Strayer CIS565 Week 4 Case Study 2
Question # 00809327
Posted By:
Updated on: 08/06/2021 08:41 AM Due on: 08/06/2021
Strayer CIS565 Week 4
Case Study 2: Security Policy
Review the Technology Use Policy for Strayer University and the Information Security Policies for Strayer University, The George Washington University, and Harvard University:
- Strayer University
http://strayer.smartcatalogiq.com/en/2016-2017/Student-Handbook/Policies-and-Procedures/Technology-Use-Policy - The George Washington University:
http://my.gwu.edu/files/policies/InformationSecurityPolicyFINAL.pdf - Harvard University
https://policy.security.harvard.edu/
Note: Include two (2) other websites published within the past [1] year in your references section. These two (2) websites do not count towards the required number of references.
Write a three to four (3-4) page paper in which you:
- Explain the purpose of a university security policy and indicate the major reasons why they are necessary. Provide your opinion as to whether a university security policy is more or less important to have than a business security policy
- Critique the level of completeness of the Strayer University Security Policy
- Critique the level of completeness of the George Washington University Security Policy
- Suggest one (1) additional policy or procedure for each university’s policy. Provide a rationale for your response
- Use at least three (3) quality references published within the past [1] year in this assignment.
Note: Wikipedia and similar websites do not qualify as quality resources
-
Rating:
/5
Solution: Strayer CIS565 Week 4 Case Study 2