FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
I decide to create an Acceptable Use Policy that tells employees that “Any employee that tries to bypass any security measures put in place by Corporate Security would be subject to termination” is an example of?
A
Risk Acceptance
B
Risk Avoidance
C
Risk Transferrence
D
Risk Deterrence
Explanation: 

Detailed explanation-1: -An acceptable use policy (AUP) is a document that outlines the rules and restrictions employees must follow in regard to the company’s network, software, internet connection and devices.

Detailed explanation-2: -An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources. Many businesses and educational institutions require employees or students to sign an AUP before being granted a network ID.

Detailed explanation-3: -An Acceptable Use Policy is an important document that can demonstrate due diligence with regards to the security of your IT network and the protection of sensitive data in the event of a breach or regulatory audit. This importantly protects the organisation from legal actions.

There is 1 question to complete.