Crafting an Organization-Wide Security Management Policy for
Acceptable Use
Instructions
1. Answer each question thoroughly.
2. Include your full name as a header.
3. Do not copy and paste information from the Internet, you will receive a zero for this assignment.
4. You may research information from the Internet and rewrite it in your own words (acceptable).
5. Do not copy another student work. The University of the has a strict policy relating to cheating. Think before you act!
6. Provide your answers as outline below. Each answer should be on a separate page.
7. Assessment: 25 points for each question. Please research and explain your answers. Do not type one or two sentences and expect to receive full credit. And please do not include meaningless words.
8. .
Lab 1: Questions
1. What are three risks and threats of the User Domain?
2. Why do organizations have acceptable use policies (AUPs)?
3. Can Internet use and e-mail use policies be covered in an acceptable use policy?
4. Do compliance laws, such as the Health Insurance Portability and Accountability Act (HIPAA) or GLBA, play a role in AUP definition?
1 – Lab 1
Applied Sciences
Architecture and Design
Biology
Business & Finance
Chemistry
Computer Science
Geography
Geology
Education
Engineering
English
Environmental science
Spanish
Government
History
Human Resource Management
Information Systems
Law
Literature
Mathematics
Nursing
Physics
Political Science
Psychology
Reading
Science
Social Science
Home
Blog
Archive
Contact
google+twitterfacebook
Copyright © 2019 HomeworkMarket.com