Create Missing Policies

 

Module 05 Course Project – Create Missing Policies

The changes you recommended in Module 03 have been approved by management.

For this week, you have been asked to review the document and update the End User Information Security Policy document with policies you have deemed to be missing.

For this submission, you will:

  • Modify the existing policy with policies you believe need to be modified or added.
  • Make changes directly to the document prior to submission.
  • Update the revision history in the beginning of the document with exactly what changes have been made.
  • Maintain the same format as the original.
  • Use professional language, proper grammar and spelling.



Version:

<1.0>
Error! Unknown document property name.

Summary Report Module

Summary Report – Module 4

Version 1
Prepared By: Jude akassap

Date: 8/28/22

Training Plan Version:

<1.0>
Error! Unknown document property name.

Revision Date:

Error! Unknown document property name.

Page 2 of 10

NOT DONE – CDC_UP_Training_Plan_Template

VERSION HISTORY

Version #

Implemented

By

Revision

Date

Approved

By

Approval

Date

Reason

1.0

Jude Akassap

8/28/22

Jay M.

8/31/22

Document Creation

TABLE OF CONTENTS

1

Introduction

5

1.1

Purpose

5

2

Executive Summary

5

3

Detailed Summary

5

3.1

LAN Security/Password Policy

5

3.2

Antivirus

5

3.3

Acceptable Use

5

4

Recommendations

5

5

SuggEstED aCTIONS

5

Appendix A: Approval

6

APPENDIX B: REFERENCES

7

APPENDIX C: KEY TERMS

8

Introduction

Purpose

This
Summary Report provides a summary of end users security policies and recommendations for amelioration

Executive Summary

In this report, the end user security policy is examined, and areas where new policies or modifications would be beneficial are noted.

Detailed Summary

LAN Security/Password Policy
While the LAN Security policy section does mention some policy parameters regarding password security, certain aspects are left entirely up to the IT Officers discretion. Password policy guidelines such as the complexity, length, and frequency of use should be detailed for increased security. Many organizations follow a password standard such as NIST
Antivirus
According to the 10.1 Detailed Policy Requirements section, BYOD devices must have antivirus software, however company-owned laptops and other devices are not obliged to have antivirus software. All company-owned devices should come with antivirus software installed, and only IT administrators should be allowed to turn it off. Any software installation should be subject to prior authorization and IT administrative rights. By enabling antivirus and carefully examining software before it is loaded, end device security will be much improved.
Acceptable Use
There is no definition of acceptable use of an organization resource. Implementing firewall rules to ban specific websites and website categories that are regarded inappropriate for the workplace is a good idea. Policies that outline acceptable and undesirable workplace browsing activity should be made available to employees.

Recommendations

This report finds there are several critical issues with the current security policyand recommends the above actions be implemented to increase the overallsecurity of the organization.

SuggEstED aCTIONS

Following these recommendations, new policies ought to be developed and included in the upcoming version of the end user information security policy.

Appendix A: Approval

The undersigned acknowledge they have reviewed the
and agree with the approach it presents. Changes to this
will be coordinated with and approved by the undersigned or their designated representatives.

Signature:

Date:

Print Name:

Jude Akassap

Title:

Role:

Signature:

Date:

Print Name:

Title:

Role:

Signature:

Date:

Print Name:

Title:

Role:

APPENDIX B: REFERENCES

[Insert the name, version number, description, and physical location of any documents referenced in this document. Add rows to the table as necessary. This is where you would want to reference your Risk Register and any other documents that you need to. For the purposes of this class, please include references to course material or outside sources that you are using in your work.]
The following table summarizes the documents referenced in this document.

Document Name and Version

Description

Location

[Provide description of the document]

APPENDIX C: KEY TERMS

[Insert terms and definitions used in this document. Add rows to the table as necessary. Keep in mind that you are typically writing a summary report for someone who is not familiar with information technology. Be sure to define any terms here that might need to be explained.]

The following table provides definitions for terms relevant to this document.

Term

Definition

[Insert Term]

[Provide definition of the term used in this document.]

[Insert Term]

[Provide definition of the term used in this document.]

[Insert Term]

[Provide definition of the term used in this document.]

1

Revision Date:

Error! Unknown document property name.

Page
7 of 8

image1

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more