COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
True
|
|
False
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -In a nutshell – an Internet Access Policy (IAP) is a document, that allows software vendors to declare and describe the Internet usage of their programs. It is comparable to a Privacy Policy.
Detailed explanation-2: -An internet usage policy should include the following: A notification that all aspects of employee use of company-owned equipment can be monitored at any time and without notice. A statement of the reasons for the policy. A description of what constitutes improper use of employer-owned equipment.
Detailed explanation-3: -A web browser is a computer application or a mobile application that is used to access the world wide web or the internet. A web browser can be used for accessing websites as well as for various purposes such as playing audio/video and games, sharing files, emails, etc.
Detailed explanation-4: -A disclaimer is often included in an AUP absolving the organization from responsibility for a data breach, malware or other issue. Statements about when a person is in violation of this policy and when law enforcement might be called in could also be included.