Module 3 Assignment
docx
keyboard_arrow_up
School
Saint Leo University *
*We aren’t endorsed by this school
Course
510
Subject
Communications
Date
Feb 20, 2024
Type
docx
Pages
3
Uploaded by dowlingdad88
Joshua Dowling
2/2/2024
Saint Leo University COM 510 Chapter 4
2. Search your institution’s intranet or Web site for its security policies. Do you find an enterprise security policy? What issue-specific security policies can you locate? Are all of these policies issued or coordinated by the same individual or office, or are they scattered throughout the institution?
After searching through the university’s website, saintleo.edu, I found a page titled "Safety and Security.” There are no direct enterprise security policies, only those that deal with some specific types of issues including, but not limited to, sexual misconduct, crisis response plans, parking and traffic, fire, etc. included in the page is also a resource for anonymous reporting. It would appear from the contact information at the bottom of the page, that all these policies are coordinated by the campus security office. 4. Using the framework presented in this chapter, draft a sample issue-specific security policy for an organization. At the beginning of your document, describe the organization for which you are creating the policy and then complete the policy using the framework.
Issue Specific Security Policy
Title: Responsible and Effective Use of Wireless Internet (WiFi) Technology
Classification: For Internal Use Only
Statement of Policy
The purpose of this security policy is to provide fair, responsible, and effective guidelines for use of
JDowling Inc. wireless internet (WiFi) technology. This policy covers, but is not limited to, protocols,
software and hardware associated with WiFi technologies and enabled devices. Use of this technology is
meant for authorized users withing JDowling Inc. Authorized users are those who are defined as being
active within our systems and have been given authorized access. This can be but is not limited to
employees and other workers. Appropriate Use
Portable devices of authorized users are permitted with prior approval by management. WiFi, and connected devices, should only be used while in the area/premises of JDowling Inc. Systems Management
It will be the responsibility of the WiFi manager, and JDowling Inc. to provide secure access points that are in line with the stated WiFi System Policy. Violations of Policy
In the event that a user or device is found out of compliance with the appropriate uses of JDowling Inc.’s WiFi policy, we reserve the right to take the necessary steps that are deemed appropriate for the given situation. Policy Review Modification
This policy will be reviewed by JDowling Inc. and it’s appropriate Information Security personnel on a yearly basis. Following that review, changes will be made as needed by change of direction or change in technology. Any changes will be reviewed and approved by the management of JDowling Inc. Limitations of Liability
JDowling Inc. takes no liability for unauthorized actions that violate the legislations. In the case such an act occurs, JDowling Inc. will immediately terminate the relationship it has with the violator and will give no legal cover or assistance to the perpetrator.
Chapter 5
1. Assume a smaller organization has a plan to implement a security program with three full-time staff and two or three groups of part-time roles from other parts of the business. What titles and roles do you recommend for the three full-time staff? What groups would commonly supply the part-time staff?
Titles and roles recommended for full-time staff
Security manager
- Responsible for planning, training and policy compliance. - Member of the incident response team.
Technical security personnel
- Operating with part-time IT staffs to address technical security system administration, centralized authentication and network security administration - Member of incident response team. Compliance manager
- Work with part-time IT staffs to ensure security policy compliance, risk assessment & management as well as systems testing - Liaise with security management to address policy development as well as incident response. Part-time staff groups
A. A group from the legal department - they will attend to the legal needs, for instance, coordinate on policy compliance and incident response B. A group from the IT department - work with technical security personnel and compliance manager
6. Draft a work breakdown structure for the task of implementing and using a PC-based virus detection
program (one that is not centrally managed). Don’t forget to include tasks to remove or quarantine any malware it finds.
Task
Effort
(Time)
Skill
Download McAfee Internet Security Scanner
10
End User
Install application on to PC; making sure that it is up to date 5
End User
Configure application settings per desired outcomes
10
End User
Set up first scan on PC
60
End User
Delete/Remove all quarantined and infected files from PC
10
End User
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help