Question: As we begin to learn about controls that can be used to secure the confidentiality, integrity, and availability of data assets, we discovered that information

As we begin to learn about controls that can be used to secure the confidentiality, integrity, and availability of data assets, we discovered that information security policy is a type of security control. In this assignment you will evaluate an existing DTCC policy against a realistic scenario.
(i) How to do it?
Locate and read the college's policy on acceptible use of computing resources.
Select ONE of the scenarios below and answer the questions below. Pick only 1 scenario.
SCENARIO A: An employee of the college has a spare room for rent. They use their DTCC email to advertise the listing - sending mail to other employees.
SCENARIO B: A student has a bicycle for sale and advertises on
craigslist.org The student uses their
dtcc.edu email account for corresponding with potential buyers.
SCENARIO C: A student uses the college's internet connection to search for a job prior to graduation.
Evaluating the scenario against the DTCC policy, answer the following:
Does the acceptable use policy include information to cover the selected scenario?
What is the impact of the policy on the selected scenario?
What to submit?
Identify which scenario you selected and answer questions 1&2.
As we begin to learn about controls that can be

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!