Placeholder

COM 590 Module 1 Assignment Latest

$38.00

Quantity:

Product Description

COM 590 Module 1 Assignment Latest

COM 590 Module 1 Assignment Latest

COM590

COM 590 Module 1 Assignment Latest

  1. Can Internet use and e-mail use policies be covered in an acceptable use policy?
  2. Why is an acceptable use policy not a fail-safe means of mitigating risks and threats within the user domain?
  3. Why does an organization want to align its policies with the existing compliance requirements?
  4. Why must an organization have an acceptable use policy (AUP) even for non-employees, such as contractors, consultants, and other third parties?
  5. Will the AUP apply to all levels of the organization? Why or why not?
  6. What security controls can be deployed to monitor users that are potentially in violation of an AUP?
  7. Should an organization terminate the employment of an employee if he/she violates an AUP? Why?
  8. Do compliance laws, such as HIPAA or GLBA, play a role in AUP definition?
  9. Why do organizations have acceptable use policies (AUPs)
  10. What are three risks and threats of the user domain?