Preview

Lab 1

Good Essays
Open Document
Open Document
753 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 1
1- What are three risk and threats of the user domain?

Top risks are users and social engineering

2- Why do the organizations have acceptable use policies (AUPs)?
The AUPs is very important to any organization. The organizations should have AUPs to a- Protect the organizations from any attack weather from inside or outside. The organization can do that by preventing the employees from downloading any services not needed that may be come with threat such as virus or any kind of malware. b- Protect the organization’s assets. For example, the organization should have AUP to demonstrate how, where, and when can the employees uses the mobile devices, computer or any organization’s assets c- Save the bandwidth. The organization, for example, has AUP for using the internet

By having a good AUPs, the organizations can save money and protect them self against attack that can lead to waste money too.

3- Can Internet use and e-mail use policies be covered in an acceptable use policy?
Yes it can. When using company resources to access and use the Internet, users must realize they represent the company. Whenever employees state an affiliation to the company, they must also clearly indicate that "the opinions expressed are my own and not necessarily those of the company".

4- Do compliance laws, such as HIPAA or GLBA, play a role in AUP definition?
HIPAA defines security guidelines that enforce the protection of privacy. Specifically, HIPAA protects the privacy of medical records including the transmission of these records.
GLBA requires all banks and financial institutions to implement financial privacy rule, safeguard rule and pretexting protection. Before we create AUP, we should review all the laws that relate to privacy, by doing that will prevent violate employees’ privacy further more will protect the company from prosecution.

5- Why is an acceptable use policy not a fail-safe means of mitigating risks and threats within the user domain?

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Conducting actions irrelevant to their work, such as playing games, listening to music, watch videos, and etc.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Compare the portions that address Internet and e-mail access of at least three different companies.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Unit 4222-307 Answers

    • 767 Words
    • 4 Pages

    The Internet and Email Acceptable Use Policy provides all staff with access to email and internet a framework and set of rules and regulations to follow, to ensure that they know what they can and cannot enter or send…

    • 767 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3110 Quiz 6 2015

    • 600 Words
    • 2 Pages

    2. Using the USER domain, define risks associated with users and explain what can be done to mitigate them. Are related to social engineering. Users can be conned and tricked. A social engineer tries to trick a user into giving up information or performing an unsafe action. You can try to minimize these risks by raising user awareness. Implement acceptable use policies (AUPs) to ensure users know what they should and should not be doing. Use logon banners to remind users of the AUP. Send out occasional e-mails with security tidbits to keep security in their minds. Use posters in employee areas.…

    • 600 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    HIPAA allows patients’ health information to be disclosed under some circumstances, such as 1) to meet law requirements; 2) for reporting of abuse, neglect, and domestic violence; 3) for monitoring of healthcare operations; 4) to be presented as evidence in legal proceedings; 5) for assistance with police investigation; 6) for medical examinations and funerals; 7) for organ donation; 8) for research; 9) to avoid a significant threat to health or safety; 10) for workers’ compensation payments; 11) to execute government…

    • 81 Words
    • 1 Page
    Powerful Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580

    • 940 Words
    • 4 Pages

    * Do not create unnecessary business risk to the company by misuse of the network, internet, or email services…

    • 940 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The Health Insurance Portability Accountability Act (HIPAA) administers the HIPPA Privacy and Security Rules for individual’s protection of their health information. Many doctors and health care providers recognize and accept all requirements under the Security and Privacy Rules. EHR permits health care providers and doctor’s to use data efficiently in their care and to develop the superiority and effectiveness for the betterment of the patient.…

    • 391 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    HSM Law Profile

    • 949 Words
    • 4 Pages

    The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 by congress to protect the privacy and health information of patients in hospitals, clinics and many other human service organizations (Health Information Policy, n.d.). HIPAA affects the day-to-day operations within the human service…

    • 949 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Hipaa

    • 501 Words
    • 3 Pages

    References: Gambrell & Russell, LL, S. (2013). Hipaa. it 's not just for doctors anymore. Retrieved from http://www.sgrlaw.com/resources/trust_the_leaders/leaders_issues/ttl5/915/…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Hippa Regulatory Paper

    • 692 Words
    • 3 Pages

    “The “American Recovery and Reinvestment Act of 2009”(ARRA) that was signed into law on February 17, 2009, established a tiered civil penalty structure for HIPAA violations” (AMA). This act was established to have a minimum penalty and a maximum penalty, depending on how many times it was violated, how many offenses the employee has against them, and in some instances if the…

    • 692 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Internet in the Workplace

    • 896 Words
    • 4 Pages

    Electronic Frontiers Australia. (2000). Efa model acceptable use policy for employee use of the internet. (Version 0.5), Retrieved from c. http://www.efa.org.au/Publish/sup.htm…

    • 896 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The company should save its data by backing-up it at safe devices. Also it should install anti-virus software the will scan every downloaded file before the employee open it. The company must inform its employees about email attachments from customers or unknown emails and how danger they could be to the company computers.…

    • 1044 Words
    • 5 Pages
    Satisfactory Essays