Writing
Acceptable Use Policy on Security Paper

Question Description

I’m working on a Marketing exercise and need support.

The assignment is to make an Acceptable Use Policy for a fictional company. The instructions are provided in doc.

Unformatted Attachment Preview

Acceptable Use Policy Prompt Purpose: To analyze a scenario and create an Acceptable Use Policy. Assignment: You will write an Acceptable Use Policy based on the scenario listed below. This report submission is expected to be a minimum of 6 pages in length, double spaced, using a 12pt Times New Roman font, with 1” margins. You may look up examples online and follow a template, but everything must be in your own words. Copying large portions of a policy or copying the whole policy and adding the company name into the policy is considered plagiarism, and will result in you receiving a 0 for the assignment and disciplinary action. Scenario: You have been hired on as a Security Consultant by Real Good Bank. Real Good Bank states that they were recently audited and were told to create an Acceptable Use Policy that addressed the security issues in their network and followed current best practices based on NIST guidelines. The CTO has explained that company users are not set up on a Company Domain because users were annoyed by the User Access Control prompts that appeared on their screen every time they tried to access/install something as well as constantly being forced to change their password and having to come up with a complex password. In response to this the IT department at Real Good Bank decided to remove user computers from the domain, making user’s administrators on their computers, and setting their passwords to never expire. Users can install any software onto their systems now and enjoy the freedom of being able to try out cool new software that is sent to their emails. Users also decided to uninstall the Anti-Virus and Web Filtering software on their company workstations because they believed that it was causing their computers to run slowly and stopped them from installing all the games and other software that they wanted. There is currently only one ethernet network and one wireless network at Real Good Bank. The wireless network and wired network are able to communicate freely with each other because users were upset that they couldn’t use their personal smartphones and tablets to connect to company servers and access confidential data they needed to perform their jobs. Many users also prefer to bring in their own laptops and desktops to plug into the company ethernet network as they believe that their machine is better than the systems that the IT department is purchasing. Users are also currently purchasing 5-port hubs and plugging them into the 1 ethernet port at their desks because they enjoy being able to plug their own printer and other personal ethernet devices in at their desk. Employees like to save the confidential data they use at work locally on their personal devices so they can work on their projects at home. While a VPN is available, users complained that it was too slow when they were connected to it and that saving documents locally was a far better solution. If a user is ever fired from Real Good Bank, the first thing a user does is drop their company issued computer from the 34th floor of the Real Good Bank building into the dumpster. Users state this makes them feel comfortable that their data can’t be accessed once they leave. Users also will not let IT have access to their personal devices when they leave because they claim their device does not belong to IT. Users also promise that they don’t have any company data on their device or they promise that they will delete any company data that they see when they get home. Acceptable Use Policy Prompt Purpose: To analyze a scenario and create an Acceptable Use Policy. Assignment: You will write an Acceptable Use Policy based on the scenario listed below. This report submission is expected to be a minimum of 6 pages in length, double spaced, using a 12pt Times New Roman font, with 1” margins. You may look up examples online and follow a template, but everything must be in your own words. Copying large portions of a policy or copying the whole policy and adding the company name into the policy is considered plagiarism, and will result in you receiving a 0 for the assignment and disciplinary action. Scenario: You have been hired on as a Security Consultant by Real Good Bank. Real Good Bank states that they were recently audited and were told to create an Acceptable Use Policy that addressed the security issues in their network and followed current best practices based on NIST guidelines. The CTO has explained that company users are not set up on a Company Domain because users were annoyed by the User Access Control prompts that appeared on their screen every time they tried to access/install something as well as constantly being forced to change their password and having to come up with a complex password. In response to this the IT department at Real Good Bank decided to remove user computers from the domain, making user’s administrators on their computers, and setting their passwords to never expire. Users can install any software onto their systems now and enjoy the freedom of being able to try out cool new software that is sent to their emails. Users also decided to uninstall the Anti-Virus and Web Filtering software on their company workstations because they believed that it was causing their computers to run slowly and stopped them from installing all the games and other software that they wanted. There is currently only one ethernet network and one wireless network at Real Good Bank. The wireless network and wired network are able to communicate freely with each other because users were upset that they couldn’t use their personal smartphones and tablets to connect to company servers and access confidential data they needed to perform their jobs. Many users also prefer to bring in their own laptops and desktops to plug into the company ethernet network as they believe that their machine is better than the systems that the IT department is purchasing. Users are also currently purchasing 5-port hubs and plugging them into the 1 ethernet port at their desks because they enjoy being able to plug their own printer and other personal ethernet devices in at their desk. Employees like to save the confidential data they use at work locally on their personal devices so they can work on their projects at home. While a VPN is available, users complained that it was too slow when they were connected to it and that saving documents locally was a far better solution. If a user is ever fired from Real Good Bank, the first thing a user does is drop their company issued computer from the 34th floor of the Real Good Bank building into the dumpster. Users state this makes them feel comfortable that their data can’t be accessed once they leave. Users also will not let IT have access to their personal devices when they leave because they claim their device does not belong to IT. Users also promise that they don’t have any company data on their device or they promise that they will delete any company data that they see when they get home. ...
Purchase answer to see full attachment
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Attached.

Running head: ACCEPTABLE USE POLICY ON SECURITY

Acceptable Use Policy on Security
Student’s Name
Institution Affiliation

1

ACCEPTABLE USE POLICY ON SECURITY

2

Acceptable Use Policy on Security
Summary
The following policies provide appropriate guidelines on the acceptable use of networks belonging
to Real Good Bank in efforts to address security issues.
The policies follow practical NIST guidelines and comply with FIMA standards.
You are required to read the following “Acceptable Use Policy” before using any networks and
products affiliated with Real Good Bank.
The following policy is legally binding. All users must comply with applicable regulations
regarding the use of company networks and products.
The policy is developed based on enhancing user experience with security or network
environments. It governs the use of Real Good Bank resources such as security systems, user
privacy, the safety of company data, and duties of the company.
The following policy covers the sharing and protection of user data or information, the installation
and uninstallation of third-party software, domain networks, password protection, ethernet and
wireless connections, and use of personal computers or devices.
The policy forms the baseline for the development of appropriate security plans and control
protocols across all information systems. They will facilitate the assessment of risks and monitor
or control performance.
A user is defined as any person with access to the company’s network or domain.
A user is defined as personnel or employee of the Real Good Bank.
A user is also any other third party hired and paid to work directly on behalf of the company.
Any suspicious activity or misuse of company products is punishable by suspension or the
termination of the user’s administration rights and employment.

ACCEPTABLE USE POLICY ON SECURITY

3

Purpose
The main purpose of this policy is to create an enabling user environment with secure networks
and information systems. The policy also aims to safeguard all the company’s resources from
potential misuse and mishandling. These are in line with NIST guidelines to establish security
controls.
Scope
The following policy applies to specific or all use of the company’s resources, such as domains
and wireless networks. These include ...

TutorDerek (2465)
UIUC

Anonymous
Thanks for the help.

Anonymous
Outstanding. Studypool always delivers quality work.

Anonymous
Tutor was very helpful and took the time to explain concepts to me. Very responsive, managed to get replies within the hour.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags