Question: The following are some examples of basic IT security policies: Acceptable use policy (AUP): The AUP defines the actions that are and are not allowed
The following are some examples of basic IT security policies:
- Acceptable use policy (AUP): The AUP defines the actions that are and are not allowed regarding the use of organization-owned IT assets.
- Security awareness policy: This policy defines how to ensure that all personnel are aware of the importance of security and behavioral expectations under the organizations security policy.
- Asset classification policy: This policy defines an organizations data classification standard. It designates the IT assets that are critical to the organizations mission as well as defining the organizations systems, uses, and data priorities and identifying assets.
- Asset protection policy: This policy helps organizations define a priority for mission-critical IT systems and data. It is aligned with an organizations business impact analysis and is used to address risks that could threaten the organizations ability to continue operations after a disaster.
- Vulnerability assessment and management: This policy defines an organization-wide vulnerability window for production operating system and application software. Organization-wide vulnerability assessment and management standards, procedures, and guidelines are developed from this policy.
Answer the following question(s):
Assume you are the president of a small company with 12 employees. A third party provides IT and security services as needed. You do not have a formal IT security policy framework in place. Which two policies listed here do you think would be most important to create and enact first? Why?
Fully address the questions in this discussion; provide valid rationale for your choices, where applicable; and respond to at least two other students views.
NOTE:
-no plagiarism
-own sentences
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
