Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 4, Problem 3E

Explanation of Solution

Statement of policy:

This policy has been accepted to outline the satisfactory use of all college computers. Strong obedience to this policy is a must and if any student not obeying the policy of the college, so it will be considered to be in disobedience of college policy.

Responsibility of users:

All the authorized users are accessing college owned computers by following guidelines:

General usage of computers:

  • College students are responsible for the protection of all the information that the user have access to with directly or indirectly. Students are also responsible to recognize that the information is sensitive and take the necessary measures to keep it that way.
  • Choose the username and password is easy to remember but hard for other unauthorized users.
  • Only college staff and students are allowed to use campus computer machines.
  • Never under any circumstance disclose or share the username and password.
  • Follow the rules like respect all legal protections such as license and copyright.
  • At the end of the class, proper shut down all computers.
  • After complete the work, log off all the computers or workstations.
  • Strictly prohibited playing games on college computers

Usage of internet:

  • Only authorized persons are allowed to install software, modems or any other types of hardware.
  • Access to the Internet is only allowed through the campus content scanning software, router and firewall...

Blurred answer
Students have asked these similar questions
To learn more about your institution's security rules, look them up on the intranet or website. Is there a corporate security policy somewhere? Where have you come across security rules that are tailored to address a particular problem? What agency or department is in charge of issuing or coordinating all of these policies, or are they dispersed across the organization? Use the framework provided in this chapter to determine whether or not the policies you found in the preceding exercise are complete. What are the omissions in these areas?
Search your institution's intranet or Web site for its security policies. Do you find an enterprise security policy? What issue-specific security policies can you locate? Are all of these policies issued or coordinated by the same individual or office, or are they scattered throughout the institution? Using the framework presented in this chapter, evaluate the comprehensiveness  of each policy you located in Exercise above Which areas are missing?
When we speak about physical security, what precisely do we mean, and how does it stack up against other types of protection? What are some of the most important dangers to a person's physical safety that are prevalent in the current world and how may one protect themselves from these dangers? How do they make themselves known to the wider public, and what form do their assaults on the organization take when it comes to the structure of the organization?
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning