Explain how you would handle the given situation

Assignment Help Computer Network Security
Reference no: EM131275237

Discussion Question

A security policy is developed by senior management to assign certain responsibilities and mandate certain requirements, which are usually aligned with the agency's mission.

A new policy was just created to prohibit peer-to-peer software downloads, as they are illegal and may bring malicious content to the workplace. You, the security officer, noticed that employees resisted the policy and chose to continue downloading peer-to-peer software. In an initial post, explain how you would handle this situation. What would you do to enforce the policy?

Reference no: EM131275237

Questions Cloud

Power of observation : Select one (1) of the following concepts to examine: in-group / out-group, bystander effect, conformity, nonconformity, foot-in-the-door strategy, or door-in-the-face strategy. Next, describe one (1) situation in which you observed the concept cho..
What are the potential solutions for the problem : What are the potential solutions for the problem - How can you present the solution(s) in a fair way to your audience, respecting their perspective(s)?
What is the total cost of this graduate program : For each requirement indicate whether you have the necessary skill or experience or need the skill? For each skill that is needed indicate steps you would take to satisfy the admission requirement.
Explain why these techniques are effective : What welding techniques can be used to avoid loss of strength in the material in the heat-affected zone? Explain why these techniques are effective.
Explain how you would handle the given situation : You, the security officer, noticed that employees resisted the policy and chose to continue downloading peer-to-peer software. In an initial post, explain how you would handle this situation.
What risks and benefits can you anticipate : What "risks and benefits" can you anticipate for people participating in your project - Think for a bit about doing observations and conducting interviews (you might want to review Driscoll's article on primary research here).
Define the benefits of ownership of the mobile application : Define the benefits of ownership of the mobile application. Predict the return on investment (ROI) of the mobile application and your suggested alternatives. Identify risks associated with developing the mobile application.
What are media habits who prefer the new automobile types : What are consumer preferences and intentions for various types of fuel-efficient automobiles?- What are media habits of those who prefer the new automobile types?
Papers about timeline and fracking of earthquakes : Can you write a research papers about timeline and fracking of earthquakes in TX,OH, OK in Uinted States. write 3 pages and use MLA style also use at least 2 resources.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Context of a systems development project

Outline the issues that Susan should consider which would support the purchase of a software package. Within the context of a systems development project, when should the decision of "make-versus-buy" be made? How should Susan proceed? Explain your..

  Abc institute of research has sensitive information that

abc institute of research has sensitive information that needs to be protected from its rivals. the institute has

  Review the sample system security plan template in project

Review the sample System Security Plan template in the Project Description area of the classroom. Describe each family control. Include why these controls are required.

  Explain the importance of standards organizations

A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security

  Write a report discussing security vulnerabilities

Write a report discussing security vulnerabilities that can lead to the loss of confidentiality, integrity, availability, authenticity, or accountability using leading network security terms found in Comptia Security+.

  Identify the types of network components devices and

define the requirements and then design an appropriate network that would support this dental practice. your answer

  Discuss the state secrets privilege and how it is used

Discuss the "state secrets" privilege and how it is used. What is the "third party" doctrine and explain how it has been applied in the cases we have read this term.

  Decrypt the ciphertext message uw dm nk qb ek which was

decrypt the ciphertext message uw dm nk qb ek which was encrypted using the digraphic cipher that sends the plaintext

  Description and understanding of a newict service

Provides a thorough and detailed description and understanding of a newICT service in the workplace, worthy of analysis and provides a comprehensive description and understanding of a new ICT service in the workplace, worthy of analysis.

  How anatomy of stuxnet was able to damage irans scada system

Analyze the anatomy of Stuxnet and how it was able to damage Iran's SCADA systems. Provide five guidelines that should be used to reduce a network's attack surface for industrial control systems.

  Specify the vlan assignment

Specify the commands that you would use to set up the routers to use EIGRP. Outline the requirements to set up a VLAN and VPN access for the accountants. Specify the VLAN assignment, and incorporate a Spanning Tree protocol into your design to elimin..

  Security infrastructure and protocols

Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a "top-down" approach to trust and PGP is a "bottom-up" approach to trust.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd