Friday, September 27, 2019
Acceptable Use Policy & Security Audit Assignment
Acceptable Use Policy & Security Audit - Assignment Example The policy has numerous advantages including governing the traffic into the IT resources or data. Such traffic monitoring are often intended towards reducing network congestion and preventing chances performance degradation. The owner of the policy is usually responsible for the usersââ¬â¢ behaviors on the computers; therefore, anyone who is not authorized to the network cannot use the same. This notes that anyone accessing such computers without full authority of the owner constitutes to ill behavior to the policy. For instance, using someoneââ¬â¢s name to access the resources and changing the access code among others. In other words, private computers cannot be used in such a computer network system. Those who violate AUP are liable to numerous disciplinary actions where each action taken depends on the degree of the offence and the relationship of the offender and the policy owner (Wright, Freedman, and Liu 220). For instance, if the violation is reported in learning institutions, the culprit may lose the institutionââ¬â¢s computer privileges as well as facing possible termination, suspension, or expulsion from the institution. In some cases, such violation may lead to jail terms. Wright, Craig, Brian Freedman, and Dale Liu.à The It Regulatory and Standards Compliance Handbook: [how to Survive an Information Systems Audit and Assessments]. Burlington, MA: Syngress Pub, 2008. Internet
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.