COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Public key cryptology
|
|
Intellectual property
|
|
Cookies
|
|
AUP
|
Detailed explanation-1: -An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
Detailed explanation-2: -An acceptable use policy usually: Includes specific rules, such as no video pirating. Outlines consequences for breaking the rules, such as warnings or suspension of access. Details an organization’s philosophy for granting access (for example, internet use is a privilege that can be revoked, rather than a right)
Detailed explanation-3: -Why do companies have Acceptable Use Policies? Acceptable Use Policies are a fundamental part of information security and a document that can render proof of “due diligence.” These regulations provide safety for the network and protect sensitive customer data in the event of regulatory breach audits.
Detailed explanation-4: -Acceptable use policy vs end-user license agreement While a EULA is for a single piece of software, an AUP applies to entire networks, websites, and how a person is expected to comport themselves while using your business’s resources. While a EULA focuses on the client (end user), an AUP is for employees.
Detailed explanation-5: -Appropriate Internet Usage. Cybersecurity Practices. Guest User Policies and Practices. Keep the Jargon to a Minimum and Use Straightforward Language. Make the AUP Accessible. Determine a Course of Action for Violations. 25-May-2022