Prepare a security policy for your organization

Assignment Help Computer Network Security
Reference no: EM131112159

Your boss has asked you to prepare a security policy for your organization addressing a new option he wants to pilot - Bring Your Own Device (BYOD). He wants to allow users to use their own laptops and cell phones for work purposes. Prepare a policy for the organization that identifies at least 10 controls (be certain to use "strong" policy language) to which you expect users to adhere. Use the template provided to you and address all of the sections in the template.

Bring Your Own Device (BYOD) Policy

Introduction State the purpose of this policy (what is it expected to achieve?)

Effective Date Provide an effective date for the policy

Audience Who is the audience (to whom will this apply?)Use the roles that were specified in the lecture (in the text)

Background Provide some background to the reader on why the organization is establishing this policy (mention the risks that would be associated with allowing users to bring in their own devices and attach them to the network).

Definitions Include necessary definitions (define all acronyms and technical terms as the readers may not be that computer literate)

• Term 1
• Term 2
• ETC....

Bring Your Own Device (BYOD) Policy • Specify your policy statements (at least 10).

Disciplinary Actions Address the measures that the company will take if a user is found not be in compliance with this policy.

References

Cite any references used for the homework (any works used to identify the risks or any standards documents that may be relevant)

Reference no: EM131112159

Questions Cloud

Manufacturer of office furniture and retailer : Think about Outsourcing (or offshoring) the following two companies, a manufacturer of office furniture and retailer which sells cell phones and data services. What are 5 Operational considerations you'll need to think about for both?
Calculate cpk for the salesperson : Calculate Cpk for the salesperson's machine. Enter your answer two decimal places.
What is the overall purpose objective goal of your project : What is the overall purpose, objective, goal of your project? These sections cover the problem statement or statements (most important part of your paper).
Designing for human error and error tolerances : Also, describe how it may be used as a technique to accommodate humans within the control systems, including managing and designing for human error and error tolerances. Provide at least one scenario to support your explanation.
Prepare a security policy for your organization : Your boss has asked you to prepare a security policy for your organization addressing a new option he wants to pilot - Bring Your Own Device (BYOD).
Analytical report assignment information : 1. To develop a formal report that effectively presents the problem situation/opportunity, research findings, and conclusions of your investigation to your target audience.
Examples of employee empowerment : How can rewards and/or recognition encourage the attainment of quality improvement goals? Can you describe examples of "employee empowerment" from your own professional experiences?
What is the probability that for the second sample : The scatter plot and best-fit line show the relation between the price per item (y) and the availability of that item (x) in arbitrary units. The correlation coefficient is -0.95. Determine the amount of variation in pricing explained by the varia..
Embracing the triple bottom line : a) Explain how Google are embracing The Triple Bottom Line as an operations strategic weapon (Don't waste space explaining concepts as Triple Bottom Line; Go straight to the explanation.)

Reviews

Write a Review

Computer Network Security Questions & Answers

  Write a paper about mobile security

Write a paper about mobile security. FIRST: Search using the library search or google scholar for a peer reviewed article using statistical analysis for a topic about mobile security that show some data and details.

  Describe how and why mandatory access control will be used

Describe how and why mandatory access control will be used. Describe how and why role-based access control will be used. How and why privileged and special account access are used?

  Discuss symmetric and asymmetric key encryption

A short introduction to SSH, explaining why it is the preferredway of logging into a remotemachine-this explanation will need to discuss symmetric and asymmetric key encryption.

  Advocate for and recommend an implementation plan

Your task is to advocate for and recommend an implementation plan to include all 15 CLAS standards over the next 5 years.

  Explain the purpose of the entity company code

Explain the purpose of the entity ‘Company Code'. How many company codes can an enterprise have and why?

  Ipsec provides security at the network layer

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP

  How the virus was able to replicate onto remote servers

Create a graphic rendering of how the virus was able to replicate onto remote servers using Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length.

  How to form the trojan integrated cirucit

How to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the output

  Automated digital job application system

List down advantages that come about having an automated digital job application system

  Program to encrypt messages using the caesar cypher

The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext

  Distance vector routing with link state routing

Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?

  Privacy and security of information

Privacy and security of information- Pat, a billing associate at a local hospital, was issued a laptop for work purposes. Her friend, however, has asked to borrow it for school to complete an online assignment

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd