Lab 7 Implementing_an_IT_Security_Policy_4e_-_mueed_mian
pdf
keyboard_arrow_up
School
Mindanao State University - Iligan Institute of Technology *
*We aren’t endorsed by this school
Course
4052
Subject
Information Systems
Date
Nov 24, 2024
Type
Pages
11
Uploaded by MagistrateWildcat3162
Implementing an IT Security Policy (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 07
Student:
Email:
mueed mian
mueed08@yahoo.com
Time on Task:
Progress:
6 hours, 21 minutes
100%
Report Generated:
Friday, October 6, 2023 at 1:07 PM
Section 1: Hands-On Demonstration
Part 1: Implement a Password Protection Policy
16.
Make a screen capture
showing the
newly configured Domain Password Policy settings
.
Page 1 of 11
Implementing an IT Security Policy (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 07
28.
Make a screen capture
showing the
successful password change message
.
36.
Make a screen capture
showing the
logged on user account
.
Part 2: Implement an Antivirus Policy
Page 2 of 11
Implementing an IT Security Policy (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 07
16.
Make a screen capture
showing the
newly configured Domain Real-time protection Policy
settings.
25.
Make a screen capture
showing the
grayed-out real-time threat protection settings
.
Page 3 of 11
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Implementing an IT Security Policy (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 07
Section 2: Applied Learning
Part 1: Apply a Windows Security Baseline
6.
Make a screen capture
showing
Microsoft's recommended Password and Account
Lockout policy settings
.
19.
Make a screen capture
showing the
linked MSDomainSecurity2019 object
.
Page 4 of 11
Implementing an IT Security Policy (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 07
23.
Make a screen capture
showing the
Password and Account Lockout policy settings
.
Part 2: Implement a Mobile Device Security Policy
7.
Make a screen capture
showing the
results of the Google Play Protect scan
.
Page 5 of 11
Implementing an IT Security Policy (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 07
11.
Make a screen capture
showing the
updated “last successful check for update”
timestamp
.
Page 6 of 11
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Implementing an IT Security Policy (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 07
19.
Make a screen capture
showing the
Android lock screen
.
Page 7 of 11
Implementing an IT Security Policy (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 07
25.
Make a screen capture
showing the
encryption set-up explanation
.
Page 8 of 11
Implementing an IT Security Policy (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 07
27.
Make a screen capture
showing the
Find My Device settings
.
Page 9 of 11
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Implementing an IT Security Policy (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 07
Section 3: Challenge and Analysis
Part 1: Research Acceptable Use Policies
Using the Internet,
research
Acceptable Use Policies, then
identify
at least five common policy
statements and
explain
their significance. Be sure to cite your sources.
As a compliance specialist at Secure Labs on Demand, tasked with refreshing the
organization's Acceptable Use Policy (AUP), it's essential to align the policy with
contemporary best practices to enhance security and compliance within the organization.
Acceptable Use Policies outline the rules and guidelines governing employees' use of
company resources, including computer systems, networks, and data. Here are five joint
policy statements and their significance, backed by relevant sources:
1. Authorized Access Only:
This statement restricts access to company resources to
authorized personnel only. It is significant as it helps prevent unauthorized access and data
breaches, improving overall security (SANS Institute, 2021).
2. Data Protection and Confidentiality:
Emphasizing the importance of protecting sensitive
company data reinforces the organization's commitment to confidentiality. It ensures
compliance with data protection regulations, like GDPR or HIPAA, and reduces the risk of
data leaks (TechRepublic, 2022)
3.
Prohibition of Malicious Software
: This statement forbids installing or using malicious
software on company devices, such as malware or viruses. It safeguards the network and
systems from potential cyber threats.
4. Prohibited Activities:
Listing prohibited activities, like harassment, copyright infringement,
or unauthorized monitoring, sets clear expectations for employee behavior. It promotes a
respectful and ethical workplace.
5. Consequences of Violation:
Clearly outlining consequences for policy violations,
including disciplinary actions, helps deter employees from engaging in prohibited activities. It
also ensures accountability.
Incorporating these policy statements into the refreshed AUP at Secure Labs on Demand will
help maintain a secure, compliant, and ethical work environment, aligning with industry best
practices and regulatory requirements.
References:
SANS Institute, 2021. Acceptable Use Policy. https://www.sans.org/security-awareness-
training/acceptable-use-policy
TechRepublic, 2022. Sample Acceptable Use Policy. https://www.techrepublic.com/resource-
library/downloads/sample-acceptable-use-policy/
Part 2: Research Privacy Policies
Page 10 of 11
Implementing an IT Security Policy (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 07
Using the Internet,
research
user Privacy Policies, then
identify
at least five common policy
statements and
explain
their significance. Be sure to cite your sources.
Privacy policies play a pivotal role in safeguarding individuals' personal information in the
digital age. Typically found on websites and mobile apps, these documents outline how
organizations collect, use, and protect user data. They serve as a crucial point of
transparency and trust-building between consumers and businesses. However, the
complexity and length of privacy policies often hinder users from fully comprehending their
rights and the potential risks associated with data sharing (Obar & Oeldorf-Hirsch, 2018).
A significant concern with privacy policies is the power imbalance between organizations and
users. Companies tend to draft policies laden with legalese, making them difficult for the
average person to decipher. To address this issue, policymakers and businesses should
create concise, user-friendly privacy policies communicating data practices and potential
risks. Furthermore, regular updates and transparency in data handling are essential to
maintain trust.
Effective privacy policies are essential for ensuring that organizations handle individuals'
personal information responsibly and ethically. As technology advances, privacy policies must
evolve to protect user data effectively. Striking a balance between legal requirements and
user understanding is crucial (Obar & Oeldorf-Hirsch, 2018).
References:
Obar, J. A., & Oeldorf-Hirsch, A. (2018). The Biggest Lie on the Internet: Ignoring the Privacy
Policies and Terms of Service Policies of Social Networking Services. Information,
Communication & Society, 23(1), 128-147. doi:10.1080/1369118X.2018.1481390.
Powered by TCPDF (www.tcpdf.org)
Page 11 of 11