Perform a security audit of your computer

Assignment Help Management Information Sys
Reference no: EM131327838

Objective:

Apply the standards for fair, responsible and acceptable use of information technology (e.g., computer systems, network, etc.) to your environment

Perform a security audit of your own computer.

Part I: Acceptable Use Policy (AUP)

Brief narrative covering the following topics (at a minimum) as it applies to your technology environment (e.g., digital device, network, data, etc.):

Scope (to whom the AUP applies)

The "owner" of the AUP (who is authorized to make changes to the policy)

Why have a policy / Intent of the policy / Purpose of the policy

Required conduct (behavior)

Unacceptable conduct (behavior)

Consequences / Sanctions for violations of the AUP

Sample AUP:

https://nces.ed.gov/pubs2005/tech_suite/app_a.asp (a Google search for "acceptable use policy template"

or "acceptable use policy samples" will link to may more examples). ISU's AUP:

https://www2.isu.edu/policy/2000/2400-IT-Acceptable-Use.pdf

Part II: Security Audit

Perform a security audit of your computer.

Are critical OS updates available?

Are critical application updates for one or two of your core applications available?

Note: MS Office is updated with Windows update

Is anti-virus software installed and up to date?

Are there user accounts for each person using the computer?

Are user accounts password protected?

Evaluate the security level of all user accounts. Are those listed as an "administrator" acceptable to you?

Is the firewall enabled?

Is the screen saver configured? Does the screen saver require a password to clear it?

Are all your passwords (computer system and online) considered "strong?"

Create a table in MS Word (three columns). List the items above in the first column (each major bullet point is a row/cell). Use the 2nd column to answer the question in the 1st column. Use the third column to describe any action items to be taken after the semester ends (I'm not expecting you take actions now but this will serve as a reminder to do so as soon as possible after the semester ends). However, I recommend you consider addressing any critical security updates as soon as possible.

Note: Be sure you have a good external backup of important files before performing the security audit!

Submit one MS Word Document via MoodleISU that contains your answers to Part I and Part II.

Please remember to:

Insert a page break between part I and part II

Run spell and grammar checker

Use complete sentences

Points will be deducted for spelling and grammar errors.

Only place your full name in the top left corner of each page (no need to put the date, time, my name, the name of the class, etc. - just your name)

Reference no: EM131327838

Questions Cloud

Should the bank go long or short on futures contract : Dudley Savings Bank wishes to take a position in Treasury bond futures contracs, which currently have a quote of 113-100. Dudly Savings thinks interest rates will go down over the period of the investment. The face value of the bond underlyting the f..
What is the maximum value of the rate of change : The voltage, V , in volts, in an electrical outlet is given as a function of time, t, in seconds, by the function V = 156 cos(120πt).
Explain the purposes of single-subject designs : Explain the purposes of single-subject designs. Define level, trend, and variability and explain how these approaches to understanding data can be used to analyze the effectiveness of the BIP
Maintain constant debt-equity ratio : Appleton Corp. wishes to maintain a growth rate of 13.4 percent and a dividend payout ratio of 38 percent. The ratio of total assets to sales is constant at .80 and profit margin is at 8.1 percent. If Appleton Corp also wished to maintain a constant ..
Perform a security audit of your computer : Perform a security audit of your computer.Are critical OS updates available? Are critical application updates for one or two of your core applications available? Is anti-virus software installed and up to date?Are there user accounts for each person ..
What are the particular beliefs about human nature : Based on your readings, what are the particular beliefs about human nature that differentiate the ethical theories of Thomas Hobbes, David Hume, and Immanuel Kant? How might you illustrate each perspective
What rate of return did you earn over two years : What would you pay for an asset that had cash flows of $2,000 at the end of year, $2,5000 at the end of year 2 and $3,000 at the end of the year three if the appropriate discount rate is 5% each year? How much money would you have if you banked your ..
What is the beta of a security with an expected return : What is the beta of a security with an expected return of 12% if Treasury bills yield 6% and the market risk premium is 8%? Security XYZ has a beta of 1.1. The expected market rate of return is stable at 8% and the risk-free rate is 4%. If the realiz..
Company pledges to increase its dividend : Caan Corporation will pay a $2.54 per share dividend next year. The company pledges to increase its dividend by 3.5 percent per year indefinitely. If you require a return of 11 percent on your investment, how much will you pay for the company’s stock..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Create spreadsheet of a prevention measure for vulnerability

Create a spreadsheet of a prevention measure for each vulnerability identified in the Week Two assignment and any potential incidents that may occur.

  Explain open systems interconnection

Open Systems Interconnection - what are the advantages and disadvantages of using standard protocols

  Build a forecasting model

Build a forecasting model. Assume a linear regression forecasting model and build a model for each of the five games

  If you were the new ceo of the second largest supermarket

if you were the new ceo of the second largest supermarket chain how could you use supply chain integration to be more

  Explain the top five management concerns

Explain the top five management concerns that you believe is the most important. Then, select one out of the five most influential ITs.

  How to prevent the hack attack

Preventing Computer Hacking - Describe the detailing of such an incident. What should the target company have done to prevent the "Hack Attack"?

  What would an erp system allow you to do

Research the topic of ERP contracts on the Internet. How could ERP vendors make it easier for customers to understand their licensing models? What could customers do to ensure a contract contains all possible eventualities?

  What the critical nature of a database administrator role

Give your opinion on what the critical nature of a database administrator's role is to IT industry organizations. Support your answer with specific examples of functions and responsibilities they perform.

  Should states share criminal databases

Should States Share Criminal Databases? Many TV shows depict law enforcement personnel accessing readily accessible databases that contain all types of records about individuals - containing records about everything from address to telephone reco..

  Identifies the purpose of the project

Draft a 1-2 page (350 words per page) executive summary that states that identifies the areas of the business to be improved, identifies the purpose of the project, and lists stakeholders associated with the project

  Explain the regulatory compliance law

From the e-Activity, explain the regulatory compliance law that you researched, and ascertain the effect that information security could have on such a law

  Multidimensional analysis data versus information1 how can

multidimensional analysis data versus information1. how can you use a relational database to store data be specific.2.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd