Academic Security Policy Assignment

docx

School

Lone Star College System, Woodlands *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by MateBat2484

Report
Adrian Diaz September 12, 2023 ITCA-1374 Academic Security Policy Exercise: 1-2 Visit your school’s Web site and search for any information about a computer policy or Internet security policy used at your academic institution. Compare and contrast this policy with the ones discussed in this module. Are any sections missing? If so, which ones? Does the school’s policy contain sections that are not described in this module? Why do you think those sections are included? The use of system computers policy which I found for Lonestar College was under the Student Policy, Section E.1.02, Prohibited Computer Use. After reading and comparing this policy with the ones discussed in the module such as the issue-specific security policy. Some sections are missing such as the policy review and modification section and the limitations of liability. There are sections within the policy that are not described in this module. Some of these sections are records, confidentiality, and public access computer terminals. I believe there are several reasons why these sections were included. The foremost reason is for clarity and understanding. Another possible reason for their inclusion could be the simple fact they had issues or misuse in these areas and wanted to cover them thoroughly. By doing so they helped remove any legal ramifications that could be incurred with their misuse or abuse.
Exercise: 1-5 Open a Web browser and search for “NIST Computer Security Resource Center.” Link to the home page. Click the Publications link, then click on the “SP NIST Special Publications” option. Locate SP 800-100. Review the HTML version. What critical information could a security administrator or manager gain from this document? What other documents would be of value to the security manager or technician? A security administrator and manager can obtain critical information about the security program elements that will assist them in comprehending how to form and execute an information security program. Other information that will be gained from the document will be the different aspects of information security that their positions will be likely to implement and oversee in their respective organizations. Overall, this document will provide both security administrators and managers with the information that they can utilize when building their information security program strategy. From information security governance to system and development life cycle all the way to contingency planning and risk management, this document will provide crucial information and vital support. Other documents that would be of value to the security managers or technicians are the SP 800 series of documents. They are developed to address and support the security and privacy needs of information systems and are composed of guidelines, recommendations, and technical specifications.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help