SmartExpert

(118)

$30/per page/Negotiable

About SmartExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Business & Finance See all
Accounting,Business & Finance,Economics,English,HR Management,Math Hide all
Teaching Since: Apr 2017
Last Sign in: 4 Weeks Ago, 6 Days Ago
Questions Answered: 7559
Tutorials Posted: 7341

Education

  • BS,MBA, PHD
    Adelphi University/Devry
    Apr-2000 - Mar-2005

Experience

  • HOD ,Professor
    Adelphi University
    Sep-2007 - Apr-2017

Category > Computer Science Posted 30 Sep 2019 My Price 5.00

IT 460 Week 9 Discussion IT security policies

IT460 Week 9 Discussion IT security policies

IT security policies

Part of implementing a system is ensuring that it will be properly used. As a systems analyst, you know that a security policy must be written well before the system is available for use. This week, you are to begin work on a policy for Margaret Valley High School.

Choose two of the following topics. If possible, try to choose those which have not already been discussed. For each of your two choices, write a clear, detailed policy statement followed by an explanation of why the rule is important.

·         Wireless network access: rules for employees, students, and visitors.

·         School-owned hardware requirements, including access and cataloging.

·         Bring Your Own Device (BYOD) restrictions for employees and for students.

·         Email rules and password requirements.

·         Server room access and requirements.

·         Data storage and backup rules and timelines.

·         Electronic surveillance (cameras) rules.

·         Rules for use of electronics and the system in case of emergency, including identifying what situations are deemed emergencies.

·         Penalties for hacking/accessing restricted data, including what data is restricted.

Additional parameters:

·         Keep in mind that this policy is to be implemented in a high school setting/building.

·         You may like to review such policies online, but make sure you do not copy or quote; your posts must be written entirely in your own words.

Write an original descriptive subject line for your initial post (instead of "unit 9 discussion"), as labeling content will be important to your clients. Do not copy the questions or quote from sources; write your post in your own words. Remember to follow all rules of engagement.

Answers

(118)
Status NEW Posted 30 Sep 2019 02:09 PM My Price 5.00

IT -----------460----------- We-----------ek -----------9 D-----------isc-----------uss-----------ion----------- I-----------T s-----------ecu-----------rit-----------y p-----------oli-----------cie-----------s ----------- -----------

Attachments

file 1569854409-IT 460 Week 9 Discussion IT security policies.docx preview (445 words )
I-----------T 4-----------60 -----------Wee-----------k 9----------- Di-----------scu-----------ssi-----------on -----------IT -----------sec-----------uri-----------ty -----------pol-----------ici-----------es ----------- IT----------- se-----------cur-----------ity----------- po-----------lic-----------ies----------- P-----------art----------- of----------- im-----------ple-----------men-----------tin-----------g a----------- sy-----------ste-----------m i-----------s e-----------nsu-----------rin-----------g t-----------hat----------- it----------- wi-----------ll -----------be -----------pro-----------per-----------ly -----------use-----------d. -----------As -----------a s-----------yst-----------ems----------- an-----------aly-----------st,----------- yo-----------u k-----------now----------- th-----------at -----------a s-----------ecu-----------rit-----------y p-----------oli-----------cy -----------mus-----------t b-----------e w-----------rit-----------ten----------- we-----------ll -----------bef-----------ore----------- th-----------e s-----------yst-----------em -----------is -----------ava-----------ila-----------ble----------- fo-----------r u-----------se.----------- Th-----------is -----------wee-----------k, -----------you----------- ar-----------e t-----------o b-----------egi-----------n w-----------ork----------- on----------- a -----------pol-----------icy----------- fo-----------r M-----------arg-----------are-----------t V-----------all-----------ey -----------Hig-----------h S-----------cho-----------ol.----------- C-----------hoo-----------seÂ----------- tw-----------o -----------of -----------the----------- fo-----------llo-----------win-----------g t-----------opi-----------cs.----------- If----------- po-----------ssi-----------ble-----------, t-----------ry -----------to -----------cho-----------ose----------- th-----------ose----------- wh-----------ich----------- ha-----------ve -----------not----------- al-----------rea-----------dy
Not Rated(0)