Computer Science 3-2 Assignment: Rules of Behavior Assignment

The purpose of this assignment is to examine noncompliance of security policies and possible ways to handle these violations. In addition, students will develop a security policy document, called Rules of Behavior, in order to clarify the security policies.

Prompt

The chief information security officer (CISO) reaches out to you again and complains about the interns who appear to be violating many security policies. They do not lock their workstations, download illegal music, connect their personal devices to the organization’s computers, spend too much time on social media, and even download pornography to the organization’s computers. The CISO asks you to address these violations by developing two-page security document (Rules of Behavior) stating at least 15 rules about what activities employees are not allowed to conduct on the network. See the Department of Justice RoB template as a sample. Additionally, write three supplementary paragraphs to discuss what types of training should occur in order to keep these violations from occurring in the future. How can you proactively aim for compliance with these behaviors?

Specifically, the following critical elements must be addressed:

  • Address violations committed by the interns.
  • State at least 15 rules about network conduct.
  • Propose future training possibilities with three supplementary paragraphs.
  • Discuss how businesses can aim for compliance with behaviors.

What to Submit

Your paper must be submitted as a two-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. Your paper must include at least 15 rules regarding network conduct.

See attached PDF

NEED A CUSTOMIZED PAPER ON THE ABOVE DETAILS?

Submit your order now!