COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
It’s purpose is to reduce potential internal threats to the organisations information.
|
|
It applies to all the employees in an organisation and any others who may use technology belonging to the organisations.
|
|
It outlines steps to take to in the event of a disaster.
|
|
It covers acceptable use of all assets eg Data, Hardware and Software
|
Detailed explanation-1: -An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources. Many businesses and educational institutions require employees or students to sign an AUP before being granted a network ID.
Detailed explanation-2: -The most important part of an AUP document is the code of conduct governing the behaviour of a user whilst connected to the network/Internet.
Detailed explanation-3: -Which type of access control type is an acceptable use policy (AUP) most likely considered? Explanation: The most popular directive control is an acceptable use policy (AUP) that lists proper (and often examples of improper) procedures and behaviors that personnel must follow.
Detailed explanation-4: -An Acceptable Use Policy is an important document that can demonstrate due diligence with regards to the security of your IT network and the protection of sensitive data in the event of a breach or regulatory audit. This importantly protects the organisation from legal actions.