14 Sep Module 05 Course Project ? Create Missing Policies The changes you recommended in Module 03 have been approved by management. For this week, you have been asked to review the docume
Module 05 Course Project – Create Missing Policies
The changes you recommended in Module 03 have been approved by management.
For this week, you have been asked to review the document and update the End User Information Security Policy document with policies you have deemed to be missing.
For this submission, you will:
- Modify the existing policy with policies you believe need to be modified or added.
- Make changes directly to the document prior to submission.
- Update the revision history in the beginning of the document with exactly what changes have been made.
- Maintain the same format as the original.
- Use professional language, proper grammar and spelling.
<Project Name> Version: <1.0> Error! Unknown document property name.
Summary Report Module <Insert Module #>
Summary Report – Module 4
Version 1
Prepared By: Jude akassap
Date: 8/28/22
<Project Name> Training Plan Version: <1.0> Error! Unknown document property name.
Revision Date: Error! Unknown document property name. Page 2 of 10
NOT DONE – CDC_UP_Training_Plan_Template.doc
VERSION HISTORY
|
Version # |
Implemented By |
Revision Date |
Approved By |
Approval Date |
Reason |
|
1.0 |
Jude Akassap |
8/28/22 |
Jay M. |
8/31/22 |
Document Creation |
TABLE OF CONTENTS
3.1 LAN Security/Password Policy 5
Introduction
Purpose
This Summary Report provides a summary of end users security policies and recommendations for amelioration
Executive Summary
In this report, the end user security policy is examined, and areas where new policies or modifications would be beneficial are noted.
Detailed Summary
LAN Security/Password Policy
While the LAN Security policy section does mention some policy parameters regarding password security, certain aspects are left entirely up to the IT Officers discretion. Password policy guidelines such as the complexity, length, and frequency of use should be detailed for increased security. Many organizations follow a password standard such as NIST
Antivirus
According to the 10.1 Detailed Policy Requirements section, BYOD devices must have antivirus software, however company-owned laptops and other devices are not obliged to have antivirus software. All company-owned devices should come with antivirus software installed, and only IT administrators should be allowed to turn it off. Any software installation should be subject to prior authorization and IT administrative rights. By enabling antivirus and carefully examining software before it is loaded, end device security will be much improved.
Acceptable Use
There is no definition of acceptable use of an organization resource. Implementing firewall rules to ban specific websites and website categories that are regarded inappropriate for the workplace is a good idea. Policies that outline acceptable and undesirable workplace browsing activity should be made available to employees.
Recommendations
This report finds there are several critical issues with the current security policyand recommends the above actions be implemented to increase the overallsecurity of the organization.
SuggEstED aCTIONS
Following these recommendations, new policies ought to be developed and included in the upcoming version of the end user information security policy.
The undersigned acknowledge they have reviewed the and agree with the approach it presents. Changes to this will be coordinated with and approved by the undersigned or their designated representatives.
|
Signature: |
Date: |
||
|
Print Name: |
Jude Akassap |
||
|
Title: |
|||
|
Role: |
|
Signature: |
Date: |
||
|
Print Name: |
|||
|
Title: |
|||
|
Role: |
|
Signature: |
Date: |
||
|
Print Name: |
|||
|
Title: |
|||
|
Role: |
[Insert the name, version number, description, and physical location of any documents referenced in this document. Add rows to the table as necessary. This is where you would want to reference your Risk Register and any other documents that you need to. For the purposes of this class, please include references to course material or outside sources that you are using in your work.]
The following table summarizes the documents referenced in this document.
|
Document Name and Version |
Description |
Location |
|
<Document Name and Version Number> |
[Provide description of the document] |
<URL or Network path where document is located> |
[Insert terms and definitions used in this document. Add rows to the table as necessary. Keep in mind that you are typically writing a summary report for someone who is not familiar with information technology. Be sure to define any terms here that might need to be explained.]
The following table provides definitions for terms relevant to this document.
|
Term |
Definition |
|
[Insert Term] |
[Provide definition of the term used in this document.] |
|
[Insert Term] |
[Provide definition of the term used in this document.] |
|
[Insert Term] |
[Provide definition of the term used in this document.] |
1
Revision Date: Error! Unknown document property name.
Page 7 of 8
image1.png
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Wridemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
