Legal Reg, Compliance, Invest. IT - Information security policy

Question # 00842930 Posted By: wildcraft Updated on: 06/30/2023 04:44 AM Due on: 06/30/2023
Subject Education Topic General Education Tutorials:
Question
Dot Image

Legal Reg, Compliance, Invest. IT

1. Conduct an internet or library search to locate the information security policy for 2 colleges or universities.

Note: Consider searching for your own institution’s information security policy. As a student, you are responsible for knowing its contents.

2. Read each policy in its entirety.

3. Identify the first policy you selected and  document whether it contains the following elements:

1. Policy statement

2. Rationale

3. Who is affected by the policy

4. Definitions

5. Roles and responsibilities

6. Compliance

7. Related documents

8. Policy contact

4. Identify the second policy you selected and  document whether it contains the following elements:

1. Policy statement

2. Rationale

3. Who is affected by the policy

4. Definitions

5. Roles and responsibilities

6. Compliance

7. Related documents

8. Policy contact

Note: In this part of the lab, you will use your research from Part 1 to analyze the policies you selected.

 

1. Which policy was more complete or informative? Why?

2. As an end-user, which policy was easier to understand? Why?

3. For the first policy, what are your responsibilities for following the policy?

4. For the second policy, what are your responsibilities for following the policy?

 

Note: The following exercise is provided to allow independent, unguided work using the skills you learned earlier in this lab - similar to what you would encounter in a real-world situation.

 

You have been hired as an information security analyst at a small company called Astounding Appliances. Your manager asks you to help her create an information security training and awareness policy. The primary goal of the policy is to keep employees from responding to phishing attempts and other internet scams. Any policy that is created will have to be reviewed by legal counsel and other company stakeholders, so it is not important to get the language exactly right for the first draft. What is important, however, is to outline all of the main parts of the policy. Your manager wants you to prepare the first draft of the outline using the common policy elements headings.

Create an outline of an information security training and awareness policy.

Note: Phishing is a type of fraud where criminals attempt to obtain sensitive information or data via electronic transmissions (usually email) by pretending to be a trusted individual, such as a member of a company’s leadership or IT team.

Dot Image
Tutorials for this Question
  1. Tutorial # 00838395 Posted By: wildcraft Posted on: 06/30/2023 04:45 AM
    Puchased By: 2
    Tutorial Preview
    The solution of Legal Reg, Compliance, Invest. IT - Information security policy...
    Attachments
    Legal_Reg,_Compliance,_Invest__IT_-_Information_security_policy.ZIP (18.96 KB)

Great! We have found the solution of this question!

Whatsapp Lisa