Lab 7 Implementing_an_IT_Security_Policy_4e_-_mueed_mian

pdf

School

Mindanao State University - Iligan Institute of Technology *

*We aren’t endorsed by this school

Course

4052

Subject

Information Systems

Date

Nov 24, 2024

Type

pdf

Pages

11

Uploaded by MagistrateWildcat3162

Report
Implementing an IT Security Policy (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 07 Student: Email: mueed mian mueed08@yahoo.com Time on Task: Progress: 6 hours, 21 minutes 100% Report Generated: Friday, October 6, 2023 at 1:07 PM Section 1: Hands-On Demonstration Part 1: Implement a Password Protection Policy 16. Make a screen capture showing the newly configured Domain Password Policy settings . Page 1 of 11
Implementing an IT Security Policy (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 07 28. Make a screen capture showing the successful password change message . 36. Make a screen capture showing the logged on user account . Part 2: Implement an Antivirus Policy Page 2 of 11
Implementing an IT Security Policy (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 07 16. Make a screen capture showing the newly configured Domain Real-time protection Policy settings. 25. Make a screen capture showing the grayed-out real-time threat protection settings . Page 3 of 11
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Implementing an IT Security Policy (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 07 Section 2: Applied Learning Part 1: Apply a Windows Security Baseline 6. Make a screen capture showing Microsoft's recommended Password and Account Lockout policy settings . 19. Make a screen capture showing the linked MSDomainSecurity2019 object . Page 4 of 11
Implementing an IT Security Policy (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 07 23. Make a screen capture showing the Password and Account Lockout policy settings . Part 2: Implement a Mobile Device Security Policy 7. Make a screen capture showing the results of the Google Play Protect scan . Page 5 of 11
Implementing an IT Security Policy (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 07 11. Make a screen capture showing the updated “last successful check for update” timestamp . Page 6 of 11
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Implementing an IT Security Policy (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 07 19. Make a screen capture showing the Android lock screen . Page 7 of 11
Implementing an IT Security Policy (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 07 25. Make a screen capture showing the encryption set-up explanation . Page 8 of 11
Implementing an IT Security Policy (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 07 27. Make a screen capture showing the Find My Device settings . Page 9 of 11
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Implementing an IT Security Policy (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 07 Section 3: Challenge and Analysis Part 1: Research Acceptable Use Policies Using the Internet, research Acceptable Use Policies, then identify at least five common policy statements and explain their significance. Be sure to cite your sources. As a compliance specialist at Secure Labs on Demand, tasked with refreshing the organization's Acceptable Use Policy (AUP), it's essential to align the policy with contemporary best practices to enhance security and compliance within the organization. Acceptable Use Policies outline the rules and guidelines governing employees' use of company resources, including computer systems, networks, and data. Here are five joint policy statements and their significance, backed by relevant sources: 1. Authorized Access Only: This statement restricts access to company resources to authorized personnel only. It is significant as it helps prevent unauthorized access and data breaches, improving overall security (SANS Institute, 2021). 2. Data Protection and Confidentiality: Emphasizing the importance of protecting sensitive company data reinforces the organization's commitment to confidentiality. It ensures compliance with data protection regulations, like GDPR or HIPAA, and reduces the risk of data leaks (TechRepublic, 2022) 3. Prohibition of Malicious Software : This statement forbids installing or using malicious software on company devices, such as malware or viruses. It safeguards the network and systems from potential cyber threats. 4. Prohibited Activities: Listing prohibited activities, like harassment, copyright infringement, or unauthorized monitoring, sets clear expectations for employee behavior. It promotes a respectful and ethical workplace. 5. Consequences of Violation: Clearly outlining consequences for policy violations, including disciplinary actions, helps deter employees from engaging in prohibited activities. It also ensures accountability. Incorporating these policy statements into the refreshed AUP at Secure Labs on Demand will help maintain a secure, compliant, and ethical work environment, aligning with industry best practices and regulatory requirements. References: SANS Institute, 2021. Acceptable Use Policy. https://www.sans.org/security-awareness- training/acceptable-use-policy TechRepublic, 2022. Sample Acceptable Use Policy. https://www.techrepublic.com/resource- library/downloads/sample-acceptable-use-policy/ Part 2: Research Privacy Policies Page 10 of 11
Implementing an IT Security Policy (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 07 Using the Internet, research user Privacy Policies, then identify at least five common policy statements and explain their significance. Be sure to cite your sources. Privacy policies play a pivotal role in safeguarding individuals' personal information in the digital age. Typically found on websites and mobile apps, these documents outline how organizations collect, use, and protect user data. They serve as a crucial point of transparency and trust-building between consumers and businesses. However, the complexity and length of privacy policies often hinder users from fully comprehending their rights and the potential risks associated with data sharing (Obar & Oeldorf-Hirsch, 2018). A significant concern with privacy policies is the power imbalance between organizations and users. Companies tend to draft policies laden with legalese, making them difficult for the average person to decipher. To address this issue, policymakers and businesses should create concise, user-friendly privacy policies communicating data practices and potential risks. Furthermore, regular updates and transparency in data handling are essential to maintain trust. Effective privacy policies are essential for ensuring that organizations handle individuals' personal information responsibly and ethically. As technology advances, privacy policies must evolve to protect user data effectively. Striking a balance between legal requirements and user understanding is crucial (Obar & Oeldorf-Hirsch, 2018). References: Obar, J. A., & Oeldorf-Hirsch, A. (2018). The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of Service Policies of Social Networking Services. Information, Communication & Society, 23(1), 128-147. doi:10.1080/1369118X.2018.1481390. Powered by TCPDF (www.tcpdf.org) Page 11 of 11