Computer Science
ISOL631 Cumberlands Policy Monitoring and Enforcement Strategy Paper

ISOL631

University of the Cumberlands

Question Description

I’m studying and need help with a Computer Science question to help me learn.

Assignment: Policy Monitoring and Enforcement Strategy

Learning Objectives and Outcomes

  • Explore policy creation and enforcement actions.
  • Describe policy monitoring and enforcement strategies.

Scenario

Imagine you work for a Department of Defense (DoD) organization with direct ties to the U.S. government. You are a supplier of military products. Your organization has three different levels of management, and of those levels two different unions exist. The majority of your staff is in a non-supervisory union. Your organization had approximately 7,000 workers, which are located across the United States in 35 locations. You also have contractors.

You have developed an Internet use policy along with a physical access policy and implemented them. You must modify these policies as soon as possible because of a recent security breach that exposed flaws in both policies.

Assignment Requirements

Describe a policy monitoring and enforcement strategy for your organization. Identify and describe the legal implications of ISS policy enforcement after the modified policies are adapted.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Citation Style: APA
  • Length: 1–2 pages(approx.. 600-700 words)

Self-Assessment Checklist

  • I wrote an academic paper.
  • I described a policy monitoring and enforcement strategy for the organization.
  • I identified and described the legal implications of ISS policy enforcement after the modified policies are adapted.

Subject: ISOL631- Operations Security

Reference book:

Johnson, R. (2014). Security policies and implementation issues. Jones & Bartlett Publishers.

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Check this out 👍 Please let me know if you have any questions or if you need to make changes. Thanks 😀

U.S. Department of Defense
Physical Access & Internet Use Policy 2.0 Outline
Introduction
Scope
Policy
Physical Access
Internet Use
Monitoring
Regulation & Legal Enforcement
References


Running head: PHYSICAL ACCESS & INTERNET USE POLICY

U.S. Department of Defense
Physical Access & Internet Use Policy 2.0

2
PHYSICAL ACCESS & INTERNET USE POLICY

Introduction
This policy is part of the response to the recent network security breach. The
investigation shows the vulnerabilities, which contributed to the security breach.
Following a comprehensive analysis, the Information Security Management Team has
characterized the two main threats or risks for the U.S. Department of Defense
information systems. The Physical Access & Internet Use Policy 2.0 specifies the policy
for physical access to U.S. Department of Defense information systems and internet
use by personnel serving the organi...

Warble (1068)
Purdue University

Anonymous
Top quality work from this tutor! I’ll be back!

Anonymous
It’s my second time using SP and the work has been great back to back :) The one and only resource on the Interwebs for the work that needs to be done!

Anonymous
Thanks, good work

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4