Friday 26 January 2018

CIS 560 WEEK 2 DISCUSSION

CIS 560 WEEK 2 DISCUSSION


Acceptable Use Policy and Access Control"  Please respond to the following IN YOUR OWN WORDS:

Organizations should have policies that describe which users have access to sensitive systems and data, for what purpose, and for how long. Assume that you are an IT manager in charge of creating your organization’s new Acceptable Use Policy. What are the most important items to add to that policy in order to help enforce access control.
I need specific items, not just a general discussion of the importance of the AUP.
(Hint: Not everything in an AUP is also part of Access Control.  I'm only concerned with what is associated with access control)



























CIS 560 WEEK 2 DISCUSSION

Acceptable Use Policy and Access Control"  Please respond to the following IN YOUR OWN WORDS:

Organizations should have policies that describe which users have access to sensitive systems and data, for what purpose, and for how long. Assume that you are an IT manager in charge of creating your organization’s new Acceptable Use Policy. What are the most important items to add to that policy in order to help enforce access control.
I need specific items, not just a general discussion of the importance of the AUP.
(Hint: Not everything in an AUP is also part of Access Control.  I'm only concerned with what is associated with access control)

CIS 560 WEEK 2 DISCUSSION

Acceptable Use Policy and Access Control"  Please respond to the following IN YOUR OWN WORDS:

Organizations should have policies that describe which users have access to sensitive systems and data, for what purpose, and for how long. Assume that you are an IT manager in charge of creating your organization’s new Acceptable Use Policy. What are the most important items to add to that policy in order to help enforce access control.
I need specific items, not just a general discussion of the importance of the AUP.
(Hint: Not everything in an AUP is also part of Access Control.  I'm only concerned with what is associated with access control)

No comments:

Post a Comment

Note: only a member of this blog may post a comment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...