following prompts - Observation of project - What is a trend analysis in healthcare organizations - What is thyratron in electronics - Sonic effect in poetry - Mla format informative speech outline - Hags rags drop rate - Gen infiniti academy data analytics masterclass - Organizational Change and Ethical-Legal Influences in Advanced Practice Nursing - Flannery o connor revelation sparknotes - English composition Q3 - Measure of Success - PowerPoint Lecture - Why are information systems vulnerable to destruction error and abuse - Ag agcl vs she - Mcdonalds franchise application process - African American List - Cherokee inc is a merchandiser that provided the following - Ionizable r groups amino acids - 2/34 ventura road mermaid beach - Gravity and free fall worksheet - Asha tandoori shankill road - Shrm body of competency and knowledge pdf - Co op bookshop melbourne uni - Finance questions-10 - How to reference aasw practice standards - What is true power measured in - W5 Discussions