Question: define an AUP as it relates to end users, identify the key elements of sample AUPs, you will learn how to mitigate threats and risks
define an AUP as it relates to end users, identify the key elements of sample AUPs, you will learn how to mitigate threats and risks with an AUP, and you will create your own AUP for an organization.
When given access to resources, whether IT equipment or some other type of asset, most people will use the resources responsibly. However, a few people, when left to rely on only common courtesy or good judgment, will misuse or abuse those resources. The misuse might be for their own benefit or just for entertainment. While the misuse can be unintentional, it is still a waste of resources. To avoid that waste or outright abuse, a company will document official guidance. For resources within the IT domains, that guidance is called an acceptable use policy (AUP).
The purpose of an AUP is to establish the rules for a specific system, network, or website, for example, to outline the rules for achieving compliance. They also help an organization mitigate risks and threats because they establish what can and cannot be done.
In this lab, you will define an AUP as it relates to end users, identify the key elements of sample AUPs, learn how to mitigate threats and risks with an AUP, and create your own AUP for an organization.
Lab Overview
This lab has two parts, which should be completed in the order specified.
1. In the first part of the lab, you will conduct research on acceptable use policies.2. In the second part of the lab, you will design your own acceptable use policy.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
