Wednesday, June 19, 2019

Acceptable Use Policy & Security Audit Assignment

Acceptable Use Policy & Security Audit - Assignment idealThe policy has numerous advantages including governing the traffic into the IT resources or data. Such traffic monitoring are often intended towards reducing network congestion and preventing chances execution of instrument degradation.The owner of the policy is usually responsible for the users styles on the computers therefore, anyone who is not authorized to the network cannot use the same. This notes that anyone accessing much(prenominal) computers without full authority of the owner constitutes to ill behavior to the policy. For instance, using someones name to access the resources and changing the access code among others. In other words, private computers cannot be used in such a computer network system. Those who violate AUP are liable to numerous disciplinary actions where each action taken depends on the degree of the offence and the kind of the offender and the policy owner (Wright, Freedman, and Liu 220). For i nstance, if the violation is reported in learning institutions, the culprit may lose the institutions computer privileges as well as facing possible termination, suspension, or expulsion from the institution. In some cases, such violation may lead to jail terms.Wright, Craig, Brian Freedman, and Dale Liu.The It Regulatory and Standards Compliance handbook how to Survive an Information Systems Audit and Assessments. Burlington, MA Syngress Pub, 2008. Internet

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.