COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Download non-work related materials, software, music and video files.
|
|
Use email in a professional and courteous manner
|
|
Make negative comments about the organisation on social media.
|
|
Report any technical issues to the technical support department
|
Detailed explanation-1: -An AUP sets rules related to an organization’s IT security policies. These include rules around accessing restricted information; changing access data, such as passwords; opening questionable email attachments; using public Wi-Fi services; and using company approved authentication procedures.
Detailed explanation-2: -An Acceptable Use Policy is an important document that can demonstrate due diligence with regards to the security of your IT network and the protection of sensitive data in the event of a breach or regulatory audit. This importantly protects the organisation from legal actions.
Detailed explanation-3: -The most important part of an AUP document is the code of conduct governing the behaviour of a user whilst connected to the network/Internet.