Question 1
Article Review Assignment – WK 14
Select any article or link from the Internet site listed below. Summarize what you have read in 3-4 paragraphs using your own words. Submit a one-page WORD formatted document as an attachment.
Must Read Articles
Question 2
Final Written Project
Managing Information Security – Policy Assignment -FINAL WRITTEN PROJECT.docx (29.894 KB)
Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment. Please complete this and upload your work by clicking the BLUE LINK ABOVE (as a WORD DOCUMENT). This written project should be worked on prior to our residency meetings. We will discuss this assignment at our f2f meetings on campus.
Managing Information Security
Creating Company E-mail and WIFI / Internet Use Policies
You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.
There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.
Project Plan
You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.
Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).
1. Overview
2. Purpose
3. Scope
4. Policy
5. Policy Compliance
6. Related Standards, Policies and Processes
7. Definitions and Terms
Some useful links and resources for your research:
https://www.sans.org/security-resources/policies/general/pdf/email-policy
https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref
https://www.techrepublic.com/article/download-our-wireless-policy-template/
Week Seven Discussion
Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience. Explain what type of message it was and what you did to get rid of it.
Post your initial DISCUSSION response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more