Purdue Global University The OSI Model & Data Security Risks Essay Part 1: An Acceptable Use Policy for an information system is a fundamental part of red

Purdue Global University The OSI Model & Data Security Risks Essay Part 1:

An Acceptable Use Policy for an information system is a fundamental part of reducing your risk by outlining to employees what they are allowed to do while on the information system. Create a 1-page Acceptable Use Policy for using the information system for web browsing. Be sure to include the following:

Define the type of actions and communications that will be monitored.
Clearly communicate all monitoring activities.
Comply with all legal requirements for privacy.

Part 2:

In a short essay, briefly explain the formula SLE x ARO = ALE. Give an example.
Once a risk assessment has been completed, briefly explain the five actions you can use to reduce the risk. In addition, describe how staying on task, meeting deadlines, and utilizing feedback can each have a positive impact on reducing risk and promoting positive results in a group setting.
Risks associated with state-of-the-art technologies should be carefully assessed. In a short essay examine the risks associated with cloud computing and virtualization and provide two recommendations to your management.
Review the following security policy. In a short table match the five key areas of a good policy with the example below. Where does it match? Where can it be improved?
Website Security Policy

This site collects personal information from you when you register, including a record of your email address. We also may collect IP addresses and domain names of users of this site to measure the number of visits, time spent on the site, etc. We may occasionally ask you to complete surveys for research purposes.

“Cookies” may be used in connection with this website. A cookie is a small amount data sent to your browser stored on your computer’s hard drive. Using cookies enables us to collect data without your express knowledge or approval. Most browsers are initially set to accept cookies but you can change the setting to refuse to allow cookies.

We may provide the information we collect through this site to business partners. We may also use the information to inform you of new products, services, or promotions. We will not share personal information you submit to third parties unless ordered to do so by a legal authority.

Any questions regarding this policy should be directed to:In a short essay, define high availability, redundancy, and fault tolerance. How are they similar? How do differ?
In a short essay, define high availability, redundancy, and fault tolerance. How are they similar? How do differ

In a short essay, define high availability, redundancy, and fault tolerance. How are they similar? How do differ?
The text outlines a number of business policies including separation of duties and job rotation. Define two of these and explain why you would or would not implement them if you were a CIO (Chief Information Officer). As a CIO, describe how you will promote reliability, accountability, and timeliness in a group work setting. Use specific examples to support your claims.

Minimum Submission Requirements

Entire Assessment:

All parts of the Assessment must be completed.
This Assessment should be a minimum 3-page Microsoft® Word® document, in addition to the title and reference pages.
Respond to the questions in a thorough manner, providing specific examples of concepts, topics, definitions, and other elements asked for in the questions. Your paper should be highly organized, logical, and focused.
Your paper must be written in Standard English and demonstrate exceptional content, organization, style, and grammar and mechanics.
Your paper should provide a clearly established and sustained viewpoint and purpose.
Your writing should be well ordered, logical and unified, as well as original and insightful.
A separate page at the end of your research paper should contain a list of references, in APA format. Use your textbook, the Library, and the internet for research.
Be sure to cite both in-text and reference list citations were appropriate and reference all sources. Your sources and content should follow proper APA citation style. Review the APA formatting and citation style found in the Writing Center. (It should include a cover sheet, paper is double spaced, in Times New Roman 12-point font, correct citations, Standard English with no spelling or punctuation errors, and correct references at the bottom of the last page.)

If work submitted for this competency Assessment does not meet the minimum submission requirements, it will be returned without being scored.

Plagiarism is an act of academic dishonesty. It violates the University Honor Code, and the offense is subject to disciplinary action. You are expected to be the sole author of your work. Use of another person’s work or ideas must be accompanied by specific citations and references. Whether the action is intentional or not, it still constitutes plagiarism.

Leave a Reply

Your email address will not be published. Required fields are marked *