FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Identify the behaviours that would be considered acceptable in a AUP.
A
Download non-work related materials, software, music and video files.
B
Use email in a professional and courteous manner
C
Make negative comments about the organisation on social media.
D
Report any technical issues to the technical support department
Explanation: 

Detailed explanation-1: -An AUP sets rules related to an organization’s IT security policies. These include rules around accessing restricted information; changing access data, such as passwords; opening questionable email attachments; using public Wi-Fi services; and using company approved authentication procedures.

Detailed explanation-2: -An Acceptable Use Policy is an important document that can demonstrate due diligence with regards to the security of your IT network and the protection of sensitive data in the event of a breach or regulatory audit. This importantly protects the organisation from legal actions.

Detailed explanation-3: -The most important part of an AUP document is the code of conduct governing the behaviour of a user whilst connected to the network/Internet.

There is 1 question to complete.